Exploit the possiblities
Showing 1 - 10 of 10 RSS Feed

Files

Arabic Names Dictionary
Posted May 10, 2011
Authored by g33ko

This file contains two wordlists with both male and female Arabic names. Together there are over 1800 entries.

tags | cracker
MD5 | 53a9b12373d92434e73a6c121ff7c4f6

Related Files

ZeroShell Remote Code Execution
Posted Sep 25, 2013
Authored by Yann CAM | Site metasploit.com

This Metasploit module exploits a vulnerability found in ZeroShell 2.0 RC2 and lower. It will leverage an unauthenticated local file inclusion vulnerability in the "/cgi-bin/kerbynet" url. The file retrieved is "/var/register/system/ldap/rootpw". This file contains the admin password in cleartext. The password is used to login as the admin user. After the authentication process is complete it will use the RunScript action to execute the payload with root privileges.

tags | exploit, local, cgi, root, file inclusion
MD5 | 6aca173027c40771cf3490070e12b3b4
D-Link DAP 1150 Cross Site Request Forgery
Posted Mar 9, 2013
Authored by MustLive

This file contains multiple cross site request forgery proof of concepts for old issues associated with the D-Link DAP 1150.

tags | exploit, proof of concept, csrf
MD5 | de52b08a9e9c0574a393ae389926bc30
Hacking IPv6 Networks
Posted Jul 26, 2011
Authored by Fernando Gont

This file contains slides for the "Hacking IPv6 Networks" training provided at Hack in Paris 2011. They contain quite a few insights about IPv6 security, along with a number of practical examples.

tags | paper
MD5 | af9084e0f7f6d96d006da7ee6e4665e1
Wireshark LDSS Dissector Buffer Overflow
Posted Dec 5, 2010
Authored by Nephi Johnson

Wireshark is prone to a buffer overflow vulnerability. Exploiting this issue may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. This issue affects Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1. This file contacts a pcap that is a proof of concept exploit.

tags | exploit, overflow, arbitrary, proof of concept
MD5 | 14ce9fe977645c1fd538336019d55664
Zero Day Initiative Advisory 10-225
Posted Oct 28, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-225 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the rdPageImlogic.aspx page which is exposed through an IIS extension on the default web server port. By setting the 'rdReport' argument to the value 'DetailReportGroup' an attacker can force the server to load the DetailReportGroup.lgx definition file. This file contains SQL injections within multiple parameters. An attacker can abuse this to inject arbitrary SQL statements to be evaluated by the back-end database.

tags | advisory, remote, web, arbitrary, sql injection
advisories | CVE-2010-0112
MD5 | 37bec08063f88a2fdde485cc358b4cdb
Zero Day Initiative Advisory 10-224
Posted Oct 28, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-224 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the rdpageimlogic.aspx page which is exposed through an IIS extension on the default web server port. By setting the 'rdReport' argument to the value 'SummaryReportGroup' an attacker can force the server to load the SummaryReportGroup.lgx definition file. This file contains multiple SQL injections within the following parameters: 'selclause', 'whereTrendTimeClause', 'TrendTypeForReport', 'whereProtocolClause' and 'groupClause'. An attacker can abuse this to inject arbitrary SQL statements to be evaluated by the back-end database.

tags | advisory, remote, web, arbitrary, sql injection
advisories | CVE-2010-0112
MD5 | ed60abf690fd4e96118028dda82dfdf6
Zero Day Initiative Advisory 10-223
Posted Oct 28, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-223 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec IM Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the rdpageimlogic.aspx and rdPage.aspx pages which is exposed through an IIS extension on the default web server port. By setting the 'rdReport' argument to the value 'LoggedInUsers' an attacker can force the server to load the LoggedInUSers.lgx definition file. This file contains multiple SQL injections within the following parameters: 'loginTimeStamp', 'dbo', 'dateDiffParam' and 'whereClause'. An attacker can abuse this to inject arbitrary SQL statements to be evaluated by the back-end database.

tags | advisory, remote, web, arbitrary, sql injection
advisories | CVE-2010-0112
MD5 | f63dbe4a2ccced8fc8157789ecdec03d
bugtraqworm.tgz
Posted Sep 16, 2002

Linux Slapper Worm - This file contains the binaries and source code for the current Apache worm which affects multiple versions of Linux. It exploits an OpenSSL buffer overflow to run a shell on the remote system and also contains the ability to perform a DDoS attack. These files were found in the wild from machines that had been compromised.

tags | exploit, worm, remote, overflow, shell
systems | linux
MD5 | fc2a65953a4b98971888d9b5df4d1c53
FreeBSD Security Advisory 2002.2
Posted Jan 8, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:02 - When creating, removing, or modifying system users, the pw utility modifies the system password file '/etc/master.passwd'. This file contains the users' encrypted passwords and is normally only readable by root. During the modification, a temporary copy of the file is created. However, this temporary file is mistakenly created with permissions that allow it to be read by any user. A race condition is created.

tags | root
systems | freebsd
MD5 | 17ba2012de0e3fd6cc0c8941f017d085
expgen085.zip
Posted Aug 17, 1999

Aggressor: Exploit Generator 0.85 - Includes Smurf3 / Land / Suffer / Boink / Spoofed OOB / Nestea / Packet Builder (TCP) and PortScan. For Windows 95/98. Notice: McAffee has confirmed that thier virus scanner reports this file as a trojan because it contains common hacker tools often installed on owned systems. This serves to notify people who have been hacked and does not mean that this file contains malicious code.

tags | denial of service, trojan, spoof, tcp, virus
systems | windows, 9x
MD5 | f3159609329c87e2f3deca33be25dc7c
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    28 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close