Local vulnerability in Solaris mailtool(1) - /usr/openwin/bin/mailtool on Solaris 8 (x86 and sparc) contains a local buffer overflow vulnerability. By specifying a long environment buffer containing machine executable code, it is possible to execute arbitrary command(s) as gid mail.
28123a605ca63233f3753280128acfc9dae8cb526852a55c509794079049a661
Dc20ctrlex.perl is a FreeBSD 3.x/4.X /usr/local/bin/dc20ctrl local exploit which gives egid=dialer or root on non-freebsd systems. Tested against FreeBSD 4.2.
0ee7eafa568512a4b7334811bc84051fe517eb7fd32f411ca85392498b9a8296
Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers. Text version available here.
22abdfcab10f441e0501420efec15d503b45b165a5be82400b3e1e96c014b32c
Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers.
4fd4b2bbef21c64d1c9c2fdebd6a48b8ea628ca311becdf898a6cf1dbfc00282
Overwriting the .dtors section - This paper presents a concise explanation of a technique to gain control of a C program's flow of execution given that it has been compiled with gcc. This exploit technique has several advantages over changing the stack pointer, including ease of determining the exact position where we want to write and point to our shellcode, and is simpler than a GOT patch.
e41270ceb93cee7dbf4b00c6af429beb80d569a4a5e3c5ffab8c69206da8a0f0
The Importance of Bug Testing - Includes discussion of alpha / beta releases, the importance of bug testing, software development goals, software testing strategies, functional prototypes, designing test sets, defect testing, acceptance testing, and structural prototypes.
8bc6adbc535cfdd7f4e996480e70c7cd1a8990ed92f93b47763a32b051f2ba6e
Bandmon monitors the bandwidth usage on your network.
fc860fa4a3eba7e426d19566aa2d2d1a5e568080009369f6607b4a605af139af
Synnergy Networks msadc scanner - This is just a basic string scanner that happens to scan for the msadc module string.
43eb2a907f3b1f2f09d00bfb5c51fe0347776efd1e8c47248536521263f254a9
Sends message to everyone on unix system via syslog().
8b460aeffee0803febdf2426c780562770f36304c6fde34be6c55959b72a02e2
Sadmind exploit stack pointer brute forcer, just ./sadmindex-brute-lux [arch] <host> and it will brute force the stack pointer, it'll output a message on success and open ingreslock (1524) on the remote computer. This brute forcer requires sadmind exploit by Cheez Whiz.
47d1a23069a0a1db17c1736077ea9a0d65c18f7e0bdfde9047857cbf06ed6867
Remote buffer overflow exploit in perl for QPOP 3.0b<=20 running on Linux.
eb0c60576a529c4ae0797845177279d282a6760eaa5b490fa76e10749e16f68e
Synnergy Logo
7f4dc86b1699f79f287979fb5965ebcbcb44700c6c727c0f27567bfc66c6dbf6
Remote unix shell backdoor written in perl.
0c22cb6dbb65f5e64354d6f59018c328ddde8cd095b8d85f7ec4436114c1ed9c
Test for catching the SIGSEGV or SIGBUS without crashing and combined with try{}catch(){}.
433fc3dd738edd7c15e31f6955b42940c9811cbd42f2c5eeb0cdb4401538fd0a
Test for catching the SIGSEGV and SIGBUS without crashing and with setjmp()/longjmp().
b44e45195454362e4fd93b7b68e5e0b35b9007c4f48fe8964e280152d0409c16
This will fill up all available memory, if no ulimit is set in the kernel.
1fa0f799e52a1ff1903c899432298c98d4ac33f32697f3a9e95aeec19e670396
IP Aliasing - How to set it up on a unix host.
80d76dd96e4f94ca4b4fa85648152292de875304c4ad03e27236424663471b96
A tcp relay. For more details, read the source.
bc1dddec1caaa8ee6987e15cf35f25c757e2dc844010474a9ea661fe76ebef93
Remote buffer overflow exploit for ftpd from AIX 4.3.2 running on an RS6000. (power).
f0c984201d8083d24c2110284f243e70cb1da334d0f2090e3e7fbc36efda7ad6