exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Synnergy Laboratories

Synnergy Laboratories
mailtool-adv.txt
Posted May 30, 2001
Authored by synnergy, Dethy | Site synnergy.net

Local vulnerability in Solaris mailtool(1) - /usr/openwin/bin/mailtool on Solaris 8 (x86 and sparc) contains a local buffer overflow vulnerability. By specifying a long environment buffer containing machine executable code, it is possible to execute arbitrary command(s) as gid mail.

tags | overflow, arbitrary, x86, local
systems | solaris
SHA-256 | 28123a605ca63233f3753280128acfc9dae8cb526852a55c509794079049a661
dc20ctrlex.perl
Posted Feb 14, 2001
Authored by synnergy, Dethy | Site synnergy.net

Dc20ctrlex.perl is a FreeBSD 3.x/4.X /usr/local/bin/dc20ctrl local exploit which gives egid=dialer or root on non-freebsd systems. Tested against FreeBSD 4.2.

tags | local, root, perl
systems | freebsd
SHA-256 | 0ee7eafa568512a4b7334811bc84051fe517eb7fd32f411ca85392498b9a8296
portscan.pdf
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers. Text version available here.

tags | arbitrary, protocol
SHA-256 | 22abdfcab10f441e0501420efec15d503b45b165a5be82400b3e1e96c014b32c
portscan.txt
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers.

tags | arbitrary, protocol
SHA-256 | 4fd4b2bbef21c64d1c9c2fdebd6a48b8ea628ca311becdf898a6cf1dbfc00282
dtors.txt
Posted Dec 13, 2000
Authored by synnergy, Juan M. Bello Rivas | Site synnergy.net

Overwriting the .dtors section - This paper presents a concise explanation of a technique to gain control of a C program's flow of execution given that it has been compiled with gcc. This exploit technique has several advantages over changing the stack pointer, including ease of determining the exact position where we want to write and point to our shellcode, and is simpler than a GOT patch.

tags | shellcode
SHA-256 | e41270ceb93cee7dbf4b00c6af429beb80d569a4a5e3c5ffab8c69206da8a0f0
bug-testing.txt
Posted Oct 3, 2000
Authored by synnergy, Dethy | Site synnergy.net

The Importance of Bug Testing - Includes discussion of alpha / beta releases, the importance of bug testing, software development goals, software testing strategies, functional prototypes, designing test sets, defect testing, acceptance testing, and structural prototypes.

SHA-256 | 8bc6adbc535cfdd7f4e996480e70c7cd1a8990ed92f93b47763a32b051f2ba6e
bandmon-0.2.tar.gz
Posted Aug 14, 2000
Authored by synnergy | Site synnergy.net

Bandmon monitors the bandwidth usage on your network.

SHA-256 | fc860fa4a3eba7e426d19566aa2d2d1a5e568080009369f6607b4a605af139af
msadcscan-unix.c
Posted Dec 13, 1999
Authored by synnergy, elux | Site synnergy.net

Synnergy Networks msadc scanner - This is just a basic string scanner that happens to scan for the msadc module string.

SHA-256 | 43eb2a907f3b1f2f09d00bfb5c51fe0347776efd1e8c47248536521263f254a9
fakelog-unix.c
Posted Dec 13, 1999
Authored by synnergy, Headflux

Sends message to everyone on unix system via syslog().

systems | unix
SHA-256 | 8b460aeffee0803febdf2426c780562770f36304c6fde34be6c55959b72a02e2
sadmindex-brute-lux.c
Posted Dec 13, 1999
Authored by synnergy, elux

Sadmind exploit stack pointer brute forcer, just ./sadmindex-brute-lux [arch] <host> and it will brute force the stack pointer, it'll output a message on success and open ingreslock (1524) on the remote computer. This brute forcer requires sadmind exploit by Cheez Whiz.

tags | remote, cracker
SHA-256 | 47d1a23069a0a1db17c1736077ea9a0d65c18f7e0bdfde9047857cbf06ed6867
qpop-linux
Posted Dec 10, 1999
Authored by synnergy, Headflux | Site synnergy.net

Remote buffer overflow exploit in perl for QPOP 3.0b<=20 running on Linux.

tags | remote, overflow, perl
systems | linux
SHA-256 | eb0c60576a529c4ae0797845177279d282a6760eaa5b490fa76e10749e16f68e
syn.jpg
Posted Dec 10, 1999
Authored by synnergy

Synnergy Logo

SHA-256 | 7f4dc86b1699f79f287979fb5965ebcbcb44700c6c727c0f27567bfc66c6dbf6
bindshell-unix
Posted Dec 5, 1999
Authored by synnergy, Headflux | Site synnergy.net

Remote unix shell backdoor written in perl.

tags | remote, shell, perl
systems | unix
SHA-256 | 0c22cb6dbb65f5e64354d6f59018c328ddde8cd095b8d85f7ec4436114c1ed9c
tryseg-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

Test for catching the SIGSEGV or SIGBUS without crashing and combined with try{}catch(){}.

SHA-256 | 433fc3dd738edd7c15e31f6955b42940c9811cbd42f2c5eeb0cdb4401538fd0a
segvbus-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

Test for catching the SIGSEGV and SIGBUS without crashing and with setjmp()/longjmp().

SHA-256 | b44e45195454362e4fd93b7b68e5e0b35b9007c4f48fe8964e280152d0409c16
liberty-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

This will fill up all available memory, if no ulimit is set in the kernel.

tags | kernel
SHA-256 | 1fa0f799e52a1ff1903c899432298c98d4ac33f32697f3a9e95aeec19e670396
ia.txt
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

IP Aliasing - How to set it up on a unix host.

systems | unix
SHA-256 | 80d76dd96e4f94ca4b4fa85648152292de875304c4ad03e27236424663471b96
tcp_relay-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

A tcp relay. For more details, read the source.

tags | tcp
SHA-256 | bc1dddec1caaa8ee6987e15cf35f25c757e2dc844010474a9ea661fe76ebef93
ftpd-aix
Posted Sep 24, 1999
Authored by synnergy, Dvorak | Site synnergy.net

Remote buffer overflow exploit for ftpd from AIX 4.3.2 running on an RS6000. (power).

tags | remote, overflow
systems | aix
SHA-256 | f0c984201d8083d24c2110284f243e70cb1da334d0f2090e3e7fbc36efda7ad6
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close