Exploit the possiblities
Showing 26 - 50 of 329 RSS Feed

Operating System: BSD

BSD telnetd Remote Root
Posted Jul 2, 2012
Authored by Kingcope

This is a BSD telnetd remote root exploit supposedly stolen from Kingcope and posted on mailing lists.

tags | exploit, remote, root
systems | bsd
MD5 | 29799d7c2341467826d9630af8e55fa8
Intercepter-NG Console Edition 0.1
Posted Jun 3, 2012
Authored by Ares | Site sniff.su

Intercepter-NG [Console Edition] is a sniffer that offers various capabilities including sniffing for password hashes related to ORACLE/MYSQL/VNC/NNTP/CVS/WWW/HTTP/SOCKS/MRA/FTP/POP3/SMTP/IMAP/LDAP/AIM. It works on NT/Linux/BSD/IOS/Android and is optimized for screen size 80x30 or higher.

tags | tool, web, sniffer, imap
systems | linux, bsd, apple
MD5 | 59d425358d2c05263fbf2efed0ceca04
BSD/x86 execve ('/bin/sh -c "/etc/master.passwd"') setreuid(0,0) Shellcode
Posted Jan 16, 2012
Authored by KedAns-Dz

94 bytes small BSD/x86 execve ('/bin/sh -c "/etc/master.passwd"') setreuid(0,0) shellcode.

tags | x86, shellcode
systems | bsd
MD5 | 35d2e60bbb98af3759a63f4c86856215
Linux BSD-derived Telnet Service Encyption Key ID Buffer Overflow
Posted Dec 28, 2011
Site metasploit.com

This Metasploit module exploits a buffer overflow in the encryption option handler of the Linux BSD-derived telnet service (inetutils or krb5-telnet). Most Linux distributions use NetKit-derived telnet daemons, so this flaw only applies to a small subset of Linux systems running telnetd.

tags | exploit, overflow
systems | linux, bsd
advisories | CVE-2011-4862
MD5 | 6bb45171cd21fa08abdff35e8c0ff6fe
Debian Security Advisory 2375-1
Posted Dec 26, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2375-1 - It was discovered that the encryption support for BSD telnetd contains a pre-authentication buffer overflow, which may enable remote attackers who can connect to the Telnet port to execute arbitrary code with root privileges.

tags | advisory, remote, overflow, arbitrary, root
systems | linux, bsd, debian
advisories | CVE-2011-4862
MD5 | be0b34d6d233f7dec65895ced8314c08
libdvdcss 1.2.11
Posted Nov 16, 2011
Site videolan.org

libdvdcss is a cross-platform library for transparent DVD device access with on-the-fly CSS decryption. It currently runs under Linux, FreeBSD, NetBSD, OpenBSD, BSD/OS, Solaris, BeOS, Win95/Win98, Win2k/WinXP, MacOS X, HP-UX, QNX, and OS/2. It is used by libdvdread and most DVD players such as VLC because of its portability and because, unlike similar libraries, it does not require your DVD drive to be region locked.

Changes: This release improves RPC-II drive handling and contains a more robust keys retrieval mode. It also introduces fixes for MingW and OS/2 compilation, and has various bugfixes for small issues, memory leaks, crashes, and build issues.
tags | library
systems | linux, netbsd, windows, 2k, 9x, unix, solaris, freebsd, bsd, openbsd, hpux, beos, osx, xp
MD5 | 048134d398b4372a21ae304b9a9fa70b
Firewall Log Watch 1.3
Posted Nov 15, 2011
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

Changes: This release adds IPv6 support for netfilter, dns cache initialization, and ASA parser extensions.
tags | tool, web, firewall
systems | cisco, linux, unix, solaris, irix, bsd, hpux
MD5 | fbb652f8bc9fd7b74c450b09def52234
BSD libc/regcomp(3) Memory Management / Recursion
Posted Nov 4, 2011
Authored by Maksymilian Arciemowicz

Recursion and bad memory management in BSD's libc/regcomp(3) can cause denial of service conditions.

tags | exploit, denial of service
systems | bsd
advisories | CVE-2011-3336
MD5 | b6c9f72bbcc0eb05bf0fe4ff6c3e7f9a
BSD IPcomp Kernel Stack Overflow Testcase
Posted Apr 1, 2011
Authored by Tavis Ormandy

This exploit demonstrates the BSD IPComp kernel stack overflow testcase.

tags | exploit, overflow, kernel
systems | bsd
advisories | CVE-2011-1547
MD5 | 88f7f652d4cc378e96ace171cda32ce3
BSD IPComp Expansion Of Arbitrary Nested Payload
Posted Apr 1, 2011
Authored by Tavis Ormandy

BSD derived RFC3173 IPComp encapsulation will expand an arbitrarily nested payload.

tags | advisory
systems | bsd
advisories | CVE-2011-1547
MD5 | e052d627155cacc1f1bd3a6542dbe443
Firewall Log Watch 1.2
Posted Oct 11, 2010
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

Changes: This release features extended netfilter and Cisco PIX/ASA parsers and large amounts of fixes.
tags | tool, web, firewall
systems | cisco, linux, unix, solaris, irix, bsd, hpux
MD5 | 7700443f706a90922245895e06c30d7b
Unixasm Assembly Components 1.4.0
Posted May 25, 2010
Authored by Ramon de C Valle | Site risesecurity.org

A collection of shellcodes for various platforms such as bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.

Changes: Added support to AIX Versions 6.1.4, 6.1.3, 6.1.2, 6.1.1, 5.3.10, 5.3.9, 5.3.8, 5.3.7. Changed the base value used for calculating the system call numbers and arguments to avoid null bytes in newer versions of AIX.
tags | x86, shellcode, proof of concept
systems | linux, solaris, bsd
MD5 | 60a76fdf12cb7a857ec72598b222d90c
Apple 10.6.3 chpass BSD Insecure Temp File Creating In /etc
Posted May 19, 2010
Authored by prdelka | Site prdelka.blackart.org.uk

Apple Mac OS X versions 10.6.3 and below suffer from a chpass BSD insecure temp file creation in /etc vulnerability. A user can create a file with rw perms in /etc as owner and populate it with arbitrary data. This could be utilized to fill the disk or write configuration file information that could be combined with another flaw to elevate local privileges.

tags | exploit, arbitrary, local
systems | bsd, apple, osx
MD5 | 65bf96fd0c7c09a26da670a07518646e
167 Bytes BSD x86 Bindshell
Posted Apr 23, 2010
Authored by beosroot

167 bytes small BSD x86 bindshell shellcode that spawns on port 2525.

tags | x86, shellcode
systems | bsd
MD5 | 5749d099175d6a0ee006b76d5f53ec42
RealServer Describe Buffer Overflow
Posted Oct 27, 2009
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a buffer overflow in RealServer 7/8/9 and was based on Johnny Cyberpunk's THCrealbad exploit. This code should reliably exploit Linux, BSD, and Windows-based servers.

tags | exploit, overflow
systems | linux, windows, bsd
MD5 | 6094aa9a91491f3755f7e3cd2e7c367a
BSD libc strfmon Multiple Vulnerabilities
Posted Sep 19, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

BSD libc (strfmon) suffers from multiple vulnerability.

tags | advisory
systems | bsd
MD5 | c20c441ca23a560b88d2abff619b9b7e
BSD setusercontext Vulnerabilities
Posted Aug 23, 2009
Authored by Kingcope

Various BSD derived operating systems suffer from various vulnerabilities due to the setusercontext() function.

tags | exploit, vulnerability
systems | bsd
MD5 | efeeb1a6f08a38199a4a9d849fd51252
unixasm-1.3.0.tar.gz
Posted Nov 18, 2008
Authored by Ramon de C Valle | Site risesecurity.org

A collection of shellcodes for various platforms such as bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.

Changes: Some small bug fixes to AIX Power assembly components and payload modules. New assembly components and payload modules for AIX Power. New assembly components and payload modules for Linux Power/Cell Broadband Engine Architecture. New assembly components and payload modules for Linux Power/Cell Broadband Engine Architecture.
tags | x86, shellcode, proof of concept
systems | linux, solaris, bsd
MD5 | 4083bae1e65229922048b72f023ca139
vmware-guestescalate.txt
Posted Nov 8, 2008
Authored by Derek Soeder

By exploiting either of the VMware flaws described in this document, user-mode code executing in a virtual machine may gain kernel privileges within the virtual machine, dependent upon the guest operating system. The flaws have been proven exploitable on x64 versions of Windows, and they have produced potentially exploitable crashes on x64 versions of *BSD. The Linux kernel does not allow exploitation of these flaws on x64 versions of Linux.

tags | advisory, kernel
systems | linux, windows, bsd
advisories | CVE-2008-4279, CVE-2008-4915, CVE-2008-3890
MD5 | 27b8c7a5be29107cda604fa31f5e5ec5
vmware-emulation.txt
Posted Oct 6, 2008
Authored by Derek Soeder

By exploiting the VMware flaw described in this document, user-mode code executing in a virtual machine may gain kernel privileges within the virtual machine, dependent upon the guest operating system. The flaw has been proven exploitable on x64 versions of Windows, and it has produced potentially exploitable crashes on x64 versions of *BSD. The Linux kernel does not allow exploitation of the flaws on x64 versions of Linux.

tags | advisory, kernel
systems | linux, windows, bsd
advisories | CVE-2008-4279, CVE-2008-3890
MD5 | 9d308b99f74f10aaccfde19943b9cbc4
unixasm-1.2.0.tar.gz
Posted Sep 11, 2008
Authored by Ramon de C Valle | Site risesecurity.org

A collection of shellcodes for various platforms such as bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.

Changes: This new version includes new Network server code (bndsockcode), Network connect code (cntsockcode) and Find socket code (fndsockcode) assembly components for AIX POWER/PowerPC.
tags | x86, shellcode, proof of concept
systems | linux, solaris, bsd
MD5 | 21d668df5ccda18111116a361c67de33
ttyrpld-2.52.tar.bz2
Posted Sep 8, 2008
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Updated kernel components for Linux 2.6.27 and updated userspace code for libHX 1.25.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | 322674047f27652702ba35a196ca3c74
ttyrpld-2.51.tar.bz2
Posted May 19, 2008
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Updated rpldhk and rpldev for Linux 2.6.25, OpenBSD 4.3, FreeBSD 7.0, NetBSD 4.0.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | cc635d7f709c96115111b64185eaccf4
unixasm-1.1.0.tar.gz
Posted Feb 8, 2008
Authored by Ramon de C Valle | Site risesecurity.org

A collection of shellcode for various platforms bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.

tags | x86, shellcode, proof of concept
systems | linux, solaris, bsd
MD5 | 7acca0d1774b5bc17f886e2fbed28efb
ttyrpld-2.50.tar.bz2
Posted Jan 2, 2008
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Changed the packet format to be compatible between 32-bit and 64-bit. Added rplcvt utility. Explicit blacklists added.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | da3ca86e18f73f18030f92f8423d8000
Page 2 of 14
Back12345Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close