exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Chris

Email addresschris at cr-secure.net
First Active2003-06-03
Last Active2004-08-19
pads.adv.txt
Posted Aug 19, 2004
Authored by Chris | Site cr-secure.net

Pads version 1.1 is susceptible to a stack overflow. This tool is not setuid by default so the risk is minimal. Version 1.1.1 fixes this.

tags | advisory, overflow
SHA-256 | 8eb01b9fa435907293c656e16bd644ed33b266d2e35011469b5609b3d83acfab
servme.tar
Posted Aug 7, 2004
Authored by Chris | Site cr-secure.net

Servme is a small daemon that listens on a port and logs the contents of all incoming connections to a file. New release allows emulation of ssh, Apache, VS-FTPD, telnetd, and generic open ports.

tags | tool, intrusion detection
systems | unix
SHA-256 | f151e543a15cb365cc585e937ecbf25a5817b597b04a508fd4b57d562d7ac2c0
PaX26DoS.txt
Posted May 4, 2004
Authored by Chris | Site cr-secure.net

A denial of service condition exists in the PaX kernel patch for the 2.6 series that will put the kernel in an infinite loop when ASLR is enabled.

tags | advisory, denial of service, kernel
SHA-256 | 0adbded51cf9a6b8441fa58bccc91d76d1b646be40a1f40dae448219c15501cb
reverse_backdoored_binaries.txt
Posted Apr 19, 2004
Authored by Chris | Site cr-secure.net

Well written whitepaper about reverse engineering backdoored binaries. It is meant for the beginner reverse engineer with some knowledge of ELF, C, x86 ASM, and Linux.

tags | x86
systems | linux
SHA-256 | b31fe0048b71bab934815417a3d57f26b2f50823b7d9600434d47c9c533ed212
iweb.traversal.txt
Posted Oct 30, 2003
Authored by Chris | Site cr-secure.net

Directory traversal attacks against the iWeb mini http server. Exploit URLs included. Vendor URL here.

tags | exploit, web
SHA-256 | 2b782c3d3ced2d812d2176f016730c360d3e63673b1bd7984740c4dae9d99983
Dlink_704p_Advisory.txt
Posted Aug 12, 2003
Authored by Chris | Site cr-secure.net

The D-Link 704p router with firmware version 2.70 is susceptible to multiple denial of service attacks via excessively populated URLs.

tags | advisory, denial of service
SHA-256 | 259dfe21c118eba6461f050b76150dcde4b4c110bda548460ad171c05429eaea
dlinkDoS.txt
Posted Jun 3, 2003
Authored by Chris | Site securityindex.net

D-Link routers with a firmware of 2.70 and below are vulnerable to a denial of service vulnerability providing the attacker has the ability to see the internal interface on the router. Sending a malformed URL to the syslog script will caused a DNS query. Multitudes of this query can result in a DoS and other odd forms of behavior.

tags | exploit, denial of service
SHA-256 | 802c81b31a6ec34d42defd9d16029f1790493faf92d67f06228dcf953950b333
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close