Twenty Year Anniversary
Showing 1 - 25 of 100 RSS Feed


Posted Sep 22, 2006
Authored by Cody "CypherXero" Rester | Site

Wordlist taken from the book "1984" by George Orwell.

tags | cracker
MD5 | ec91ba6a2d691d7029d08ebbd1025cf2

Related Files

Posted Jan 3, 2008
Authored by w00w00

w00w00's operating system. Yes, a joke.

MD5 | 7b03569337d70874d4142ceeb10bdadd
Posted Aug 26, 2002
Authored by Maniac

This little program opens as many sockets with a remote host as can be supported by both. It catches ^C and kill commands to shut down cleanly by closing all open connections before exiting. Often, a remote workstation can be brought to its knees by saturating its process table via multiple invocations of sendmail. That's why port 25 (the sendmail port) is the default. If the target's process table (set when the target kernel was created) is filled, users will be unable to execute any shell commands. Many MUDs also crash when the number of sockets they have open exceeds a certain number. This program will put stress on MUDs by testing their limits. If a limit is reached, the MUD will either crash or will refuse to let new users log in. * The program is incomplete, in that it doesn't check for socket timeouts and subsequently reuse timed out sockets. That means the program can only keep a remote host / mud locked up until it exhausts its own available new sockets, or until it has reached MAX_DESCRIPTORS remote connections as set by the #define statement. * If the local machine starts issuing error messages, then the program has failed to saturate the remote host and has instead reached the limits of the local machine. Use ^C or the kill command to terminate it. If you are knowledgable about rebuilding kernels and have access to the root account, you can build a special kernel that will allow you to reach a much larger number of open sockets.

tags | remote, denial of service, shell, kernel, local, root
MD5 | 57f5e537c9adc5964995189dee2618d0
Posted Jan 2, 2002
Authored by twlc

twlc logo

MD5 | 829f9581dc84503bb015f3a8fddd927e
Posted May 22, 2000
Authored by proyecto-r

tags | magazine
MD5 | f3dd4498769b1da00333963bb2471dbd
Posted May 22, 2000
Authored by proyecto-r

tags | magazine
MD5 | 0ce948f8c912117fd90a619e2d8b6dab
Posted May 22, 2000
Authored by proyecto-r

tags | magazine
MD5 | 77da16cec8c37cbd135647ccbad4be31
Posted May 22, 2000
Authored by proyecto-r

tags | magazine
MD5 | 2db8e860aa1f0ba496f1ec03c073c0a4
Posted May 22, 2000
Authored by proyecto-r

tags | magazine
MD5 | 05b7e226d46066bc5f37024dae75786c
Posted May 22, 2000
Authored by proyecto-r

tags | magazine
MD5 | 7712468359ed26815e08d05c7f875ecd
Posted May 22, 2000
Authored by proyecto-r

tags | magazine
MD5 | 6d82b7bd94d290ba2c0b53f45c570a3d
Posted May 22, 2000
Authored by proyecto-r

tags | magazine
MD5 | daaf75e00dd724d144c32e77cd807e04
Posted May 22, 2000
Authored by proyecto-r

tags | magazine
MD5 | 9670c08238864cf706da09c36b0118cb
Posted May 17, 2000
Authored by Steve Friedl

The Netopia R9100 permits a user not authorized with a special security password to neverthless modify the SNMP community strings, including enabling SNMP access that should be disabled.

tags | exploit
MD5 | bfc4f59f410bc5cd989c93e746833946
Posted May 17, 2000
Authored by Woody Thrower, Stan Burnett, Gary Wahlquist | Site

Prevent Current and Future E-Mail Worms.

tags | worm
MD5 | ccb29df3cab7315b7bbe73ebc5426747
Posted May 17, 2000

Users can access the mailbox's content of anybody on the system. They can also steal their POP passwords since Emurl allows you to fetch your POP email from more than one source.

tags | exploit
MD5 | c854c11701ebd63ca453e8f85947aff4
Posted May 17, 2000
Authored by Zillion | Site

A file called adpassword.txt is world readable as it is assigned the wrong permissions. This will allow a malicious attacker to read the contents of the file, to crack the DES encrypted password it contains (using a common-or-garden password cracker), and to edit banner entries,to add or to remove banners.

tags | exploit
MD5 | f14c2253d94b28844892aa0865a6d3c1
Posted May 17, 2000
Authored by TDP

Remote Denial of Service for CProxy v3.3 - Service Pack 2. This program xploits an overflow vulnerability in CProxy 3.3 SP2 HTTP Service (8080), causing server shutdown.

tags | exploit, remote, web, denial of service, overflow
MD5 | f49a2c47ec6a0437c9ee7590a95682b9
Posted May 17, 2000
Authored by Tiz.Telesup

Cisco 760 Series Connection Overflow. Affected Systems: Routers Cisco 760 Series. Others not tested.

tags | exploit, overflow
systems | cisco
MD5 | a4074a92cb0b32eac9e0680403c56ee5
Posted May 17, 2000
Authored by Suid | Site

Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.

tags | exploit, remote, web, arbitrary
MD5 | a5c2a8bd20fdd39774c7f5e722ef9054
Posted May 17, 2000

A defect in multiple releases of Cisco IOS software will cause a Cisco router or switch to halt and reload if the IOS HTTP service is enabled and browsing to "http://<router-ip>/%%" is attempted. This defect can be exploited to produce a denial of service (DoS) attack. This defect has been discussed on public mailing lists and should be considered public information.

tags | exploit, web, denial of service
systems | cisco
MD5 | 177d2675ccf94d2117289316882510d8
Posted May 17, 2000

A vulnerable secure shell distribution is available from the popular Zedz Consultants FTP site (formally known as The RedHat Linux RPM ssh-1.2.27-8i.src.rpm contains a PAM patch which contains faulty logic allowing users to essentially pass through the username/password authentication step and gain shell access.

tags | exploit, shell
systems | linux, redhat
MD5 | 95b80c63f273743306ae2cf0b0b7b355
Posted May 17, 2000

Bypassing Warnings For Invalid SSL Certificates In Netscape Navigator.

tags | exploit
MD5 | 1f30c5620c1a04acf9b16c06972bc5d0
Posted May 17, 2000
Authored by Michal Zalewski

"I don't think I really love you" or writing internet worms for fun and profit.

tags | worm
MD5 | a1bf3c9a055dd560d416ffd234081b6d
Posted May 17, 2000
Authored by Tim Newsham

Here's an overflow exploit that works on a non-exec stack on x86 boxes. It demonstrates how it is possible to thread together several libc calls.

tags | exploit, overflow, x86
MD5 | b5495c00069db7ae509aaabe0a85a00f
Posted May 17, 2000

New Hack City Advisory 20000504a.0 - It is possible to cause a kernel panic on systems running NetBSD by sending a packet remotely with an unaligned IP Timestamp option.

tags | kernel
systems | netbsd
MD5 | 28d0acc8603e94700026a54b309aebe1
Page 1 of 4

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

July 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    1 Files
  • 2
    Jul 2nd
    26 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    13 Files
  • 6
    Jul 6th
    4 Files
  • 7
    Jul 7th
    4 Files
  • 8
    Jul 8th
    1 Files
  • 9
    Jul 9th
    16 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    32 Files
  • 12
    Jul 12th
    22 Files
  • 13
    Jul 13th
    15 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    1 Files
  • 16
    Jul 16th
    21 Files
  • 17
    Jul 17th
    15 Files
  • 18
    Jul 18th
    15 Files
  • 19
    Jul 19th
    17 Files
  • 20
    Jul 20th
    11 Files
  • 21
    Jul 21st
    1 Files
  • 22
    Jul 22nd
    1 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By