exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files

access-counter.pl
Posted Sep 13, 2000
Authored by Slash | Site b0f.freebsd.lublin.pl

The popular CGI web page access counter version 4.0.7 by George Burgyan allows execution of arbitrary commands due to unchecked user input. Commands are executed with the same privilege as the web server.

tags | web, arbitrary, cgi
SHA-256 | e0a35b69e4f5aef2395340390b513acaf3525217945eb4350d781f82b87e195f
lpset.pl
Posted Sep 13, 2000
Authored by Slash | Site b0f.freebsd.lublin.pl

Perl port of the /usr/bin/lpset local root vulnerability in Solaris/SPARC 2.7. Based on lpset.sh.

tags | local, root, perl
systems | solaris
SHA-256 | d7a3671db5103886a50d238f176908dbdf003c5e30c4ebc5ea6fba725fccf9ac
smegma_v0.4.tgz
Posted Jul 24, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

SMEGMA is an engine for generating garbled shellcode using several encryption mechanisms and making it self-decryptable by putting an Intel x86 machine-code decryptor in front of it. It uses a hand-written C lexer to grab the shellcode from sourcefiles and try and identify it. Use SMEGMA to modify shellcode in which characters get ruined by regular expressions (often seen in CGI binaries, web applications and webservers).

Changes: Fixed all NULL byte problems - you can now use smegma to rid shellcode of NULL characters, more garbling algorithms, more efficient garbling algorithms, fixed the size problem.
tags | web, x86, cgi, shellcode
SHA-256 | 27190bafedd46710e361a4de759ed1fb919aefd7840e72731dda48838278f0bf
smegma_v0.2.tgz
Posted Jul 8, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

SMEGMA is an engine for generating garbled shellcode using several encryption mechanisms and making it self-decryptable by putting an Intel x86 machine-code decryptor in front of it. It uses a hand-written C lexer to grab the shellcode from sourcefiles and try and identify it. Use SMEGMA to modify shellcode in which characters get ruined by regular expressions (often seen in CGI binaries, web applications and webservers).

tags | web, x86, cgi, shellcode
SHA-256 | 1da73e27fb59643dd6998adbcad2852ae9f92894f5b5ad30e9abbcac42f8bea8
htaccess-admin.tar.gz
Posted Jul 5, 2000
Authored by Slash | Site b0f.freebsd.lublin.pl

htaccess.tar - Perl script for adding users to the .htaccess file. Includes information on how to set up password protected web pages.

tags | web, perl, add administrator
SHA-256 | 0136a4de0bb885ebc034bbecae45c0ad21f7fb4a273400f80ed682673066e15e
elm-exploit.c
Posted Jul 5, 2000
Authored by Slash | Site b0f.freebsd.lublin.pl

Linux Elm 2.4/2.5 local exploit - This will give you a shell(gid=12) if /usr/bin/elm is SGID. Tested on slackware 4.0 and redhat 5.1.

tags | shell, local
systems | linux, redhat, slackware
SHA-256 | 7536b4523e151c49801d69c7104c931fe2839096af6eb7cedb39b3bd7d2a48ff
majordomeX.sh
Posted Jul 5, 2000
Authored by Slash | Site b0f.freebsd.lublin.pl

Majordomo v1.94.5 local linux exploit - run commands as the UID that majordomo runs under.

tags | local
systems | linux
SHA-256 | 953f408ed0e7227f1f766fd9a9fd554a804ae5ecd8f6c6aa40a809d4d15dc708
sscan2k-pre3.b0f.tar.gz
Posted Jun 8, 2000
Authored by eth0 | Site b0f.freebsd.lublin.pl

sscan2k is a remote auditing/vulnerability scanner which determines remote OS, and scans the host for applicable vulnerabilities. Features updated vulnerability checks, a scripting language, support for plugins and addons, configureable OS fingerprints, dns zone and subnet scans. Based off sscan by jsbach.

Changes: Fixes by mixter.
tags | remote, vulnerability
SHA-256 | e2be5ced88ce06701e0d2a7db26865443180d8781bcf73eb59d9ca6eba9ccc71
mod_backdoor.c
Posted Jun 5, 2000
Authored by Slash | Site b0f.freebsd.lublin.pl

Apache DSO backdoor - A get request to a "special" url allows remote command execution.

tags | remote
SHA-256 | d49407f8380be928bcc8cb57171d11ca41fd2ec1f61a4678089d8ce1b6f3aaa9
hellex.c
Posted May 23, 2000
Authored by Narrow | Site b0f.freebsd.lublin.pl

hellex.c is a local buffer overflow exploit for the Hellkit 1.2 shellcode generation package. Tested on Red Hat 6.0.

tags | overflow, local, shellcode
systems | linux, redhat
SHA-256 | 75f3c0bf13b260cd50665dcaca0b38166d372b5a1943a6e8675717b85338e5ad
sscan2k-pre2.b0f.tar.gz
Posted May 22, 2000
Authored by eth0, axess. Fixes: Mixter | Site b0f.com

sscan was given to buffer0verfl0w security by jsbach for the project to be continued for jsbach. From now on sscan will go as sscan2k. sscan2k now has updated vulnerability checks along with all the other great features it had before, improved OS detection (user can update the fingerprints by editing Osdefs.ms [which comes in sscan2k scripting language]), etc.

SHA-256 | a6f61002b67b260dd9f801c9a629380896d815e51bf747ee8b98e09a42b77705
syrin15.zip
Posted May 17, 2000
Authored by Digital Monkey | Site b0f.freebsd.lublin.pl

Buffer Syringe is a tool for win32 that tests a daemon for buffer overflow on it's parameter(s) sort of "brute forcing" or "stressing" the daemon by means of injecting a user specified parameter or a command with a value of a user specified number of characters to the daemon. Chances are, if the parameter being tested is vulnerable to an overflow, and the user specified number of characters exceeds that of the parameter's limit, then the daemon would likely crash.

tags | overflow
systems | windows
SHA-256 | abd825833c7b497a0e3d17058eb7119b3458be5b9e91dd6fa18bc85d104ab967
Neon_beta5.c
Posted May 12, 2000
Authored by Axess | Site b0f.freebsd.lublin.pl

Neon beta5 - Simple Host or Iplist cgi Scanner which does 358 checks.

Changes: Added more cgi, fixed better output.
tags | cgi
SHA-256 | a0fc3d293b0acf7825ebd5b79d94d7aa2fa74286565aaee9b6fc858b23fb9ae6
Neon_beta4.c
Posted May 9, 2000
Authored by Axess | Site b0f.com

-(- Neon beta4 -)- Simple Host or Iplist Cgi Scanner ( 356 ) Checks

tags | cgi
SHA-256 | 86681f46a5aad3c105b7e34f6aa49625105ec65e6f590da99bbab08a785ed388
OMNI.SH
Posted May 9, 2000
Authored by sirius | Site b0f.com

Exploit/DoS for OmniHTTPd pro v.2.06 Win98 (NT not tested). The result is crash of remote server.

tags | remote
systems | windows
SHA-256 | 2ea397fa4d6ffdc85217872360f6e43ddc49e9256b4f705751e1ef43b7bc9c7c
b0stt.tar.gz
Posted May 8, 2000
Authored by Xfer | Site b0f.freebsd.lublin.pl

Buffer0verfl0w Security Team Ssh Trojan - Does not log anything to system logs(utmp,wtmp,lastlog and the rest of syslogd logs), it also logs all incoming/outcoming ssh passwords.

tags | trojan
SHA-256 | 194753d9dcfe5fbb7c168b8e80f18d5eaffacabc1c52ace278811d820dc6a435
aurora.tgz
Posted May 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

Project aurora is lamagra's non-blind LAN spoofing project. It can be used to create TCP connections from a non-existing box or another box in the network. The biggest problem while spoofing was guessing the sequence numbers to acknowledge and that the other box always sends back a reset when it receives a SYN|ACK. This used to be solved by abusing small bugs in the tcpip stack.

tags | spoof, tcp
SHA-256 | 3468997662e967b3bb4c11bacb27971f09a1cd20742f8a53d195e8f32028fcc6
spider.tgz
Posted May 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

fs-spider is a multi-threaded bad permissions finder (user defined). It

SHA-256 | ea68f5abf6cbd21c366e7f35e65fb23ac152291db0553eeb4e10dfb206e2ff1a
connect.c
Posted May 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

This shellcode creates a connection to a host/port and starts a shell. This should be more anti-IDS then the others and it can go through a firewall.

tags | shell, shellcode
SHA-256 | d50e538d758dd930f5ec6b120b1229f2cdae67049c11ce1d22075a1a803c46f2
tp2.sh
Posted Apr 27, 2000
Authored by eth0 | Site b0f.freebsd.lublin.pl

Timbuktu Pro 2.0b650 denial of service exploit.

tags | denial of service
SHA-256 | 57c923b60dc99c9f00bd5df5a3490c3875a21a218befdfb11e7d5e49b5bd8ac6
sqlsyslogd.c
Posted Apr 26, 2000
Authored by Venglin | Site freebsd.lublin.pl

syslogd-to-MySQL wrapper v0.1 prebeta. Stores syslog messages in a MySQL database. Written for FreeBSD.

systems | freebsd
SHA-256 | b44da69a92c3350c4053b05fab764bff3d6940f5eb010c5337cd82acb8578da7
plogd2.c
Posted Apr 26, 2000
Authored by Venglin | Site freebsd.lublin.pl

Plogd v2 (Revision 1.5) is a syn/udp/icmp packet logger for freebsd.

Changes: Fixed fd leak, misc bugfixes.
tags | udp
systems | freebsd
SHA-256 | c8063e2434da5fb556ad35fc5af1b0a42d30521cf23bede1da4f7da952df83df
b0f3-ncurses.txt
Posted Apr 24, 2000
Authored by Venglin | Site b0f.com

BufferOverflow Security Advisory #3 - libncurses buffer overflow in NCURSES 1.8.6 on FreeBSD 3.4-STABLE. Setuid programs linked with libncurses can be exploited to obtain root access.

tags | overflow, root
systems | freebsd
SHA-256 | d3900b7fe44530224283ef6bcd98f8704f6c629dab6bcb828e3d5083c81ea48e
gibd00r3.c
Posted Apr 21, 2000
Authored by Axess | Site b0f.com

gibd00r3.c is a passworded backdoor which pretends to be an ident daemon.

SHA-256 | 7b6db7e36e91a54f7173f857cc6b40ffcb38c863277fe0fb28b5d164b0d398fd
nschecker.sh
Posted Apr 21, 2000
Authored by Axess | Site b0f.com

nschecker.sh NS Security Scanner - Uses dig to query the bind version from a list of ips.

SHA-256 | 5203f72cc2e3666b7f8f06351f3fb5b0e8001b4e13f7f85d62b9195dd6f98dbd
Page 1 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Malware Operators Use Copyright Infringement To Lure In Businesses
Posted Nov 1, 2024

tags | headline, malware, cybercrime, fraud
FakeCall Malware Menaces Android Devices
Posted Oct 31, 2024

tags | headline, malware, phone, google
Chinese Attackers Accessed Canadian Government Networks For Five Years
Posted Oct 31, 2024

tags | headline, hacker, government, canada, china, cyberwar, spyware
Windows Themes 0-Day Bug Exposes Users To NTLM Credential Theft
Posted Oct 31, 2024

tags | headline, hacker, microsoft, data loss, flaw, password, zero day
Yahoo Discloses NetIQ iManager Flaws Allowing Remote Code Execution
Posted Oct 31, 2024

tags | headline, flaw, yahoo
North Korean Nation State Threat Actor Using Play Ransomware
Posted Oct 31, 2024

tags | headline, government, malware, cybercrime, cyberwar, cryptography, north korea
Prosecutors Seek A 17-Year Prison Term For Pentagon Secrets Leaker Jack Teixeira
Posted Oct 31, 2024

tags | headline, government, usa, data loss, cyberwar, military
LottieFiles Supply Chain Attack Exposes Users To Wallet Drainer
Posted Oct 31, 2024

tags | headline, hacker, privacy, malware, data loss, cryptography
Intel And AMD Chips Still Vulnerable To Spectre Flaw
Posted Oct 30, 2024

tags | headline, flaw, intel
AI Bug Bounty Program Yields 34 Flaws In Open Source Tools
Posted Oct 30, 2024

tags | headline, botnet, flaw
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close