exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 78 RSS Feed

Files

aix-heap.pdf
Posted Dec 18, 2005
Authored by David Litchfield | Site ngssoftware.com

Whitepaper entitled 'An Introduction To Heap Overflows On AIX 5.3L'.

tags | paper, overflow
systems | aix
SHA-256 | 7fe6d39248e544c8e5b6ebe39fa4a017668634c3582f64b4ab78f3a53fbf39b8

Related Files

AIX 5.3L libc Buffer Overflow
Posted Nov 17, 2020
Authored by Hacker Fantastic

AIX version 5.3L libc local environment handling local root exploit. The AIX 5.3L (and possibly others) libc is vulnerable to multiple buffer overflow issues in the handling of locale environment variables. This allows for exploitation of any setuid root binary that makes use of functions such as setlocale() which do not perform bounds checking when handling LC_* environment variables. An attacker can leverage this issue to obtain root privileges on an impacted AIX system. This exploit makes use of the "/usr/bin/su" binary to trigger the overflow through LC_ALL and obtain root.

tags | exploit, overflow, local, root
systems | aix
SHA-256 | 417e782bbe7c2cf1c638ceb5b8df48574778d0daeec6b31fde12bdc697f1dde1
AIX 5.3L /usr/sbin/lquerypv Local Root Privilege Escalation
Posted Nov 16, 2020
Authored by Hacker Fantastic

AIX version 5.3L /usr/sbin/lquerypv local root privilege escalation exploit.

tags | exploit, local, root
systems | aix
SHA-256 | 0897775bf394074a0899890bf9b6b3c6e0a4fdb790821736714ba4384b53bd9c
HackBack - A DIY Guide For Those Without The Patience To Wait For Whistleblowers
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide for those without the patience to wait for whistleblowers.

tags | paper
SHA-256 | 8a4bf253d346e6edb5debbc3d0af1853e0c2c708d9b3c1a2b28a8685f580d674
HackBack - A DIY Guide, Spanish Version
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide. Written in Spanish.

tags | paper
SHA-256 | cd9224d9caca3f6b88269980123d5374486f1353fbc9efb50253557b2a53a6c0
HackBack - A DIY Guide
Posted Apr 26, 2017
Authored by Phineas Fisher

Whitepaper entitled HackBack - A DIY Guide.

tags | paper
SHA-256 | 13106443a0101118a7a673f7eab1962e92e195d9d493092b209fc627e5dc9db6
AIX 5.3 / 6.1 / 7.1 / 7.2 lquerylv Local Root
Posted Nov 4, 2016
Authored by Hector X. Monsegur

This exploit takes advantage of known issues with debugging functions within the AIX linker library. It takes advantage of known functionality, and focuses on badly coded SUID binaries which do not adhere to proper security checks prior to seteuid/open/writes.

tags | exploit
systems | aix
SHA-256 | d21d10df2cfdef2edda230cf874c57b4ad9963ec7cc4c0c55f438103a6d3725c
AIX 6.1 / 7.1 / 7.2.0.2 lsmcode Local Root
Posted Nov 4, 2016
Authored by Hector X. Monsegur

AIX versions 6.1, 7.1, and 7.2.0.2 lsmcode local root exploit.

tags | exploit, local, root
systems | aix
advisories | CVE-2016-3053
SHA-256 | bf3e83aa09cc8aa3291c39d62e561c7bce0ae117171ff19a6b828b29da6e7d8d
AIX5l FTP Server Remote Root Hash Disclosure
Posted Jul 20, 2010
Authored by Kingcope

AIX5l with FTP server remote root hash disclosure exploit. Creates a coredump including the root user hash from /etc/security/passwd.

tags | exploit, remote, root
SHA-256 | ffcd4f4babc007df54a8c30b68c543ca31700ab2e57bbd47c9d45f7258140368
IBM AIX 5.6/6.1 File Overwrite
Posted Sep 11, 2009
Authored by Marco Ivaldi

IBM AIX versions 5.6 and 6.1 _LIB_INIT_DBG arbitrary file overwrite via libc debug.

tags | exploit, arbitrary
systems | aix
SHA-256 | 7f054254bca5207953d6b438ec277152539965bd3ee3d193b3a690ceeb72fe4f
Whitepaper - Short Review Of Modern Vulnerability Research
Posted Jan 12, 2009
Authored by Michal Bucko | Site eleytt.com

Whitepaper entitled Short Review Of Modern Vulnerability Research.

tags | paper
SHA-256 | 50f3d7b703ae7599064134dd9771cdf630e1cfeb90294a067782e794b36e361e
fsharp-reverse.pdf
Posted Dec 3, 2008
Authored by Aodrulez | Site aodrulez.blogspot.com

Whitepaper entitled Reverse Engineering Microsoft F#.

tags | paper
SHA-256 | 4edaef63057c44d9b10082e158d32fd91f25f4a3c1b2b8aa6710a53a6e1909a0
format-string-linux.txt
Posted Nov 29, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Format String Exploitation Demonstration [LINUX].

tags | paper
systems | linux
SHA-256 | 915519f063cd8236fa2caaa14c2c8889ec51bdd79b0d0f3cd8fe31c44d60ccd5
frame-pointer-overwrite-linux.txt
Posted Nov 29, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Frame Pointer Overwrite Demonstration [LINUX].

tags | paper
systems | linux
SHA-256 | 48ec50a815d6f4578f50c4fe6f040b3db9d46a1b0033540beaac9b8253b52617
java2-malware.pdf
Posted Nov 20, 2008
Authored by Aodrulez | Site aodrulez.blogspot.com

Whitepaper entitled Java 2 Micro Edition (J2ME or Java ME) Based Computer Malware Propagation Technique.

tags | paper, java
SHA-256 | 33dd9cf75d17e73d0b9c873025e3dd464002ef35b74dc38578987a00ee29000d
exploration.pdf
Posted Nov 12, 2008
Authored by Xylitol | Site xylitol.free.fr

Whitepaper entitled Exploration In The Cross Territory, a follow up paper to the Cross Site Scripting - Attack and Defense Guide.

tags | paper, xss
SHA-256 | 22261dd7d0353e4a08f864b8638db726e06e08be483dedd672758a6b6ec89362
domain-traversal.pdf
Posted Nov 9, 2008
Authored by hkm

Whitepaper entitled Using Parent Domain Traversal In Drive By Attacks.

tags | paper, file inclusion
SHA-256 | d4d787c3d1f2cecfefafa05d2971a62b461e882fb8960cf9235ced39cfdd1187
file_sharing_security.pdf
Posted Nov 8, 2008
Authored by Francis Corella | Site pomcor.com

Whitepaper entitled Protecting A Web Application Against Attacks Through HTML Shared Files.

tags | paper, web
SHA-256 | a332ffa53a93ffea3c43a63213809c1bc705467514a6098021161dd8468c04fb
banking-flaws.pdf
Posted Nov 4, 2008
Authored by webDEViL

Whitepaper entitled Internet Banking Flaws In India.

tags | paper
SHA-256 | 5403ce64147576e2b9225daa755cef18daa6b1ff8d992b74520e6ce3ce3df920
appOSfingerprint.txt
Posted Oct 30, 2008
Authored by Dan Crowley

Whitepaper entitled Advanced application-level OS fingerprinting: Practical approaches and examples.

tags | paper
SHA-256 | e7bbfb46c5d92567d485f28a4014af6d68fc50ef1c5709b2306ba11e36be0d3d
SNMP_injection.pdf
Posted Oct 22, 2008
Authored by Adrian Pastor | Site procheckup.com

Whitepaper entitled SNMP Injection - Achieving Persistent HTML Injection via SNMP on Embedded Devices.

tags | paper
SHA-256 | ace95e6e015bcde9714bec5eb0612843f605b3cd71d3b207aaadcab78367c8ad
2008-esorics.pdf
Posted Oct 22, 2008
Authored by flaviog, petervr, ronny, bart, gkoningg, rmuijrer, rverdult

Whitepaper entitled Dismantling MIFARE Classic, the contactless smart card used extensively in access control for office buildings, payment systems, etc.

tags | paper
SHA-256 | 1a1cb91384293343bae8c16815274210db3d6cad2532fb4706551e54f0cece94
fuzzing-auatfb.pdf
Posted Oct 21, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Whitepaper entitled Fuzzing: A Useful Approach to Finding Bugs.

tags | paper
SHA-256 | 9c907cb0d0124b9ee8e6d11b1d8c18b22f0c23181a1bd6ffb8ffffe1f6c43c74
Detecting_and_Exploiting_ActiveX_Controls.pdf
Posted Oct 20, 2008
Authored by Shahriyar Jalayeri

Whitepaper entitled Detecting and Exploiting Vulnerabilities in ActiveX Controls. Written in Farsi.

tags | paper, vulnerability, activex
SHA-256 | a55486b2ef8323dff122d471481f484a8d72623c271a349cd0b318f55b96ca82
xenfb-adventures-10.pdf
Posted Oct 16, 2008
Authored by Rafal Wojtczuk

Whitepaper entitled Adventures with a certain Xen vulnerability (in the PVFB backend).

tags | paper
advisories | CVE-2008-1943
SHA-256 | dc2c1f613ed2294698e11fed5a558cda1fc7acdf157f9e6e5393eec8a6b2f4d5
Biologger - A Biometric Keylogger Whitepaper
Posted Sep 7, 2007
Authored by Matthew Lewis | Site irmplc.com

Whitepaper entitled "Biologger - A Biometric Keylogger". This paper discusses using a "Biologger" to capture biometric data and replaying the data via man-in-the-middle attacks.

tags | paper
SHA-256 | 010e9e56816a4de2b35f1a93bdbb54a1d370d7e78a1e3ff111d25a262eecca0e
Page 1 of 4
Back1234Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close