what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from tracewar

Email addresstracewar at gmail.com
First Active2002-07-11
Last Active2007-05-03
VP-ASP-SQL.txt
Posted May 3, 2007
Authored by tracewar

VP-ASP suffers from a SQL injection vulnerability. Details provided.

tags | exploit, sql injection, asp
SHA-256 | 688110bd3b6796180b031f9d3cd1dc83a93d1a47dc937364764b82c320563468
vp-asp-new.txt
Posted May 22, 2006
Authored by tracewar

VP-ASP versions 6.00 through 6.08 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection, asp
SHA-256 | 1b5495f9c3740506d9edae8c1736c015f16f163c6fc0bb4ef38ccbaa0eb08332
vpasp600.txt
Posted May 6, 2006
Authored by tracewar

VP-ASP version 6.00 is susceptible to SQL injection attacks. Exploitation details provided.

tags | exploit, sql injection, asp
SHA-256 | 88610c2c58aeabbf0a85467404b623b0dd9f1bf34a86fdf0a43adf16f0eafb0b
pwned-vpasp.txt
Posted Jan 29, 2006
Authored by tracewar

VP-ASP Shopping Cart version 5.50 is susceptible to SQL injection attacks.

tags | exploit, sql injection, asp
SHA-256 | 332f445af6a6c5c47f068cb8d8c03ed007441924b9c1604249e696ad8d996b1f
dl-mancgi.c
Posted Sep 7, 2005
Authored by tracewar

Man-cgi/Man2web/ManView remote command execution exploit. Tested against Man-cgi 1.11. All versions are affected.

tags | exploit, remote, cgi
SHA-256 | 3300bb4e9b0b107c205b3358667f3e44b2322107d91b974768b345a5d6beebc5
dl-cups.c
Posted Sep 7, 2005
Authored by tracewar

CUPs 1.x denial of service exploit.

tags | exploit, denial of service
SHA-256 | ff8f9da2b2ed05af80951b23e43eb74ed987f6722dc4d1ea584c2d80c7787aa3
twlib.tar.gz
Posted Jul 21, 2005
Authored by tracewar

Simple replacement binaries for netstat, ls, and ps that enable an attacker or administrator to hide specific strings.

tags | tool, rootkit
systems | unix
SHA-256 | 60b4569d41899121ba50b99fc410a2bd24142d5f2c7bf9931f2512e999cf5ae0
login-back.c
Posted Oct 2, 2003
Authored by tracewar

Backdoor for login where the original binary must be renamed and only gets called whenever the remote user's TERM variable is not set to the magic password. If the magic password is set, the user gets the option of a shell with or without logging.

tags | tool, remote, shell, rootkit
systems | unix
SHA-256 | e3fb9f9f65c704ddf3602b2cf854c54524ca1cacb73518276e083cfaff3953db
tw-imap.c
Posted Aug 1, 2002
Authored by tracewar

IMAP4rev1(lsub) remote exploit. Tested against v12.264, 12.250, 11.241, and 10.223. Requires username and password. Includes offsets for Red Hat and Slackware.

tags | exploit, remote
systems | linux, redhat, slackware
SHA-256 | fab9c3c9f5c88eb5ccef31cc210a623985245fd8043724121dc1b172c2b35492
twgen.c
Posted Jul 31, 2002
Authored by tracewar

Class a/b/c ip list generator.

tags | tool, scanner
systems | unix
SHA-256 | cab6ef757f8875a2ca483e53e574b580bfad6bc37676c6d0f66b6c4194a221b6
snmpXauto.c
Posted Jul 11, 2002
Authored by tracewar

SnmpXdmid auto rooter based on snmpXdmid exploit from https://lsd-pl.net.

tags | exploit, web
SHA-256 | 94ebe956f7f5a101e3099ef94b7ebd458085d3ce2490d32e37966d74a51c61e6
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close