exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Rembrandt

Email addressrembrandt at helith.org
First Active2007-04-21
Last Active2010-03-08
Known Host Cracker 0.2
Posted Mar 8, 2010
Authored by Rembrandt, Benkei

Known Host Cracker (khc) is a small tool designed to recover hashed known_host files back to their plain-text equivalents.

tags | tool
systems | unix
SHA-256 | a72983ee744d25dfc04d40a965a434d2113971925229e2050b24ca9d099830b0
Packet Filter Null Pointer Dereference
Posted May 1, 2009
Authored by Rembrandt

PF in OpenBSD, NetBSD, and various other Unix variants suffer from a null pointer dereference vulnerability.

tags | exploit
systems | netbsd, unix, openbsd
SHA-256 | ea97857d82a2cb2bbd3b45b74c0233c3578d157ebfaccdebe90b3f664c1bca03
OpenBSD 4.5 Denial Of Service
Posted Apr 14, 2009
Authored by Rembrandt

OpenBSD version 4.5 and below suffers from a remote denial of service vulnerability in relation to handling IP datagrams.

tags | exploit, remote, denial of service
systems | openbsd
SHA-256 | b86daf70a93aba34e9521f1f85a6a18282429fbe86a0914bf39c75eb3c2379f7
Netgear SSL312 Router Denial Of Service
Posted Feb 9, 2009
Authored by Rembrandt

Netgear embedded Linux for the SSL312 router suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
systems | linux
SHA-256 | c3e60be356b391967fdc9548e0abe4b3a004387eaaa4a3ae004260d54ca97171
Debian GNU/Linux XTERM DECRQSS Weakness
Posted Jan 7, 2009
Authored by Rembrandt

Debian GNU/Linux suffers from a XTERM DECRQSS weakness that allows for remote code execution as the user id viewing the content.

tags | exploit, remote, code execution
systems | linux, debian
SHA-256 | 2cf126cfa15a92ef06cfb3ec5e1789cbdc1db4514c80b724ea3ff5178539d03d
screen_4_0_3_password_bypass_openbsd.txt
Posted Jan 6, 2009
Authored by Rembrandt

screen versions 4.0.3 and below are vulnerable to an authentication bypass vulnerability that allows local attackers to gain system access in the case where screen was locked with a password. Tested on OpenBSD.

tags | exploit, local, bypass
systems | openbsd
SHA-256 | 5a6a888bcf05d77216b3849e8465eb8daa06ba3c92c524e8aee2d252bc558b41
screen-unlock.txt
Posted Jun 7, 2007
Authored by Rembrandt

Screen versions 4.0.3 and below suffer from an authentication bypass vulnerability when it is locked.

tags | exploit, bypass
SHA-256 | b967318756ba3a99cd10614a3f1df67c080af7881ed47503fbff5decaf6edf5a
openssh-disclose.txt
Posted Apr 23, 2007
Authored by Rembrandt

System account enumeration is possible when OpenSSH versions 4.6 and below have ChallengeResponseAuthentication enabled (S/KEY).

tags | advisory, info disclosure
SHA-256 | 1ff367e663ad5227576fda522c34ea8d41163498f44a0745cfb6727e9de28a90
OpenSSH s/key Weakness
Posted Apr 21, 2007
Authored by Rembrandt

OpenSSH, when configured to use S/KEY authentication, is prone to a remoteinformation disclosure weakness.

tags | exploit, info disclosure
advisories | CVE-2007-2243
SHA-256 | 827bc6c037cf63160a94b7ff9a14a24cb084daaa8c20cf1bd442f18e90af8314
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close