what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2003-08-26

monosex.c
Posted Aug 26, 2003
Authored by ^sq | Site u-n-f.com

monop local exploit that achieves privilege escalation to the second player's uid.

tags | exploit, local
SHA-256 | cf992dfea23b0560132cbee0d12b1b8ce15c6fc35a58e26d678e31f2cf9e5077
THCREALbad.zip
Posted Aug 26, 2003
Authored by Johnny Cyberpunk | Site thc.org

Helix Universal Server aka Real Server versions 7, 8, and 9 remote root exploit for both Windows and Linux. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

tags | exploit, remote, root
systems | linux, windows
SHA-256 | 15c91505e6cbf8608eb58beff61b02cf4d5a2601de86f3c901a8f1d588027c3a
lkl-0.1.0.tar.gz
Posted Aug 26, 2003
Authored by Carlo Comin | Site spine-group.org

LKL is a userspace keylogger that runs under linux x86/arch. LKL logs everything which passes through the hardware keyboard port (0x60). Keycode to ASCII translation is supported.

Changes: PS2 bug fixed, addition of US, French, and Dvorak keymaps.
tags | x86
systems | linux
SHA-256 | 044171738ef8d204530208c5e41d2ef4908d2386129b3558059e68eea2648923
HexView Security Advisory 2003-08-03.01
Posted Aug 26, 2003
Authored by HexView, SGI Security Coordinator | Site sgi.com

SGI Security Advisory 20030803-01-P - A vulnerability has been reported by sendmail.org that the 8.12.8 and earlier releases shipped with a potential problem in DNS mapping that could lead to a remote denial or service or root compromise. Relatedd CVE Number: CVE-2003-0688.

tags | advisory, remote, root
SHA-256 | f599f483c03b2a7dbaa048e9abd60ad17327c2a14fc6add6523e23542a45abb1
aitel.html
Posted Aug 26, 2003
Authored by Dave Aitel

Helix Universal Server 9 and earlier versions (RealSystem Server 8, 7 and RealServer G2) are vulnerable to a root exploit when certain types of character strings appear in large numbers within URLs destined for the Server's protocol parsers.

tags | advisory, root, protocol
SHA-256 | 2dbb8dceb018ef54a3e9f64fe191da489067b6b3aa66be81d8e731a9d1ec9d48
SRT2003-08-22-104.txt
Posted Aug 26, 2003
Authored by Kevin Finisterre | Site secnetops.com

Secure Network Operations, Inc. Advisory SRT2003-08-22-104 - widz, the 802.11 wireless IDS system version 1.5 and below, makes use of untrusted input with a system call. If this utility were to be used in a production environment with any non-root users on the system, they would be able to easily escalate their privileges to root.

tags | advisory, root
SHA-256 | 0a5bd8db53063144a11c8d343d4ad593cd07df746dc5dac63023d1b8f5b20b2b
ieodrev.txt
Posted Aug 26, 2003
Authored by Drew Copley | Site eEye.com

eEye Advisory - There is a flaw in Microsoft's primary contribution to HTML, the Object tag, which is used to embed almost all ActiveX into HTML pages. The parameter that specifies the remote location of data for objects is not checked to validate the nature of the file being loaded, and therefore trojan executables may be run from within a web page as silently and as easily as Internet Explorer parses image files or any other safe HTML content. Version affected: Microsoft Internet Explorer 5.01, 5.5, 6.0, and 6.0 for Windows Server 2003.

tags | advisory, remote, web, trojan, activex
systems | windows
SHA-256 | dd79f9814eb5b13d2de07d11deb7d6f23493a7bf6e0bf540ffc5293f0568e45c
DSR-virobot.pl
Posted Aug 26, 2003
Authored by Knud Erik Hojgaard | Site dtors.net

Local exploit for ViRobot 2.0 that works against the FreeBSD edition. Tested against FreeBSD 4.8.

tags | exploit, local
systems | freebsd
SHA-256 | 41059e552df59b7c97ce59335d8a8059d66eb278653f384fb513f884278d70fd
SRT2003-08-11-0729.txt
Posted Aug 26, 2003
Authored by Kevin Finisterre | Site secnetops.com

Secure Network Operations, Inc. Advisory SRT2003-08-11-072 - ViRobot 2.0, the Linux-based antivirus solution, has multitudes of suids that are vulnerable to abuse.

tags | advisory
systems | linux
SHA-256 | b0f7f0118ddf986cbff764a044a771d9d65a93d009a0b5c98382c9be43058a9b
kfencev1.2.c
Posted Aug 26, 2003
Authored by ins1der

Kfence version 1.2 provides kernel protection against basic exploitation techniques, including stack and heap overflows and format string exploits, by patching /dev/kmem and redirecting system_call to test if the eip of the caller is in the wrong memory region.

Changes: Added .bss exec protection, simplified shellcode, added a better struct extraction method, added support for all 2.2.x and 2.4.x kernels.
tags | overflow, kernel
systems | linux
SHA-256 | 86b7ef83422d92d95d9b4292f22b474924bcfbca4cce50f51c33a6f418dbed1c
cryptcat2.tgz
Posted Aug 26, 2003

Cryptcat is an encrypted version of netcat. It uses AES encryption and a static key to encrypt all transactions. Previous versions had a flaw in which not all network traffic was encrypted so this is the patched version. Many thanks to Eric Sheesley for fixing this utility since the last version is no longer supported.

tags | tool
systems | unix
SHA-256 | 07d72ba5e5a5601b5d6b9d6c4dbf7a4339f25974ccdc61d11f6d4b78f2c489bd
frontkey.tgz
Posted Aug 26, 2003
Authored by ins1der

Remote administration kernel module designed for the 2.4 series. It replaces system calls by inserting a push ret at the beginning of system_call, making the program jump to specified code. It provides a remote terminal backdoor through SYS_read hooking which means you can enter the box through any open tcp port. The connection is XOR encrypted and the module hides ports and pids. It also hides itself from vmalloc structure scanning and lsmod. Tested on Redhat 7.2 and 8.0. Currently lacks SMP support and is not considered stable so please exercise caution when utilizing this.

tags | remote, kernel, tcp
systems | linux, redhat
SHA-256 | 6b9d7bae3d68b1249acacb7222865ed7c41cc99ea8d9bdfa1e45104e265d2741
intersystems2.txt
Posted Aug 26, 2003
Authored by Larry W. Cashdollar

Further information and research in regards to the InterSystems Cache vulnerabilities discussed here. Two new vulnerabilities have been discovered and exploits are included.

tags | exploit, vulnerability
SHA-256 | 728fbb24e98602c5fe921cab33d49eb861a834a80b0d955bc059096191267f54
Scan-0.2.tar.gz
Posted Aug 26, 2003
Authored by alex

This utility makes use of google.com to figure out what domains are running vulnerable PHP servers. Instructions are written in French.

tags | tool, scanner, php
systems | unix
SHA-256 | b3f19d886ee5ea1afc45226f178523ffac8207bfec016dd3e0b692e675b132ef
dnsenum.zip
Posted Aug 26, 2003
Authored by Filip Waeytens

A Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.

tags | tool, scanner, perl
systems | unix
SHA-256 | f4978177d240a78a9f740f6802aff5a4a303543634e143d074128e57b587ef0d
banscan.c
Posted Aug 26, 2003
Authored by Phender

Banner scanning utility that generates random IP addresses, can search for specified strings, and has a default list of ports to scan if not given a list. Works extremely streamlined as it spawns sixteen children processes.

tags | tool, scanner
systems | unix
SHA-256 | a29ff2cdc75b2c2460cc3322135bcc6d64cc8afd02c881149655284e653d8275
intrusion-agent.pdf
Posted Aug 26, 2003
Authored by Frederic Charpentier

White paper discussing methodologies for accessing internal networks using HTTP tunneling and tricking end users.

tags | paper, web, virus
SHA-256 | 8dce9784b0590af718a606fd4452e9c8d12319c1f0f6545582ff6576e80b13f2
fmond.tgz
Posted Aug 26, 2003
Authored by Vlad GALU

Fmond is a daemon coded for FreeBSD that will monitored targets which may get modified, written, deleted, or renamed.

tags | system logging
systems | unix, freebsd
SHA-256 | a45d6b7844b36900e6fc03c192a17725e25f49db2a7d7b86f22ca671bad09326
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close