exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 72 of 72 RSS Feed

Files Date: 2003-10-21 to 2003-10-22

strace-0.3.zip
Posted Oct 21, 2003
Authored by Bindview Security Research | Site razor.bindview.com

Strace for NT is a debugging/investigation utility for examining the NT system calls made by a process. It is meant to be used like the strace (or truss) on linux and other unix OSes. What make strace different is that is hooks every system call instead of just selected ones, giving you an excellent idea of what the process is really doing.

systems | linux, unix
SHA-256 | 5b2735e8141907cec5bb50ae17592fdf8c75adb0f42aca5d7b807a20a63e6166
ngrep-1.41.tar.bz2
Posted Oct 21, 2003
Authored by Jordan Ritter | Site ngrep.sourceforge.net

Ngrep is a powerful network sniffing tool which strives to provide most of GNU grep's common features, applying them to all network traffic. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP, FDDI, and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop. Windows binaries available here.

Changes: Added support for IEEE 802.11 Wireless links, ngrep now revokes its own privileges to a safe user ("nobody" by default), compile fixes to improve portability, added -S switch to limit the amount of bytes in each packet ngrep will inspect, ngrep now recognizes the flags associated with TCP ECN Congestion Notification, relaxed licensing restrictions, and windows versions now use the latest libpcap.
tags | tool, udp, sniffer, tcp
systems | windows
SHA-256 | e9d9d26303caf0afbf330d2a1c89771c07199d6b58eaed6cba9e25184de356c4
fenris-0.7-m.tgz
Posted Oct 21, 2003
Authored by Michal Zalewski | Site razor.bindview.com

Fenris is a multipurpose tracer, stateful analyzer and partial decompiler intended to simplify bug tracking, security audits, code, algorithm, protocol analysis and computer forensics by providing a structural program trace, general information about internal constructions, execution path, memory operations, I/O, conditional expression info, and much more. A small demonstration how this tool works can be found here.

Changes: maintenance release: new fingerprints, bug-fixes.
tags | protocol
SHA-256 | 9db900b88bac67205c493bfdf4780d55020f71d6cf69ea0fd2a01fa148619d7e
ncpquery-1.3.tar.gz
Posted Oct 21, 2003
Authored by Simple Nomad | Site razor.bindview.com

NCPQuery is an open source tool that allows probing of a Novell Netware 5.0/5.1 server running IP. It uses TCP port 524 to enumerate objects with public read access, disclosing such information as account names, server services, and other various objects. A remote attacker can gather the equivalent information provided by the console command "display servers" and the DOS client command "cx /t /a /r" without authentication. Includes a Win32 port.

tags | remote, tcp
systems | windows
SHA-256 | 354012e902e80df46b1bf28adfc90559ba18f2db45bf019a1b8745c756211795
teo-openssl-xpl.tgz
Posted Oct 21, 2003
Authored by Teolupus

Teolupus OpenSSL Exploiter is an automated OpenSSL vulnerability scanner able to find, log and exploit a server "without human intervention". It is based on Nebunu apscan2 but has much more targets. Includes openfuckv2 and openssl-too-open both with more than 130 targets.

tags | exploit
SHA-256 | ce85e0330ac595ce313685f1e0d5ef79db96eff660b53e1cdb8a6938e169de1c
iwconfig.c
Posted Oct 21, 2003
Authored by NrAziz

Iwconfig local proof of concept exploit - Causes a seg fault. Note that iwconfig is not suid.

tags | exploit, local, proof of concept
SHA-256 | 867f82eb7dcfc7a51d785f60e5b6f4bdc86928b16aa0629292f6687d0fe23112
p0ly.c
Posted Oct 21, 2003
Authored by Polygrithm

p0ly.c contains a sniffer, syn flooder, deadly get request attack, and a port scanner.

tags | denial of service
SHA-256 | 1c92866c9ec70598ddaaf0956078a1c81f695aada02ee44438e06f76ae3083a7
icmpdoor.tar.gz
Posted Oct 21, 2003
Authored by l0om

Small ICMP based backdoor and DDoS slave + master. In German and English.

tags | denial of service
SHA-256 | 650e68d37c407e05229b2b7179a5778c05c7cf7efc35ddd259732a9ed2f2d190
novell.ichain.v2.txt
Posted Oct 21, 2003
Site support.novell.com

Novell iChain prior to v2.2 SP2 beta contains multiple remote vulnerabilities which allow user session hijacking, denial of service, and possibly system compromise.

tags | advisory, remote, denial of service, vulnerability
SHA-256 | 42d46c7a7fbdcf02338f099cde864377864379a43e501bd4158132aba1fa01dc
aim.v5-overflow.txt
Posted Oct 21, 2003
Authored by AngryB | Site digitalpranksters.com

AOL Instant Messenger prior to v5.5.3415 contains a buffer overflow in the CCertsByUserName::Cleanup() function which can lead to remote code execution. Can be exploited via HTML web pages or email via long aim: URIs. Fix available here.

tags | advisory, remote, web, overflow, code execution
SHA-256 | 658bc232448de8aa479f016c69377dec0c4df2e3dc1edc3e917f281631ca4178
Different Uses Of Proxies
Posted Oct 21, 2003
Authored by fris

Proxies by Fris - Documents different uses of proxies, proxy related software, and IP ranges.

tags | paper
SHA-256 | 680c7006ca1f36118af72c2255491223671740387b59e1579136275734c4985d
deskpro.sql.txt
Posted Oct 21, 2003
Authored by Aviram Jenik | Site securiteam.com

DeskPRO v1.1.0 and below do not adequately filter user provided data, allowing a remote attacker to insert malicious SQL statements into existing ones. Allows attackers to login to the system as an administrator without knowing the password.

tags | exploit, remote
SHA-256 | 983ccb3475e6d82e382857c1d96466127ac14546a3310ec3ddb85f10f737178d
ntbindshell.zip
Posted Oct 21, 2003
Authored by Christophe Devine

Ntbindshell is a lightweight (24k compiled) cmd.exe backdoor for Windows. Full C source included. Provides two modes of operation - standard (listening mode) or reverse-connect mode. Includes the ability to install itself as a system service, providing a shell with LocalSystem privileges.

tags | tool, shell, rootkit
systems | windows, unix
SHA-256 | 899ef5eaa62de197df74c60aa27e94f9f84b18f384f3eaa0a52cc07eb0ef9ce4
realone.tempfiles.txt
Posted Oct 21, 2003

RealOne Player v1, v2, Enterprise Desktop, and Desktop Manager, and RealOne for OS X all contain tempfile vulnerabilities allowing malicious local users to escalate their privileges by manipulating URLs or embedding scripts when RealOne launches the default browser. More information available here.

tags | advisory, local, vulnerability
systems | apple, osx
SHA-256 | 09826df6449dbec705262c498b3ea583bd519f6074f2fe41812f7380fc5249ae
redfang.2.5.tar.gz
Posted Oct 21, 2003
Authored by Ollie Whitehouse | Site atstake.com

Redfang v2.5 is an enhanced version of the original application that finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the device's Bluetooth address and doing a read_remote_name().

Changes: Code was streamlined, enumerates service information, and supports multiple threads for substantial speed gains using multiple devices (maximum theoretical limit of 127 USB devices). Tested on Linux. More information available in the paper War Nibbling - Bluetooth Insecurity. .
tags | tool, wireless
SHA-256 | 7cf45008810ca894b085ae0eb1a0071f0cb6989dd9ce35cfcd617fedf7018c7f
geeklog-1.3.8.txt
Posted Oct 21, 2003

Geeklog v1.3.8 and below contains a SQL injection vulnerability allowing malicious users to change passwords on arbitrary users. Fix available here.

tags | advisory, arbitrary, sql injection
SHA-256 | f4ee9373590cb6d8633e3248d2a3a4fc32f197cea472b03b6dc1968bd6294f8d
cpCommerce.txt
Posted Oct 21, 2003

cpCommerce v0.5f and below contains an input validation error in _functions.php which allows remote arbitrary code execution. Fix available here.

tags | advisory, remote, arbitrary, php, code execution
SHA-256 | 38a5f115f7ff25fa54a8cbaece68467108a84c1f858b98478337d930a03652d9
Atstake Security Advisory 03-10-20.1
Posted Oct 21, 2003
Authored by Atstake, Jesse Burns | Site atstake.com

Atstake Security Advisory A102003-1 - Opera v7.20 and below contains a heap overflow when parsing HREFs with illegally escaped server names, allowing remote code execution via email or malicious web page. Fix available here. Tested against Windows XP and Linux.

tags | remote, web, overflow, code execution
systems | linux, windows
SHA-256 | 47be7130d5351ee1e6a51c87a74d5a02b3e5f28749ce4d47d3f097a00a9f49bd
bytehoard.traversal.txt
Posted Oct 21, 2003
Site secunia.com

Bytehoard prior to version 0.7 contains a remote directory traversal vulnerability which allows file access. Fix available here.

tags | advisory, remote
SHA-256 | 760815350b650ce7eb514ab12b531b4c537b4bedcea9a916151c97bbdecab0de
fetchmail.6.24.dos.txt
Posted Oct 21, 2003
Site secunia.com

Fetchmail v6.24 and below contains a remote denial of service vulnerability which can be exploited by sending a specially crafted email. Fix available here.

tags | advisory, remote, denial of service
SHA-256 | e79612b16d2c2e8069f5a46e09f2cbb86dd22b2c2310ff8597675222ee5ca969
gEEk-fuck-khaled.c
Posted Oct 21, 2003
Authored by Blasty | Site geekz.nl

mIRC v6.1 and below remote exploit which takes advantage of the bug described in mirc61.txt. Creates a HTML file which overflows the irc:// URI handling, spawning a local cmd.exe window. The exploit works even if mIRC is not started - The HTML can be in a HTML email or on a web page. Tested against Windows XP build 2600.xpclient.010817-1148.

tags | exploit, remote, web, overflow, local
systems | windows
SHA-256 | 4cd0bf42beaab24a9681b6932162eb72775c3439db6704c72c2c8e2f9991b043
ms03-043.c
Posted Oct 21, 2003
Authored by LSD

Remote denial of service exploit for the Microsoft Messenger service buffer overflow described in ms03-043 which causes the target machine to reboot. Includes the ability to send the packet from a spoofed source address and requires the remote netbios name. Tested against Windows 2000 SP4.

tags | exploit, remote, denial of service, overflow, spoof
systems | windows
SHA-256 | e48b844bc994ff34f0e2029f0cb487338b88afdd156b72483f465c14da1a3d48
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close