seeing is believing
Showing 1 - 18 of 18 RSS Feed

PPC Files

Linux Kernel Sendpage Local Privilege Escalation
Posted Jul 19, 2012
Authored by Brad Spengler, Ramon de C Valle, Tavis Ormandy, Julien Tinnes, egypt | Site metasploit.com

The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4

tags | exploit, arbitrary, kernel, protocol, ppc
systems | linux
advisories | CVE-2009-2692
MD5 | 2592f40037078ac9737526c10644b4e9
Secunia Security Advisory 48336
Posted Mar 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Inout PPC Engine, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, ppc, csrf
MD5 | 44d070eb4f2f617c64f8f576c55a6dd2
Inout PPC Engine Cross Site Request Forgery
Posted Mar 11, 2012
Authored by Jonturk75

Inout PPC Engine suffers from a cross site request forgery vulnerability.

tags | exploit, ppc, csrf
MD5 | 02fe050d8a489d8d28b5af9ff15f9962
Linux sock_sendpage() NULL Pointer Dereference
Posted Sep 11, 2009
Authored by Ramon de C Valle | Site risesecurity.org

Linux 2.4 and 2.6 kernel sock_sendpage() NULL pointer dereference exploit. The third and final version of this exploit. This third version features: Complete support for i386, x86_64, ppc and ppc64; The personality trick published by Tavis Ormandy and Julien Tinnes; The TOC pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and libc can be referenced); Improved search and transition to SELinux types with mmap_zero permission.

tags | exploit, kernel, ppc
systems | linux
MD5 | ba34279bc16e75755c6ccde2abc364ed
Trafscrambler Anti-Sniffer For OS X
Posted Sep 7, 2009
Authored by Maxim Bourmistrov | Site en.roolz.org

Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well.

Changes: This is a bug fixing release. Plugged mbuf leak, corrected data injection.
tags | tool, x86, kernel, intrusion detection, ppc
systems | unix, apple, osx
MD5 | 72fbfb418f190cfa0af4b21e04ffe0bf
Trafscrambler Anti-Sniffer For OS X
Posted Aug 15, 2009
Authored by Maxim Bourmistrov | Site en.roolz.org

Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well.

Changes: This release implements fake data injection, userland binary tsctrl to control NKE, minor re-work of NKE.
tags | tool, x86, kernel, intrusion detection, ppc
systems | unix, apple, osx
MD5 | 2b9fbbb730fe3a425956a9ef93185be4
Trafscrambler Anti-Sniffer For OS X
Posted Jun 26, 2009
Authored by Maxim Bourmistrov | Site en.roolz.org

Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. This initial release implements SYN-decoy, Pre/Post connections SYN, TCP reset, and zero window attacks. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well.

tags | tool, x86, kernel, tcp, intrusion detection, ppc
systems | unix, apple, osx
MD5 | a2059efbf0763945fd97513e2771a57b
ppc-rfi.txt
Posted Jan 13, 2007
Authored by IbnuSina

ppc engine suffers from a remote file inclusion flaw.

tags | exploit, remote, code execution, ppc, file inclusion
MD5 | 96815d24c4045e92fc84f60919eee714
VLCMediaSlayer-ppc.pl.txt
Posted Jan 4, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month Of Apple Bugs - A vulnerability in the handling of the udp:// URL handler for the VLC Media Player allows remote arbitrary code execution. This is just a vanilla format string exploit for OSX on ppc.

tags | exploit, remote, arbitrary, udp, code execution, ppc
systems | apple
advisories | CVE-2007-0017
MD5 | a2bdc5495f04b820780a295997ff9d4c
envt.c
Posted Sep 27, 2006
Authored by Qnix | Site gmx.net.qa

A simple program to inject linux shellcode into the environment and find its location in memory. It contains 8 shellcodes for x86, sparc, mips, and ppc.

tags | x86, shellcode, ppc
systems | linux
MD5 | 3d0468d41432b0f3e1d4967b8c55c406
getpwnedmail-ppc.pl.txt
Posted Aug 17, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Exploit for fetchmail on Mac OSX versions 10.4.7 and below on the PPC architecture.

tags | exploit, ppc
systems | apple
MD5 | 752760949c1d758357649064c5823cb1
FailureToLaunch-2.pl.txt
Posted Jul 2, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function. PPC version.

tags | exploit, ppc, proof of concept
systems | apple, osx
MD5 | dad99226501d377f1943e7e8115fa650
Secunia Security Advisory 17850
Posted Dec 2, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported a vulnerability in QualityEBiz Quality PPC (QualityPPC), which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss, ppc
MD5 | 8714bcb2e72df50399cdc69c0c299b7a
execMacOSX.txt
Posted Nov 15, 2005
Authored by nemo

execve("/bin/sh",{"/bin/sh",NULL},NULL) shellcode for Mac OSX on both the PPC and x86 platforms.

tags | x86, shellcode, ppc
systems | apple
MD5 | 72e47e8ad4ab92ef14a550392be4c21c
readnexecppc-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

read(0,stack,1028); stack(); shellcode for Linux PPC. readnexecppc-core.s appended.

tags | shellcode, ppc
systems | linux
MD5 | 6b299851ab43c563f9db06647b83cc94
execve-core.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

execve /bin/sh shellcode for Linux PPC. execve-core.s is appended.

tags | shellcode, ppc
systems | linux
MD5 | b2c9cbc7bceadb4103caa67834b2d856
connect-core5.c
Posted Nov 8, 2005
Authored by Charles Stevenson | Site bokeoa.com

Linux/ppc shellcode which connects /bin/sh to a host. connect-core5.s is appended.

tags | shellcode, ppc
systems | linux
MD5 | a8eb9079574b6e31bed4cfd4674e1eb8
proftp_ppc.c
Posted Feb 11, 2000
Authored by Lamagra

Proftpd (<= pre6) linux ppc remote exploit.

tags | exploit, remote, ppc
systems | linux
MD5 | 5be616f9eb6406225e8b2cad3fb48c23
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close