what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 298 RSS Feed

Files

ADM-imap4r1-linux.c
Posted Jan 2, 2000
Authored by ndubee, plaguez

Linux WU-IMAPD 4.1 remote root exploit.

tags | exploit, remote, root
systems | linux
SHA-256 | e3a218fa16e6fb76980fa8726376f11d499254027a11f1359b7f1cbf6682251b
imap3.c
Posted Dec 17, 1999
Site hack.co.za

Yet another Imapd remote overflow.

tags | exploit, remote, overflow
SHA-256 | c43a603aed41521971bf354ca7740bbd46771fe3281339c85ea4273a7d9b48dc
statd.pl
Posted Dec 15, 1999

SunOS 5.4-5.5 statd remote exploit - in perl.

tags | exploit, remote, perl
systems | solaris
SHA-256 | bd7ebae8ad5e5928d82da9b192e8e4a352c9277ff460e4561511c0ae7b227593
tryX.c
Posted Dec 15, 1999
Authored by Missinglnk | Site tribune.intranova.net

Some testing code I put together to try on a friend's old machine, it essentially tries to overflow the DISPLAY variable in X-based programs.

tags | exploit, overflow
SHA-256 | 7613d5b29ec47d7d33a9be662b0d6ff29d63ff54026a3473136af5f95fc5b577
bind49bsd.c
Posted Dec 1, 1999
Authored by Stran9er

remote bind 4.9.x exploit Example for FreeBSD. bug in: bind/named/ns_req.c:req_inquery().

tags | exploit, remote
systems | freebsd
SHA-256 | 4acad7f7f93b04c0a7f0d62fa91d01af27211872b858473b8eb810848d404a39
decrypt.c
Posted Sep 12, 1999
Site cs.uni-potsdam.de

Decrypt kmail passwords.

tags | exploit
SHA-256 | 7e993399d9a65ca2cc5bc223c2cb8f869c63566a7362d48d9655645aae5ea67f
breeze-server.txt
Posted Aug 17, 1999

Breeze Network Server for NetBSD has numerous serious security holes.

tags | exploit
systems | netbsd
SHA-256 | b4a3996f5f27e9eff38454063f92f9f57b933656098400199978291af676012c
lk.pl
Posted Aug 17, 1999

perl script designed to scan user directories on AFS file systems running Hesiod name servers, looking for slack user directory permissions.

tags | exploit, perl
SHA-256 | a2e1e1022cf208cbd585c062713fdad591dce6caf20a42629bb82088bf718de3
lk2.pl
Posted Aug 17, 1999

perl script designed to scan user directories on AFS file systems running Hesiod name servers, looking for slack user directory permissions. This version includes option to save any or all of the users files to /tmp/userid, and has a nice command line interface.

tags | exploit, perl
SHA-256 | 1babe6dbc4f4397e05aef4db99ad9302368f7ab122aa321ede019f322dc117a7
sbouncer.c
Posted Aug 17, 1999

bounce v0.0.4 - bouncer to use with wingate or socks proxys. This version has non-authenticated SOCKS5 support and SOCKS5 username/password authentication. Written by stok of The c5 Project

tags | exploit
SHA-256 | de0f834f80e3d081a5a9efdf9e44a6055848569159bd3b5c19444720424f821d
solaris-2.7-finger-bounce.txt
Posted Aug 17, 1999

finger bounce bug still exists with Solaris 2.7.

tags | exploit
systems | solaris
SHA-256 | 20ac1e7e683bc81921aad3f7cf372c9f2b75cea0fbde0ec9d0f29172fd702db9
ssh2-remote-forward.txt
Posted Aug 17, 1999

sshd2 (version 2.0.11 and older) has a security bug, which allows any eligible user to request remote forwarding from privileged ports without being root.

tags | exploit, remote, root
SHA-256 | ceaaa88ac9994df086c6826cc7ac0e6dd34bd711897053d1cf17bd197b1f6b18
3com-HiPer-arc.txt
Posted Aug 17, 1999

3Com HiPer ARC vulnerable to nestea DoS attack.

tags | exploit
SHA-256 | bd7f98f0ae798177043904b3f1f9d59c9fcc77728c1cac7d7125885b263e0bdb
3com-nmc-tch.txt
Posted Aug 17, 1999

The software that 3com has developed for running the NMC (network management card) for the Total Control Hubs has hard-coded "adm" login that cannot be deleted, allowing easy unauthorized remote access.

tags | exploit, remote
SHA-256 | 99132980cd994df32ada10bbac98ce13a2e8f498558d0b838e9df5fe8d80b3e1
9x_cgi.zip
Posted Aug 17, 1999
Authored by 9x

Test for common CGI security holes.

tags | exploit, cgi
SHA-256 | ea0cb3160c04b01375eca032dac9aefc101ca5e5d7895059656cf37790898399
aix-infod.c
Posted Aug 17, 1999

Exploit code and description of the AIX 3.x and 4.x infod remote root exploit.

tags | exploit, remote, root
systems | aix
SHA-256 | 0155df1340c23af4ea8bb824b19d0254aa662715b57e9532592b68984690c819
aol-aim-tunnel.txt
Posted Aug 17, 1999

AOL client connects to the AOL server at port 5190, establishing IP tunnel that effectively bypasses corporate firewalls, leaving client exposed to IP-based attacks.

tags | exploit
SHA-256 | cfa5b759464b21ec36ccd425d947f531d3fd895fa0ebbd9ba1315c74bd308c94
bloop.c
Posted Aug 17, 1999
Authored by legion2000.org

Simple denial of service attack against Windows98/95 Machines - Sends random spoofed ICMP packets similar to a weaker protocol as of ssping or jolt.

tags | exploit, denial of service, spoof, protocol
SHA-256 | 652e8e3e65ba962b03ebc37fda78af7a67f73bd503dba0fcbd07a2d603902f86
bootp_exploit.c
Posted Aug 17, 1999
Authored by Rhino9's horizon

Linux remote buffer overflow exploit code for bootpd daemon distributed with most flavors of *nix.

tags | exploit, remote, overflow
systems | linux
SHA-256 | 09c61f13bf25577f8c66264bd3cca6676282c0b6391584b366c21c1e4287855f
bootpd-bb.tar.gz
Posted Aug 17, 1999

Bootpd Exploit against debian linux 1.3 and 2.0 and possibly others. This version contains the header files needed. Broken ass code fixed by Bronc Buster.

tags | exploit
systems | linux, debian
SHA-256 | 0d21085b3d46e74f95312f8642f1b2067517bd36ef1eb5c31e28af18d49e0868
bootpd.txt
Posted Aug 17, 1999

Bootpd Exploit.

tags | exploit
SHA-256 | d1c729b53a632c1d74719856dc003b8a3d68e0454c3690ef0d2dc30351cecbbe
bootpd243.c
Posted Aug 17, 1999

Exploitable buffer overflow in bootpd version 2.4.3. All UNIX systems vulnerable, remote root compromise. Other versions of bootpd may be vulnerable also. Exploit code included.

tags | exploit, remote, overflow, root
systems | unix
SHA-256 | 1484629b14c7c825c71d4c84ef690c13193d74393aec71e35faa515a88b06121
bouncer.c
Posted Aug 17, 1999

bounce v0.0.2 - bouncer to use with wingate or socks proxys. Written by stok of The c5 Project

tags | exploit
SHA-256 | f9a59060029a0d98058dca19f7b2108a4c0b9fac988e951a0129aa01bc051cfb
cert-tcpip-DoS.txt
Posted Aug 17, 1999

Intruders can disrupt service or crash systems with vulnerable TCP/IP stacks. CERT advisory.

tags | exploit, tcp
SHA-256 | 65114de65cc53de2c5d5e370cb5f6982463eb94fba907ada159289eee4f56419
cisco-ios12.txt
Posted Aug 17, 1999

Cisco IOS 12.0 security bug, Denial of Service attack. Several versions of 11.x also affected.

tags | exploit, denial of service
systems | cisco
SHA-256 | 0b7bea99d97167b0e1e757f371651045a3b5f328c887261828bfecc83b87b35f
Page 1 of 12
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close