exploit the possibilities
Showing 26 - 50 of 74 RSS Feed

Teso

Team Teso
adore-0.34.tgz
Posted Mar 27, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Improved 2.4 support, better authentication checking, permanent PID removal, configure script, experimental exec redirection for i386.
systems | linux
MD5 | 69b3453f1fb1650388fc63297652d221
mipsshellcode.pdf
Posted Jan 19, 2001
Authored by teso, scut | Site team-teso.net

Introduction to the MIPS architecture and the IRIX operating system, focusing on how to write shellcode for IRIX. Includes 3 sample shell codes. This is an updated version of the article in Phrack 56.

tags | shell, shellcode
systems | irix
MD5 | c472df5fea5c517411de24591466e2b2
telnetfp_0.1.2.tar.gz
Posted Jan 13, 2001
Authored by teso, Palmers | Site team-teso.net

Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 72 OS fingerprints.

Changes: More fingerprints, bugfixes, interactive mode.
tags | remote
MD5 | d33ddb5cbc2ef98af89df5e2eb0a7212
adore-0.31.tar.gz
Posted Jan 9, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Automatic configuration, bug fixes.
systems | linux
MD5 | 4bdf75cfb7735741285ae82f5b5d4df6
Vortrag-1.0.tar.gz
Posted Dec 31, 2000
Authored by teso, scut | Site team-teso.net

German speech given at the CCC - "exploiting format string vulnerabilities". Including examples.

tags | vulnerability
MD5 | 7a06a5c5d2cef4a82fb837d94c50fca8
reverb-0.1.0.tar.gz
Posted Dec 19, 2000
Authored by teso | Site team-teso.net

Reverb is a tool to access firewalled, dynamic-dialin and otherwise protected hosts.

MD5 | e5dbf726d69ed3735d7a690aa0e37d7e
openssh.reverse.tgz
Posted Oct 3, 2000
Authored by teso, Sebastian Krahmer | Site team-teso.net

Openssh-Reverse is a patched OpenSSH which goes in reverse, allowing outside users to connect to machines behind NAT firewalls. In reverse mode, sshd acts as a client and brings the connection to a modified ssh server.

MD5 | 942f35d203b1fa524f6a92c140e9c23f
telnetfp_0.1.1.tar.gz
Posted Sep 7, 2000
Authored by teso, Palmers | Site team-teso.net

Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 32 OS fingerprints.

Changes: New OS fingerprints and bug fixes.
tags | remote
MD5 | 4e19cbda40093e1762ea7aa5fccdd9dc
telnetfp_0.1.0.tar.gz
Posted Sep 6, 2000
Authored by teso, Palmers | Site team-teso.net

Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 23 OS fingerprints.

tags | remote
MD5 | 826448f8419c26b5eb603ee19b4dd532
execve-shell.tar.gz
Posted May 29, 2000
Authored by teso, scut | Site team-teso.net

execve-shell.tar.gz allows you to easily create linux x86 shellcode that execs any command you supply.

tags | shell, x86, shellcode
systems | linux
MD5 | ce5e7d60f9ccddc207136cdd9bdaabe7
arpmitm-0.1.tar.gz
Posted May 18, 2000
Authored by teso, xdr | Site team-teso.net

Arpmitm.c is another tool for using arp man-in-the-middle attacks which keeps sending the packets. Requires Libnet 1.00.

MD5 | 9fde0cc8caf1a1431b77496a900e158a
exman.c
Posted May 3, 2000
Authored by teso | Site team-teso.net

exman.c is a new man exploit.

MD5 | 190e272b5cffd235e97cc106a133a6de
outp.c
Posted May 3, 2000
Authored by teso | Site team-teso.net

outp.c will convert .s files to shell code.

tags | shell
MD5 | 458d6225aba406f32950ba38ff61d7f8
adv5.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit

systems | linux
MD5 | a94bcdee982bff03ff71e70305a88ffb
adv4.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)

systems | linux
MD5 | b290036932315c697d3155d24cc64fd7
advisory-009.txt
Posted Apr 7, 2000
Authored by teso | Site team-teso.net

TESO Security Advisory #9 - BinTec router security and privacy weakness. By using SNMP brute-force-techniques for SNMP community-names one is able to remotely gain the management accounts passwords, which are the same as the SNMP community names. Additionally the MIB-Tree holds security related information which should not be accessible through read-only/SNMP. These routers also offer services which can be abused rather easily, like dialing out and getting full line access via a CAPI interface, or a debugging interface which gives you all information which is sent over the BRI-lines.

MD5 | 737ae5da6ecde109e2d4a33533a3634b
hellkit-1.2.tar.gz
Posted Mar 16, 2000
Authored by teso, stealth | Site team-teso.net

Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Many examples included.

Changes: Added generic shellcode decoder which can handle shellcode up to 64kb in length containing any bytes, added encoder for this type of decoder, and fixed some signedness issues in array accessment.
tags | overflow, shellcode
MD5 | 1dfa21f029e4fbc903c92734cfe98ca4
adv7.tar.gz
Posted Mar 16, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - A vulnerability within the kreatecd application for Linux has been discovered. An attacker can gain local root-access. Exploit included.

tags | local, root
systems | linux
MD5 | 3196d5b099afc3b97277955392b37069
adv6.tar.gz
Posted Mar 16, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - A vulnerability within the imwheel application for Linux has been discovered. Some of these packages are shipped with an suid-root wrapper-script that invokes the insecure program 'imwheel' with UID 0. Exploit included.

tags | root
systems | linux
MD5 | ba670a03a3b834008c8c0cada3eb9185
teso.wmcdplay.txt
Posted Mar 13, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - A vulnerability within the wmcdplay CD playing application for the WindowMaker desktop has been discovered. It allows local root compromise through arbitrary code execution.Any system which has wmcdplay installed as setuid root is vulnerable.

tags | arbitrary, local, root, code execution
MD5 | 15def16c5e23da0e4e13393a8f8ffb0f
teso.atsadc.txt
Posted Mar 13, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - The atsar application contains an exploitable vulnerability. The Halloween 4 Linux distribution, which is based on RedHat 6.1 is shipped with this suid-root program. It might be used to gain superuser privileges. Any system that has atsar-linux-1.4.2 package installed is vulnerable.

tags | root
systems | linux, redhat
MD5 | 11418d3684b96ff6cb2f5295823e04fa
adore-0.14.tar.gz
Posted Feb 22, 2000
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistant file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Improved promisc hiding, port hiding fixed, and a readme.
systems | linux
MD5 | 3879c8ab46ebf72dc61bf267ea1f00a2
teso-nxt.tar.gz
Posted Feb 16, 2000
Authored by teso

Exploit for BIND-8.2/8.2.1 (NXT)

MD5 | 1e214fef8dfe3df3a399945b56a8b238
adv3.tar.gz
Posted Feb 16, 2000
Authored by teso, scut | Site team-teso.net

Nameserver traffic amplify (DNS Smurf) and NS Route discovery (DNS Traceroute) advisory and exploit.

MD5 | 03bb040880d2f4294d655db3d59fe609
hellkit-1.1.tar.gz
Posted Feb 15, 2000
Authored by teso, stealth | Site team-teso.net

Hellkit is a shellcode generator. You write the your shellcode in C, and it gets converted to ASM for use with both heap and stack based overflows. Examples included.

tags | overflow, shellcode
MD5 | 2a288b645f90c951843fed37ad797345
Page 2 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Government Admits It Doesn't Know If Assange Cracked Password For Manning
Posted Apr 17, 2019

tags | headline, hacker, government, usa, britain, data loss, military
Oracle Squashes 53 Critical Bugs In April Security Update
Posted Apr 17, 2019

tags | headline, database, flaw, patch, oracle
Windows Zero Day Emerges In Active Exploits
Posted Apr 17, 2019

tags | headline, malware, microsoft, flaw, zero day
The Curious Case Of The Spamhaus Port Scanning Scandal
Posted Apr 17, 2019

tags | headline, hacker, spam
Bad Bots Now Make Up 20 Percent Of Web Traffic
Posted Apr 17, 2019

tags | headline, hacker, botnet
Adblock Plus Exploit Allows Threat Actors To Read Gmail And Other Google Services
Posted Apr 17, 2019

tags | headline, privacy, flaw, google
Mueller Report Heads To Congress Within A Week
Posted Apr 16, 2019

tags | headline, hacker, government, usa, russia, fraud, cyberwar, fbi
India's Wipro Investigating Phishing Of Employee Accounts
Posted Apr 16, 2019

tags | headline, india, password, phish
Swedish Social Democrats' Twitter Account Hacked
Posted Apr 16, 2019

tags | headline, hacker, government, sweden, social, twitter
Scranos Rootkit Expands Operations From China To Rest Of World
Posted Apr 16, 2019

tags | headline, malware, china, backdoor
View More News →
packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close