exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files from Knight420

First Active2002-12-24
Last Active2003-11-14
chemtrailX.c
Posted Nov 14, 2003
Authored by Knight420

Proof of concept local root exploit for iwconfig that is normally not setuid by default. Tested on RedHat Linux 9.0.

tags | exploit, local, root, proof of concept
systems | linux, redhat
SHA-256 | 900adc73f0a4fc2b4182803bfcc16f80cd94ca002ee0ac21aa6db656ba58a29f
dcomx.pl
Posted Jul 24, 2003
Authored by Knight420

Remote denial of service exploit making use of the vulnerability found in DCOM under Windows.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | d713c961d2e4c5c929651f387787d375feb82aa68cc35f126fa794fd0d189fdf
NetScare.c
Posted Jul 24, 2003
Authored by Knight420

Remote buffer overflow denial of service exploit for the Netware Enterprise CGI2PERL.NLM.

tags | exploit, remote, denial of service, overflow
SHA-256 | 33d051b502f0487617368e88328921009574f44a7495c5805d2770bd46b2cdd0
MaelstromX.c
Posted Jul 9, 2003
Authored by Knight420

Maelstrom local exploit that gives gid of games and makes use of the overflows found in the -player and -server switch.

tags | exploit, overflow, local
SHA-256 | 14887f12b07716692074ef4aaf28e25d942c4291ca0d8463e0ee978fed22bf34
ccbillx.c
Posted Jul 9, 2003
Authored by Knight420

CCBill remote exploit that spawns a shell with netcat and attempts to connect into the server on port 6666 to gain access of the webserver uid.

tags | exploit, remote, shell
SHA-256 | 66f3965cf4bbf7fe122e5da69fc37f2fb3c3ffe2b7aa6836d0778511c9c29de7
mdexp.pl
Posted Jan 4, 2003
Authored by Knight420

Mdaemon v6.0.7 and below remote denial of service exploit in perl. Exploits the bug described in mdaemon-dos.txt.

tags | exploit, remote, denial of service, perl
SHA-256 | d722a6f6a11389b08c0202d154193b25214a7fbaa77ae7cb01d58958651165b3
sphere.pl
Posted Jan 4, 2003
Authored by Knight420

IBM Websphere 4.0.3 for Windows 2000 Server remote denial of service exploit in perl. Exploits the bug described in websphere.crash.txt.

tags | exploit, remote, denial of service, perl
systems | windows
SHA-256 | bf898618c3bd0a71812b1c20d114644090c17ebea06aeb8f02933b56c120c1cf
smartass.pl
Posted Jan 4, 2003
Authored by Knight420

Smart Search CGI remote exploit in perl which attempts to spawn netcat listening with a shell.

tags | exploit, remote, shell, cgi, perl
SHA-256 | 041548a5386dcb8a831010770b868c0816b690100bcfde2bdb33e64959bd23d6
mount.c
Posted Jan 4, 2003
Authored by Knight420

/usr/sbin/rpc.mountd Local Exploit tested on Slackware 8.1. Test only - not setuid.

tags | exploit, local
systems | linux, slackware
SHA-256 | 35bdc9b60002a0fd0830a0017a3e2e788a9a39daacef3f7529779e71f7589149
lostlink.pl
Posted Jan 4, 2003
Authored by Knight420

Linksys BEFSR41 EtherFast Cable/DSL Router remote denial of service exploit in perl.

tags | exploit, remote, denial of service, perl
SHA-256 | 5e8f1bd72dc612280a567fcb9e559a448281a2f3f131c700d421541ee404ca46
emptypockets.pl
Posted Jan 4, 2003
Authored by Knight420

IBM Web Traffic Express Caching Proxy Server v3.6 and 4.x (bundled with IBM WebSphere Edge Server v2.0) remote denial of service exploit in perl. Exploits the bug described in R7-0007.txt.

tags | exploit, remote, web, denial of service, perl
SHA-256 | 0145ba05224abe8cd39e2bbb4563f50912ca30a674d9149f9da950d0e59bd439
artyfarty.c
Posted Dec 24, 2002
Authored by Knight420

artyfarty.c is a local root /opt/kde/bin/artswrapper exploit tested against Slakware 8.1. Artswrapper is setuid on some distributions.

tags | exploit, local, root
SHA-256 | f9e583b433b0720faaf3c2b12a611faba7d90142b62ce3a2fceaf2691c89dc77
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close