what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files from Loophole

Email addresspigspigs at yahoo.com
First Active1999-12-14
Last Active2001-03-06
hhp-gdc_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-gdc_smash.c is a local root exploit for gdc. Requires group wheel access. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
SHA-256 | 59ac3f8c25947407d2c2124b1b923963380381d66406ef270bdd57b3c00baae5
hhp-ospf_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-ospf_smash.c is a local root exploit for ospf_monitor. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
SHA-256 | b3df13e1c7b793947794b12771072086104e86b8f0f39f8f17d3b3f017cad2b0
hhp-webinfo.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

This little utility will use a public service (netcraft) to check the web server version and operating system of a remote host.

tags | remote, web
SHA-256 | 9daeb72af38ace3ab3f9e5d03f959dc534f506d19b3bca2a347b14881c7f11c5
hhp-knock_shellcode.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Shellcode which plays audio (knock knock) vi /dev/dsp and setreuid(0,0) + execve shellcode for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | a45331428e22c886119ae7325c4e640708d51d8be28eb45a5a5c17f3fa5b13a9
hhp-GnomeScott_smash.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

GnomeScott local buffer overflow which provides a gid=40 (game) shell on SuSE 6.4 and 7.0.

tags | exploit, overflow, shell, local
systems | linux, suse
SHA-256 | b91af559b80952154115640a2ad71c7a3af251836cff99bde6dad6259ee95e28
hhp-gnomehack_smash.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Gnomehack local buffer overflow exploit which provides a gid=60 (games) shell on Debian 2.2.

tags | exploit, overflow, shell, local
systems | linux, debian
SHA-256 | 5ccc4924acae3a7b73ecd24a19febb73d31ccc8e7ed7d704614e4dcbd8d4550a
hhp-kwintv_smash.c
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Kwintv local buffer overflow exploit which provides a gid=33 (video) shell on SuSE 7.0.

tags | exploit, overflow, shell, local
systems | linux, suse
SHA-256 | d44863b348783f75efca589a0a0b99b6a150e833cd2e1dd95d32999361050380
hhp-dtors.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Generic ELF .dtors exploit.

SHA-256 | 7e4fcc9e325b71ea4dd0f30de481f4eb9dcb0403da041f927b6e200a7a9d57d4
hhp-genchains.pl
Posted Dec 31, 2000
Authored by Loophole, hhp | Site hhp-programming.net

Ipchains firewall frontend - Prompts enabled.

SHA-256 | 79f4d5c6dd2281fff7d8406580199d4e0cd4abdc137d8e7af428569d2d60ced3
hhp-stonx_smash.c
Posted Dec 28, 2000
Authored by Loophole, hhp | Site hhp-programming.net

STonX v0.6.5 and v0.6.7 local root exploit. Tested on Slackware 7.0.

tags | exploit, local, root
systems | linux, slackware
SHA-256 | c751c9ecd87655ab1f2703c193c5080ea84909a0b48d28666ce7f32edbf5b25e
hhp-kermit_smash.c
Posted Sep 19, 2000
Authored by Loophole, hhp | Site hhp-programming.net

C-Kermit local exploit. Versions 7.0.197 and below are vulnerable. Tested on Slackware 7, where it is not suid. It is suid on Olivetti X/OS R2.3, 3.x.

tags | exploit, local
systems | linux, slackware
SHA-256 | b1c58ec5e7f44694f976de55f2766d8a2088c17241a91eff5815c66be7258e40
hhp-PMS.tar.gz
Posted Jun 26, 2000
Authored by Loophole, hhp

pms.pl is watches for certain running processes and alerts you via /dev/speech when they start.

tags | system logging
systems | unix
SHA-256 | e43969bd8b52cef54eed32fc170fda5e248565c948046a25250e12d54c508f9b
hhp-SSH_TROSNIFF.tgz
Posted Jun 21, 2000
Authored by Loophole, hhp

hhp-trosniff is a complete package of patches to modify ssh, ssh2, sshd, ssh2d, and opensshd to extract and log the Incoming/Target HostName/UserName/Password. Intended to log brute force attacks and deleted users who try to gain access.

tags | system logging
systems | unix
SHA-256 | dcd2446c221b1f508f4cb4f10180ef49e02bc7c6f6175b03fbda534c2fe97489
hhp-whois_adv0013.txt
Posted Dec 14, 1999
Authored by Loophole, hhp | Site hhp.perlx.com

Whois.CGI - ADVISORY (hhp) Hole in several known/unknown vulnerabilities in Whois CGI packages. Affected are Whois Internic Lookup version 1.0, CC Whois Version 1.0, and Matt's Whois Version 1. These versions allow execution of commands due to lack of shell escape character parsing.

tags | exploit, shell, cgi, vulnerability
SHA-256 | 2360cca9573c4bd4934cb2e44e71bf956a22efa26aedae17ea0768db32124048
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close