what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2002-12-11

pc-cillin.pl
Posted Dec 11, 2002
Authored by deadbeat

Pc-cillin pop3trap.exe buffer overflow exploit in perl. Return address is off a little making it a denial of service exploit, but could be tweaked to execute shellcode that downloads a trojan.

tags | exploit, denial of service, overflow, trojan, perl, shellcode
SHA-256 | 8243cebd28bc9dc9a0fc4bca0bc3789808f36fb517a6a3f0b81c499438776f38
UC-login.c
Posted Dec 11, 2002
Authored by Mikecc

SunOS 5.6,5.7,5.8 remote /bin/login root exploit which uses the vulnerability described here.

tags | exploit, remote, root
systems | solaris
SHA-256 | 762c482e53fa3ebd68fcb908fb91f3c8ff15e6d084aa07cd2ab6ce4ec51bf980
httpda.pl
Posted Dec 11, 2002
Authored by Crazy Einstein | Site lbyte.void.ru

HTTPda is a perl script that searches a remote site for forms, .cgi and .pl files.

tags | remote, web, cgi, perl
SHA-256 | a3a3bab1e06d96a25c57f97e38cf006c4f87a7a73c39b74655b5d7f80e29a0ea
sendfaild.c
Posted Dec 11, 2002
Authored by Crazy Einstein | Site lbyte.void.ru

Sendmaild.c is a local root exploit for Sendmail on BSD. Exploits the bug discussed in FreeBSD-SA-01:57. Tested on FreeBSD 4.3-RELEASE with Sendmail 8.11.3.

tags | exploit, local, root
systems | freebsd, bsd
SHA-256 | af378464c45ce674f69dcef1b241d4a304679c343fa1f55700fd04fe7f29c324
cgi-explained.doc
Posted Dec 11, 2002
Authored by Gary Brooks

Some information on the Common Gateway Interface (CGI).

tags | paper, web, cgi
SHA-256 | 8b26cd32cbd0a8326977f61fce8ef55d9a9016bc2750bd213be84e63a401d2b0
chatex.c
Posted Dec 11, 2002
Authored by b0f | Site b0f.net

/usr/sbin/chat buffer overflow exploit local exploit. Tested on Redhat 6.2. Chat is not suid by default.

tags | exploit, overflow, local
systems | linux, redhat
SHA-256 | f723fc7663cbe3a0175c84613c487f43811558694a530902e3c7948cc38375a8
libcodict-0.4.tar.gz
Posted Dec 11, 2002
Authored by blh | Site sr-71.nu

Libcodict is a user friendly "combo dictionary" C API developed in order to ease dictionary handling when developing open source security audit tools. Combo dictionaries are a different approach than the traditional plain dictionary with a user list and a list of commonly used passwords. When auditing a server environment, one of the biggest tasks are to remove all default users from old UNIX machines that never got any attention after installation. Using a list of default users and their commonly used passwords is the main idea behind this library.

tags | cracker
systems | unix
SHA-256 | 633c06df61c744d927b6cde6a656b8f6c3da902f8993b3dc83e2cb0553597cd4
idscenter109b22.zip
Posted Dec 11, 2002
Authored by Ueli Kistler | Site packx.net

IDScenter is a free configuration and management GUI for Snort IDS on Windows platform. Features: Snort 1.9 / 1.8 / 1.7 support, Snort service mode support, Snort configuration wizard (Variables, Preprocessor plugins, Output plugins, Rulesets), Ruleset editor (supports all Snort 1.9.1 rule options), AutoBlock plugin support (ISS NetworkICE BlackICE Defender plugin included, Delphi framework too), Alert notification (via e-mail, alarm sound or only visual notification), Test configuration* feature (fast testing of your IDS configuration), Monitoring of up to 10 files and MySQL alert detection (allows centralized monitoring of all Snort sensors), Log rotation* (compressed archiving of log files), Integrated log viewer, Program execution if an attack was detected, and more.

tags | tool, sniffer
systems | windows
SHA-256 | 3a88ed36a87e041f420709ee0d0fae0a1a24a406dd662453951cce94c79db13b
prodos.sh
Posted Dec 11, 2002
Authored by detach | Site duho.org

Proftpd v1.2.7rc3 and below remote denial of service exploit which requires a ftp user account or anonymous access to the ftp daemon. Consumes nearly all memory and alot of CPU. Tested against slackware 8.1 - proftpd 1.2.4 and 1.2.7rc3.

tags | exploit, remote, denial of service
systems | linux, slackware
SHA-256 | b472b47d7f8b3395438de6ee5627449c27fa18d2e9476e8790d13d7b98047093
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close