what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Mnemonix

Email addressdlitchfield at atstake.com
First Active1999-08-17
Last Active2000-10-05
A100400-1
Posted Oct 5, 2000
Authored by Mnemonix | Site atstake.com

Atstake Security Advisory - Microsoft's Internet Information Server 5.0 is WebDAV (RFC 2518) enabled. As part of the extra functionality provided by the WebDAV components. Microsoft has introduced the SEARCH request method to enable searching for files based upon certain criteria. This functionality can be exploited to gain what are equivalent to directory listings. These directory listings can be used by an attacker to locate files in the web directories that are not normally exposed through links on the web site. .inc files and other components of ASP applications that potentially contain sensitive information can be viewed this way.

tags | web, asp
SHA-256 | f2562bfaf09eac881c34bf6c3fc7b51eb464aca2b3cb81446d72d5bf1fc82e7c
oracle.web.listener.txt
Posted Dec 1, 1999
Authored by Mnemonix | Site infowar.co.uk

There is a vulnerability in Oracle Web Listener where a resource can be accessed when is shouldn't be able to be accessed.

tags | exploit, web
SHA-256 | edbaf44df750aefe719e9ff3f21674bad0f77af1f4d13f12053ddc777bd9e89b
formhandler.cgi.txt
Posted Nov 12, 1999
Authored by Mnemonix

FormHandler.cgi uses hard coded physical path names for templates so it is possible to read any file on the system.

tags | exploit, cgi
SHA-256 | 982f352a5e509b2e9e1fc85b0d6714be542e0e546c96f5882dc578ee003c3f13
ipccrack.exe
Posted Aug 17, 1999
Authored by Mnemonix

IPC$Crack Ver 2.0 - IPC$Crack is a command line based program that uses a dictionary based attack to attempt to learn the password of an account on an NT box. For Win95/98/NT.

tags | cracker
systems | windows
SHA-256 | b141ab9059995c591e00554e024aaf21aa112f1df6acde66e65fb8f3395a5324
nt4.trojaned.profiles.txt
Posted Aug 17, 1999
Authored by Mnemonix

Bad permissions on Windows NT ProfileList registry subkeys allow any malicious NT user to cause other users of the system to load a "trojaned" profile that could lead to a system compromise. Exploit description and vendor solution included.

tags | exploit, trojan, registry
systems | windows
SHA-256 | 54057eb398a0eeecb0fcb718eabe86ff4593d8772f67adaac7ec2fed79e5fad7
nt4.index.server.2.0.txt
Posted Aug 17, 1999
Authored by Mnemonix

Microsoft's Index Server 2.0 allows anybody to discover the physical path to directories being indexed, or if a directory found in a network share is being indexed, they can learn the name of the machine on which the share resides and the name of the user account used to access that share on behalf of Index and Internet Information Server 4.

tags | exploit
SHA-256 | 1d0ab1349677a5f4764c564c47751f2d857b11dce433226ba5d17336d4e2c794
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close