Exploit the possiblities
Showing 1 - 19 of 19 RSS Feed

Synnergy Laboratories

Synnergy Laboratories
mailtool-adv.txt
Posted May 30, 2001
Authored by synnergy, Dethy | Site synnergy.net

Local vulnerability in Solaris mailtool(1) - /usr/openwin/bin/mailtool on Solaris 8 (x86 and sparc) contains a local buffer overflow vulnerability. By specifying a long environment buffer containing machine executable code, it is possible to execute arbitrary command(s) as gid mail.

tags | overflow, arbitrary, x86, local
systems | solaris
MD5 | 1e5e671cf9f5a6ad579331d3e7053810
dc20ctrlex.perl
Posted Feb 14, 2001
Authored by synnergy, Dethy | Site synnergy.net

Dc20ctrlex.perl is a FreeBSD 3.x/4.X /usr/local/bin/dc20ctrl local exploit which gives egid=dialer or root on non-freebsd systems. Tested against FreeBSD 4.2.

tags | local, root, perl
systems | freebsd
MD5 | 9d658bc02da0498ea3f0146d905dd9af
portscan.pdf
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers. Text version available here.

tags | arbitrary, protocol
MD5 | aa639e684a8e7913186faa5b0f7081b9
portscan.txt
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers.

tags | arbitrary, protocol
MD5 | 4608dc43a219fc1243b13e3e1ca6f75d
dtors.txt
Posted Dec 13, 2000
Authored by synnergy, Juan M. Bello Rivas | Site synnergy.net

Overwriting the .dtors section - This paper presents a concise explanation of a technique to gain control of a C program's flow of execution given that it has been compiled with gcc. This exploit technique has several advantages over changing the stack pointer, including ease of determining the exact position where we want to write and point to our shellcode, and is simpler than a GOT patch.

tags | shellcode
MD5 | f693cc32d668324c2205e77036aa3fd1
bug-testing.txt
Posted Oct 3, 2000
Authored by synnergy, Dethy | Site synnergy.net

The Importance of Bug Testing - Includes discussion of alpha / beta releases, the importance of bug testing, software development goals, software testing strategies, functional prototypes, designing test sets, defect testing, acceptance testing, and structural prototypes.

MD5 | 93ccf43ca9128f73447bd47fe1fa89f1
bandmon-0.2.tar.gz
Posted Aug 14, 2000
Authored by synnergy | Site synnergy.net

Bandmon monitors the bandwidth usage on your network.

MD5 | f428ce70692dfa952d10c6d16f3727ce
msadcscan-unix.c
Posted Dec 13, 1999
Authored by synnergy, elux | Site synnergy.net

Synnergy Networks msadc scanner - This is just a basic string scanner that happens to scan for the msadc module string.

MD5 | 848292758ce51eeecb718dea80503411
fakelog-unix.c
Posted Dec 13, 1999
Authored by synnergy, Headflux

Sends message to everyone on unix system via syslog().

systems | unix
MD5 | 03de4874a8f333ee6918dd99448e08b1
sadmindex-brute-lux.c
Posted Dec 13, 1999
Authored by synnergy, elux

Sadmind exploit stack pointer brute forcer, just ./sadmindex-brute-lux [arch] <host> and it will brute force the stack pointer, it'll output a message on success and open ingreslock (1524) on the remote computer. This brute forcer requires sadmind exploit by Cheez Whiz.

tags | remote, cracker
MD5 | 7588b1cbff18bd6bcdb5fe10b4e85ada
qpop-linux
Posted Dec 10, 1999
Authored by synnergy, Headflux | Site synnergy.net

Remote buffer overflow exploit in perl for QPOP 3.0b<=20 running on Linux.

tags | remote, overflow, perl
systems | linux
MD5 | 5ea48ff2b2dd6aaac4f0fcef8bc4b30e
syn.jpg
Posted Dec 10, 1999
Authored by synnergy

Synnergy Logo

MD5 | 2e2bbb3a163530be6d329e216d48adec
bindshell-unix
Posted Dec 5, 1999
Authored by synnergy, Headflux | Site synnergy.net

Remote unix shell backdoor written in perl.

tags | remote, shell, perl
systems | unix
MD5 | e7a347c80e9c5df1b8d3232f4848e7f4
tryseg-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

Test for catching the SIGSEGV or SIGBUS without crashing and combined with try{}catch(){}.

MD5 | 28fb588cdc4a9301765c334bcced53fb
segvbus-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

Test for catching the SIGSEGV and SIGBUS without crashing and with setjmp()/longjmp().

MD5 | 7c5aa88f30c0b00a54bb354774a011b6
liberty-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

This will fill up all available memory, if no ulimit is set in the kernel.

tags | kernel
MD5 | ab91d1a729380a300941349a99beb7ed
ia.txt
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

IP Aliasing - How to set it up on a unix host.

systems | unix
MD5 | 1706c80b88ef4ca447e374cb28492d5e
tcp_relay-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

A tcp relay. For more details, read the source.

tags | tcp
MD5 | 57a2f14ae29f21cd565b1dd88240d638
ftpd-aix
Posted Sep 24, 1999
Authored by synnergy, Dvorak | Site synnergy.net

Remote buffer overflow exploit for ftpd from AIX 4.3.2 running on an RS6000. (power).

tags | remote, overflow
systems | aix
MD5 | fc17c2f69566bc0213c21821b8da3b09
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Language Bugs Infest Downstream Software
Posted Dec 11, 2017

tags | headline, flaw
German Spy Agency Warns Of Chinese LinkedIn Espionage
Posted Dec 11, 2017

tags | headline, government, china, cyberwar, germany, spyware, social
Dynamics 365 Sandbox Leaked TLS Certificates
Posted Dec 11, 2017

tags | headline, privacy, microsoft, data loss, flaw, cryptography
Keylogger Uncovered On Hundreds Of HP PCs
Posted Dec 11, 2017

tags | headline, flaw, spyware, backdoor
PlexCoin Scam Founder Sentenced To Jail And Fined $10k
Posted Dec 10, 2017

tags | headline, cybercrime, fraud, scam, cryptography
Google Lifts Lid On FBI Data Requests: Now You Can Read Actual Letters Online
Posted Dec 9, 2017

tags | headline, government, privacy, usa, google, fbi
Android Flaw Lets Attack Code Slip Into Signed Apps
Posted Dec 9, 2017

tags | headline, malware, phone, flaw, google
Millions Stolen In NiceHash Bitcoin Heist
Posted Dec 9, 2017

tags | headline, hacker, cybercrime, fraud, cryptography
Apple HomeKit Flaw Left Smart Gadgets Vulnerable
Posted Dec 9, 2017

tags | headline, flaw, apple
Intel Management Engine Pwned By Buffer Overflow
Posted Dec 7, 2017

tags | headline, hacker, flaw, conference, intel
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close