what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

linux.forged.packets.txt
Posted Oct 26, 1999
Authored by Marc Schaefer

Forged packets can be send out from a Linux system, for example for NFS attacks or any other protocol relying on addresses for authentification, even when protected from the outside interfaces by firewalling rules. Most of the time, existing firewalling rules are bypassed. This requires at least a shell account on the system.

tags | exploit, shell, protocol
systems | linux
SHA-256 | 8d159590c7c839774eb2f8a7c4dddf0737f16a6cf7e3d10393036232f45f5469

Related Files

linux_tolower_remote.S
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

Shellcode that execve() /bin/sh -c (user supplied command). Designed to evade tolower() and friends. requires %esio reference a valid writable address.

tags | shellcode
SHA-256 | a8d80a1d3e6ed93ff7cfffd2ef34670d800df5da4fe9ec2e25e4138b7a0bf1c7
Linux_Memory_Tools-0.2.tar.gz
Posted Oct 3, 2006
Authored by Pierre BETOUIN | Site securitech.homeunix.org

Linux Memory tools are a set of Linux tools (Python, C and ASM) which aim is to facilitate exploit development. These tools can be used to dump process memory, search for patterns and quickly find OPCODEs location addresses (instructions and mnemonics are functional but still in development). OPCODE search is possible on an instant memory snapshot or using a file dump. These tools are been quickly coded and should be considered as helpful scripts. Return addresses or shellcode locations can be found instantly.

tags | shellcode, python
systems | linux
SHA-256 | b563de74e1cda35f782a23fd14e98e36f0b0c04030335f5778d239a1c883e3e3
Linux_PerProcess_Syscall_Hooking.txt
Posted Aug 30, 2006
Authored by Pluf

This document describes a new syscall hooking technique for Linux systems and exposes how it can be implemented as part of a virus or a backdoor in order to take full control over an userland application. Although there are some well- known methods for hooking functions, they are mostly based on the ELF format itself. This technique is focused on those pieces of code that are externally called by the main program and invoke a system call or system service.

tags | paper, virus
systems | linux
SHA-256 | 30fdbdfab2efb4eab95a25eb94384d63a0a3f4af1470486ff3e9730bb54e262c
Openwall Linux Kernel Patch
Posted Aug 27, 2006
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Minimal changes.
tags | overflow, kernel
systems | linux
SHA-256 | 34d3033f6db61c7bbe1fe293e31ddc2ee847c21790e3d749333de4c2579842ee
linux_prctl_lkm.tar.gz
Posted Jul 14, 2006
Authored by Abhisek Datta

LKM based hotfix for the sys_prctl vulnerability in the Linux kernel 2.6 series.

tags | kernel
systems | linux
SHA-256 | dea5f15fd931a84aa2eecaf0c75f0f2a7c32f49764b25599b67206330611db97
Openwall Linux Kernel Patch
Posted Dec 3, 2005
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Minimal changes.
tags | overflow, kernel
systems | linux
SHA-256 | bef89e4d59252dc6292974f13587c0a88fbec212e15d455e4d4d2d27d188a956
Openwall Linux Kernel Patch
Posted Jun 18, 2005
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Minimal changes.
tags | overflow, kernel
systems | linux
SHA-256 | d0e51c10a398ac2345a217c0c2d573719f94a588438d740d8a713f4c6c4a844c
Openwall Linux Kernel Patch
Posted Jun 1, 2005
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: This version adds a fix to the ELF core dump vulnerability.
tags | overflow, kernel
systems | linux
advisories | CVE-2005-1263
SHA-256 | 00633e5f2a6f35002c0690c4639fb5536f58638c9b1cc221c2a1bee7fa20b7c4
linux-2.6.10.c
Posted Feb 18, 2005
Authored by Georgi Guninski | Site guninski.com

Linux v2.6.10 and below kernel exploit which allows non-privileged users to read kernel memory.

tags | exploit, kernel
systems | linux
SHA-256 | 64668cf27bf96d59d1d1f9aeceaa70ae1834d86bc88475e6ae009a8b38a70a8b
Openwall Linux Kernel Patch
Posted Jan 22, 2005
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Adds a number of security fixes, including to the x86/SMP page fault handler and the uselib(2) race conditions, both discovered by Paul Starzetz.
tags | overflow, kernel
systems | linux
advisories | CVE-2004-1235, CVE-2005-0001
SHA-256 | 517d8c63c913c0a9a9f1b1544de6318bdd18841356e2f3754beb64d4647dcc3c
Openwall Linux Kernel Patch
Posted Nov 24, 2004
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: 2.4.28-ow1 fixes a number of security-related bugs, including the local root ELF loader vulnerabilities discovered by Paul Starzetz, a race condition with reads from Unix domain sockets (potential local root), and smbfs support vulnerabilities discovered by Stefan Esser (remote DoS by a malicious smbfs server; potential: remote root by a malicious smbfs server).
tags | overflow, kernel
systems | linux
SHA-256 | 256cfa736b57ad57623917b4da7131b7ab1915c65a0a3f47a53ca2d186266ee0
Openwall Linux Kernel Patch
Posted Aug 14, 2004
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: New kernel, new patch.
tags | overflow, kernel
systems | linux
SHA-256 | 96446f971dcc88f7a2750e7cc1155cf3c71291042b99fa3ccf4376141487ceb5
Openwall Linux Kernel Patch
Posted Aug 10, 2004
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Corrects the access control check in the Linux kernel which previously wrongly allowed any local user to change the group ownership of arbitrary NFS-exported/imported files (CVE-2004-0497). Also adds a workaround for the file offset pointer races (CVE-2004-0415).
tags | overflow, kernel
systems | linux
advisories | CVE-2004-0497, CVE-2004-0415
SHA-256 | 93acccb9dfe362d3f5fe4bb7dac727680341d124ac1770799631c5005e47afe1
Openwall Linux Kernel Patch
Posted Mar 1, 2004
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Ported to kernel v2.2.26.
tags | overflow, kernel
systems | linux
SHA-256 | 67ef2ef429014c1ef695fb56e75765a196b282c57eee929e163c315a1a3ab75e
Openwall Linux Kernel Patch
Posted Jan 8, 2004
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Ported to kernel v2.4.24. Upgrade for users of linux-2.4.23-ow2 is not needed.
tags | overflow, kernel
systems | linux
SHA-256 | b575a8e739d48ad27b6b4dc9343c808e52914c5a74122670e3a75df2390e9386
Openwall Linux Kernel Patch
Posted Jan 6, 2004
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Fixes two newly discovered local root vulnerabilities in the mremap() system call. Ported to kernel v2.4.23.
tags | overflow, kernel
systems | linux
SHA-256 | ed2cf0f0331fa312c06bda8d7a5154da3f0532e142d13094457de775afb424fe
linux_chown_chmod_shellcode.c
Posted Dec 29, 2003
Authored by n2n

43-byte linux x86 shellcode which does the following: setuid(0);chown("/tmp/n2n",0,0);chmod("/tmp/n2n", 04755);exit();

tags | x86, shellcode
systems | linux
SHA-256 | c9cfe186139032a40d3f9ddb38c191be71b284f24d4febdc1da027d250896d17
linux_kernel_do_brk.pdf
Posted Dec 5, 2003
Authored by Paul Starzetz | Site isec.pl

Whitepaper discussing the do_brk() bug found in the Linux kernel versions 2.4.22 and below.

tags | paper, kernel
systems | linux
SHA-256 | f9441924d1d758b7d9e9169cafe1da43fefef7a64c59926ec655dab9173e8bdc
Openwall Linux Kernel Patch
Posted Dec 1, 2003
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Ported to kernel v2.2.25.
tags | overflow, kernel
systems | linux
SHA-256 | 1cb5559ce2f9b37a2da3e63dc97647d133b72a1a11ce3f0299136a23683955a0
linux_chmod_shell.c
Posted Nov 27, 2003
Authored by r3b00t | Site r3b00t.tx.pl

Linux/x86 shellcode that performs a chmod of 4777.

tags | x86, shellcode
systems | linux
SHA-256 | 21f2087e480420ecfc1a29131d4e4f7d9ae013c5ba5f9bf03b7b9ca6cdcf21fe
linux_forking_bind.c
Posted Mar 7, 2003
Authored by eSDee | Site netric.org

Linux x86 200 byte forking portbind shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 8596f6bc924b6a977ba4454ed405e1eae9f64cab5c9f56b54386872551a9c83e
Openwall Linux Kernel Patch
Posted Dec 5, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Ported to kernel v2.2.23.
tags | overflow, kernel
systems | linux
SHA-256 | d9f86921943b75b9e6e55ae75900ebf3a6871614561374f587e8c28663e27582
linux-2.2.22-ow2.tar.gz
Posted Nov 27, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Linux 2.2.22-ow2 improves the "lcall" DoS fix for the Linux kernel to cover the NT (Nested Task) flag attack discovered by Christopher Devine.
tags | overflow, kernel
systems | linux
SHA-256 | ed4fb0b394f06d364b96efdd261fc0f134af62fa8d51f8c903e292c39a92cdf5
Openwall Linux Kernel Patch
Posted Sep 20, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Updated for Kernel v2.2.22.
tags | overflow, kernel
systems | linux
SHA-256 | 528bce1080424a31cd75d58767c939449c114e6a662d62e98ae74c66a1129bcd
linux-2.2.22-brfw.diff.gz
Posted Sep 20, 2002
Authored by Sean Trifero | Site innu.org

The Bridge Filter kernel patch for v2.2.22 creates a new built-in chain you can use to filter packets before the bridge. The Linux firewall and bridge functions work well but you can't filter exactly which packets are bridged. The main goal of this patch is to allow this capability.

Changes: Ported to Kernel v2.2.22.
tags | kernel, patch
systems | linux, unix
SHA-256 | e3d51abe7aa586c9876430bbb9e8618e9a1234c9c5cdf10823e44ead73c67068
Page 2 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close