exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2003-12-30 to 2003-12-31

pcds
Posted Dec 30, 2003
Authored by Bart Somers | Site doornenburg.homelinux.net

pcds is a Perl script written to monitor processes on a system and report changes.

tags | perl
systems | unix
SHA-256 | 5f198c35bda7d05c078a7a683a87be3ceb477bc374af209b621c46a0a2c6e406
env_audit-2.0.tar.gz
Posted Dec 30, 2003
Authored by Steve Grubb | Site web-insights.net

Env_audit is a program that ferrets out everything it can about the environment. It looks for process IDs, UID, GID, signal masks, umask, priority, leaked file descriptors, and environmental variables. It comes with test configurations for anacron, Apache, atd, crond, GDB, inittab, logrotate, PHP, pppd, procmail, rsh, rxvt, Sendmail, SSH, stunnel, sudo, xinetd, and xterm.

tags | php
systems | unix
SHA-256 | 2ded505c9776412372ae67832707fe5e29399cee84b389c485c1bfc340a0fe2c
firewall-jay-1.0.3.tar.gz
Posted Dec 30, 2003
Authored by Jerome Nokin | Site firewall-jay.sourceforge.net

Jay's Iptables Firewall is a bash script that allows one to easily install and configure a firewall on a Linux system. It features support for multiple interfaces, TCP/UDP/ICMP control, masquerading, synflood control, spoofing control, port forwarding from specific interfaces, VPNs, ToS, denying hosts by IP or MAC address, ZorbIPTraffic, Spyware list IP, Pre/Post scripts, log options, and more. The firewall is able to launch custom iptables rules, and the configuration of the firewall is assisted by an optional, interactive, curses-based Perl script.

tags | tool, udp, perl, spoof, tcp, firewall, bash
systems | linux
SHA-256 | 7cebbf7fd1aa9923bb8d2fa34d7818752a7195080fb0c036e19ab4e96350b332
init_rpi.txt
Posted Dec 30, 2003
Authored by Christophe Devine

Whitepaper detailing how to successfully patch the linux kernel in order to allow ptracing /sbin/init, and subsequently inject a connect-back shellcode into the target process. Patch code included.

tags | paper, kernel, shellcode
systems | linux, unix
SHA-256 | 8f53ec04bcff41e9accc09e517f1377b092c491fe8ae8d1ad5bb913474b9c162
showexp.txt
Posted Dec 30, 2003
Authored by Arman Nayyeri

Exploit code that makes use of the showHelp() vulnerability found in Microsoft Explorer versions 5.x-6.0. This file must be renamed with a .html extension to work.

tags | exploit
SHA-256 | df1ca6fa1d9d5d0313b50e8210ed14c64f175b0dd2ee7b9c9100c8e99159e329
ie_showHelp.txt
Posted Dec 30, 2003
Authored by Arman Nayyeri

A flaw exists in Microsoft Internet Explorer 5.x-6.0 that allows a remote attacker to execute a file using chm in showHelp().

tags | advisory, remote
SHA-256 | 74dacbfe84a67a971cd82b2d9a84831f67dbb9786abc754990bc01ccd23a36b1
gallery133.txt
Posted Dec 30, 2003
Authored by The-Insider | Site theinsider.deep-ice.com

Gallery versions 1.3.3 and below suffer from a cross-site scripting vulnerability in its searching functionality.

tags | exploit, xss
SHA-256 | 3b40870b0304d5f379e4c14f009bb9a9df94a16511285d52a426f305dbde5f76
phpping.txt
Posted Dec 30, 2003
Authored by ppp-design | Site ppp-design.de

php-ping improperly filters user inputs, allowing for a malicious remote attacker to execute arbitrary commands as the webserver uid.

tags | exploit, remote, arbitrary, php
SHA-256 | eb4c1e1ec0ead88df0513af866db209a8221dfe268483b81a69311c05b77cf3a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close