exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 298 RSS Feed

Files

synsol.c
Posted Aug 17, 1999
Authored by CRG

Very effective Synflood DoS attack ported to Solaris platforms.

tags | exploit
systems | solaris
SHA-256 | 86cf8b2b6185f856a8c69e35d9aa72c823a1739481249f61d63f5e826f735f79
tellme.tar.gz
Posted Aug 17, 1999
Authored by CyberPsychotic

Retrives netbios name from remote Windog (as described in Hobbit'sdocument cifs.txt).

tags | exploit, remote
SHA-256 | 9515a0eac392da0e50348f61ecbed9379abac534c5d58f10f1df17a1f65495ff
udplstn.tar.gz
Posted Aug 17, 1999
Authored by CyberPsychotic

Sample daemon, which hooks on the UDP ports, listens and records all incomming packets. (could play ping/pong with them as well).

tags | exploit, udp
SHA-256 | 71e3388678985937115e6aaa064151ee448bc7abe69b7905578d2a4df1e85adf
usr-totalswitch.txt
Posted Aug 17, 1999

All versions of USR TotalSwitch have backdoor easily accessible by anyone.

tags | exploit
SHA-256 | ce4f4e6aa34e7f88e5790ea282a57c5d9aa6d9983c4e2179049fca008fd2b1f2
valueclick-cgi.txt
Posted Aug 17, 1999

ValueClick CGI Vulnerability - The ValueClick Online Advertising agency web interface has a CGI vulnerability that allows easy username/password capture without using sniffing software, leaving user accounts vulnerable.

tags | exploit, web, cgi
SHA-256 | 5fad938d5e9332f296da07067591827ce0b71dba380b78ad6eb40bcc70a74d23
vanity.c
Posted Aug 17, 1999

bnc remote buffer overflow for linux x86 (w/o stack-non-exec patch), works on versions < 2.4.4.

tags | exploit, remote, overflow, x86
systems | linux
SHA-256 | 8805b778e8639c84d22651f4819eef14e260a1c9f36129be631e50bba032a509
webspf.pl
Posted Aug 17, 1999
Authored by Pavel Aubuchon-Mendoza

Web Spoof - Works as a normal command line web retrieval script, except will spoof the referer. This will bypass any kind of reference checking, in most cases, showing once and for all that referer based security doesn't work.

tags | exploit, web, spoof
SHA-256 | 7296b78f206f6938129a2d08fc84aa87c7beae92355a644eb87a3e5d028e1fce
wordperfect8.txt
Posted Aug 17, 1999

When wordperfect 8 is installed it creates a /tmp/wpc-(hostname) directory with permissions 777, and all files inside of it are mode 666. If WP8 is installed by root, then you just got serious security problems.

tags | exploit, root
SHA-256 | c8a8987122006915fce406536a047e59814ec133ddb65afa8862063a7bf5939b
yahoo-pager-id.txt
Posted Aug 17, 1999

Yahoo Pager - security bug w/ services #7 and #8 allowing malicious user to activate/deactivate any identity.

tags | exploit
SHA-256 | bdf06f779507b514c97a9e64cc8930d1e8a43702bb5dbd2913906b42282510a3
32bitip.zip
Posted Aug 17, 1999

Convert IPs to 32bit numbers to exploit MSIE intranet/internet 32bit security bug.

tags | exploit
SHA-256 | 326f9a15025b8a6ffa42132258fa3896cbb39e8fe759cbd197f65e101700a394
aim-warning-DoS.txt
Posted Aug 17, 1999

DoS attack comes from a poor implementation of AOL Instant Messenger's warn "feature."

tags | exploit
SHA-256 | e7967529b8707a5def70854cff7ca809673184365c6f1b50d092caa9eccb4b2e
aix-infod.txt
Posted Aug 17, 1999

AIX infod vulnerability can result in local root compromise.

tags | exploit, local, root
systems | aix
SHA-256 | a8ffecf8d88dd262fd2594bb583dc2faa50ad50aa733f10936cdb2814f01cb16
aix-lc_messages.c
Posted Aug 17, 1999
Authored by Georgi Guninski

buffer overflow condition in AIX 4.2/4.1/? when the shell variable LC_MESSAGES is long enough.

tags | exploit, overflow, shell
systems | aix
SHA-256 | 103ea19cb527277842d3dd3bb20b3f14f9f0bd1b02207d703a724b9b6be17f8f
aixdtaction.c
Posted Aug 17, 1999
Authored by Georgi Guninski

AIX 4.2,(others?) dtaction and HOME exploit that spawns a root shell.

tags | exploit, shell, root
systems | aix
SHA-256 | 1ac437d1677cf0384f1f7de36f7e24345f6528b93186858140a87185f041e488
aixlquerylv.c
Posted Aug 17, 1999
Authored by Georgi Guninski

buffer overflow in /usr/sbin/lquerylv which spawns a root shell under AIX 4.2, probably 4.x,3.x.

tags | exploit, overflow, shell, root
systems | aix
SHA-256 | 81b8de5c637ccced3cfd8378513947dc6d9f7838e263300aa32fdc9c43b6f8b8
asm_reboot.c
Posted Aug 17, 1999

assembly code to reboot a Linux x86 box.

tags | exploit, x86
systems | linux
SHA-256 | bec821694f807eb5fc78a95fd6ece6452b5afe5a8c50a6600a6c71476768437f
b4b0.c
Posted Aug 17, 1999
Authored by b4b0

Backdoor daemon that binds a shell to the port of your choice on any machine.

tags | exploit, shell
SHA-256 | 583b62f117e2e7e8fa6b1fe9b1d40973d1c8ca04144a3db0761f6024702711db
bios-backdoors.txt
Posted Aug 17, 1999

BIOS Backdoor Password insecurities. Check out our collection of BIOS passwd crackers

tags | exploit
SHA-256 | b73f1970298563b2fa0f8600daad77668a6763725e50c5dfdee6aa7e0ac801fa
browsers.html.gz
Posted Aug 17, 1999

Browser exploit source code for several platforms.

tags | exploit
SHA-256 | 3c1665e5c69c9a1063a079a5dc9000eabedf0354a164353f9ed5674fb4623f22
Cachepig.zip
Posted Aug 17, 1999

No information is available for this file.

tags | exploit
SHA-256 | 483f89f0620eac86e267810a32d7877d7f10f17f6a0c112f52ed29c07fa70a1d
chmod_pw.c
Posted Aug 17, 1999

changes mode on /etc/passwd to 777, making it writeable by anyone.

tags | exploit
SHA-256 | 6cd07f3b5f4919c3c73986bb608ee3c4837e38f0eb92185688ed6619f78b8fb9
cuartango-son.txt
Posted Aug 17, 1999

The Son of Cuartango Hole - new version of "Untrusted Scripted Paste" security hole allows remote web site to grab files from your computer. Defeats latest Microsoft patches.

tags | exploit, remote, web
SHA-256 | fef0ae6636d356d7478b82a01566f6283767377789bff92bf9dbd3837e33e6e3
dilloncrond.c
Posted Aug 17, 1999

Dillon's Crond v2.2 exploit - buffer overflow in Slackware's /usr/sbin/crond in the fdprintf() function from subs.c.

tags | exploit, overflow
systems | linux, slackware
SHA-256 | ad7ee9e392ade8b0f643224f1d40aa4528e0fe1a9c713014423a64ea4a105e25
dtap2.txt
Posted Aug 17, 1999

Solaris 2.6 /usr/dt/bin/dtappgather still contains a security hole.

tags | exploit
systems | solaris
SHA-256 | 47c4d7ab720126db720e53ce668f92b83d853d1756f79fc594541ecf4b22297c
dwarf.tgz
Posted Aug 17, 1999

Dwarf is a backdoor server that uses challenge-response based authentication.

tags | exploit
SHA-256 | ccaaea4235c5f9acb45a4890c2a8bbef0ee5e1a2ed1bd91e212b788bf8cc10d6
Page 4 of 12
Back23456Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close