exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2000-04-19

exp-wmcd.c
Posted Apr 19, 2000
Authored by Dethy

Local exploit for Linux Mandrake 7.0's wmcdplay 1.0 beta 1. Unlike the Teso exploit for wmcdplay, this code exploits the -position argument.

tags | exploit, local
systems | linux, mandrake
SHA-256 | eed00eb19c97858a9e3a92302523c50bd3259f79d45239243286e9ab1b43681f
x11amp.txt
Posted Apr 19, 2000
Authored by Grampa Elite

Vulnerability: Any user can overwrite any file in the system with x11amp ver .70.

tags | exploit
SHA-256 | f854507d6d5cef408de353bd42cf556273c973adfc5e305c7058e4a61a099eab
ids.ps
Posted Apr 19, 2000

Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection

tags | paper, denial of service
SHA-256 | 2159a30060cec7d5e267b083c2935a46e14e8b1e37d3534565f3efa1ef7b3539
mrtg-2.8.12.tar.gz
Posted Apr 19, 2000

MRTG is a The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing GIF images which provide a LIVE visual representation of this traffic. Check https://www.ee.ethz.ch/stats/mrtg/ for an example. MRTG is based on Perl and C and works under UNIX and Windows NT. MRTG is being successfully used on many sites around the net.

tags | tool, web, perl
systems | windows, unix
SHA-256 | 04f52e0390bd6cc108991b7624c21faa480891f43b97c671a973436de3a5f26b
FreeBSD Security Advisory 2000.13
Posted Apr 19, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:13 - generic-nqs v3.50.7 and earlier from the ports connection contains a local root compromise.

tags | local, root
systems | freebsd
SHA-256 | ef2592b6ee1f85613b4697dc9647ef182edb76c9b0b50c536c2611807caf36cc
ide_expl.mrc
Posted Apr 19, 2000
Authored by vade79, realhalo | Site realhalo.org

ide_expl.mrc is an ircii-4-4 exploit ported to mirc5.7, works reverse to ircii-4.4.c. You send the chat request instead of having them chat you, attempts to execute /bin/sh.

tags | exploit
SHA-256 | 07bb96538921b3cdfee62b6c246d8843f69f27f4c4ae7b182d900f7f81eee2fb
vtun-2.1.tar.gz
Posted Apr 19, 2000
Site vtun.sourceforge.net

VTun is the easiest way to create Virtual Tunnels over TCP/IP networks with traffic shaping, compression, and encryption. It is a user space implementation and doesn't need modification of any kernel parts. VTun supports IP, PPP, SLIP, Ethernet, and other tunnel types. VTun is easily and highly configurable; it can be used for various network tasks like VPN, Mobil IP, Shaped Internet access, Ethernet tunnel, IP address saving, etc.

Changes: This is the final stable 2.1 release. It features small cleanups, updated packages, and a Web site update. All users should upgrade.
tags | tool, kernel, tcp, firewall
systems | unix
SHA-256 | 9969309539ca09ea798ec04ecef5921b64b47129c9f14258c0084b0131ca997d
sersniff-0.0.3.tar.gz
Posted Apr 19, 2000
Authored by Jonathan McDowell | Site earth.li

sersniff is a program for tunnelling/sniffing for between 2 serial ports, written to help aid with the decoding of the protocol for the Nokia 9000i Communicator. It also has support for TCP connections.

tags | tcp, protocol
systems | linux
SHA-256 | 7adb899fac13a9a2cbf14b0ab190cbb4945e712b35717a2822a31c8e67372857
lincity.c
Posted Apr 19, 2000
Authored by Tfreak | Site hack.co.za

lincity-svga local buffer overflow.

tags | exploit, overflow, local
SHA-256 | 0e992f611058e6475b476b93e2fd3551b88d4998ced583ba5f74cac10c7f8afa
nessus-1.0.0pre2.tar.gz
Posted Apr 19, 2000
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 330 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.

Changes: Login time segfault fixed, and various GUI fixes.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
SHA-256 | 8354df17a4303145db8268d78cb122bd7bcea882785e20967e3b97731f5c5ac8
lprm-bsd.c
Posted Apr 19, 2000
Authored by Niall Smart | Site hack.co.za

lprm-bsd.c - Exploit for lprm local root vulnerability in OpenBSD and FreeBSD-stable.

tags | exploit, local, root
systems | freebsd, bsd, openbsd
SHA-256 | 5064c9b186987b843722ade89337e97adf457061ef2df4def5af44727cbd370f
named_dump.sh
Posted Apr 19, 2000
Site hack.co.za

ISC BIND 4.9.7-T1B local exploit - The named daemon will dump the named database to /var/tmp/named_dump.db when it receives a SIGINT signal. It does not check for symbolic links while doing so and can be made to overwrite any file in the system.

tags | exploit, local
SHA-256 | 7fa0d1d6006035097d0506453bbfab039ef2cfd3493040c536282fb994572502
imap_core.sh
Posted Apr 19, 2000
Authored by Mudge | Site l0pht.com

imap_core.sh is a quick proof of concept tool that causes some imapd implementations to dump core. Unfortunately the core file contains the password and shadow password file in it!

tags | exploit, proof of concept
SHA-256 | 5e97f6397d4e546bc641fcd0059100b35a6649499f07bf90d15bf975d7a592ee
ltrust.c
Posted Apr 19, 2000
Site hack.co.za

Linux kernel 2.2.14 local DoS - When accessing a file or directory with a very long path the process hangs in an unkillable state. All other processes are SEGFAULTing when trying to access unkillable process' /proc entry. So system utilities ps, w, top, killall and the like are stoppping working. Except that, the system continues to function normally. The only solution is reboot.

tags | exploit, kernel, local
systems | linux
SHA-256 | fed62f7bfada74221cc3839183f0cc7c51740bb3db917b76f9a033646deaf593
bedie.tar.gz
Posted Apr 19, 2000
Authored by Konstantin Boldyshev | Site hack.co.za

bedie is a beos (5.0/4.5) local dos exploit which exploits a kernel bug. ASM source and binary included.

tags | exploit, kernel, local
systems | beos
SHA-256 | ae01773b2e23dc02ef439825f66b171c3495bc5f91bd0bf5201e831e687897d9
bizdb.htm
Posted Apr 19, 2000
Site hack.co.za

BizDB is a web databse integration product using perl CGI scripts. One of the scripts, bizdb-search.cgi, has an unchecked open() call and can therefore be made to execute commands at the privilege level of the webserver. Remote exploit included.

tags | exploit, remote, web, cgi, perl
SHA-256 | 0231145f36e7ae2640f0dc97b6b4306c0261fc240d851610ac7e3925a5697f20
farpce.pl
Posted Apr 19, 2000
Authored by Nelson Brito | Site stderr.sekure.org

farpce.pl - Force ARP Cache Entries. Force ARP Cache Entries Perl Script was designed to help System/Network administrators to prevent ARP Cache Poisoning / ARP spoofing. It's a simple and powerful perl script, based on forcehwaddr by John Goerzen.

tags | perl, spoof
systems | unix
SHA-256 | 901b59be0ff785bba17c8553b59e3c1d7e22c94ccfcbf9bb9750261bd81ae958
b0f2-NetOp.txt
Posted Apr 19, 2000
Authored by Axess | Site b0f.com

BufferOverflow Advisory #2 - The NetOp Remote Control for NT tool allows anyone with a client to connect to the host software and download any file. Version 6 is vulnerable.

tags | remote, overflow
SHA-256 | c8aecbf2235c9cb21ac221f98f56af1a9457a30fea67a017427f132b915b270a
nt.security.check.part2.txt
Posted Apr 19, 2000
Authored by Slash | Site b0f.com

Evaluating the Security of a NT System Part II - In depth information on NT security. Includes discussion of Groups and User rights, The Administrator Account and Administrators Group, The Guest Account and Everyone Group, Files Folders Permissions and Shares, Virus and Trojan Horse Controls, Auditing and Event Logs, and backup.

tags | trojan, virus
SHA-256 | a3ba4426df164c8f53bb9b8b31d38d2bce9306adea7f9f2dd16ec49f84f8514d
nmap-web-1.3.tar
Posted Apr 19, 2000
Authored by Alek O. Komarnitsky | Site sni.net

nmap-web v1.3 is a quick-n-dirty Web interface to nmap. It's some simple Perl/CGI script(s) you install on your web server which allows you to submit nmap commands (and receive the responses) through a web interface.

Changes: Add option to show ports NOT open, Add stuff to handle POP and IMAP, and bug fixes. Screen shots available here.
tags | tool, web, cgi, perl, nmap
systems | unix
SHA-256 | 8918bb87e8f342903d9bd37862343f0a882a573253e9d8d4c55f8a00cde77959
crypto-gram-0004.txt
Posted Apr 19, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM April 15, 2000. In this issue: AES News, The French Banking Card Hack, Counterpane -- Featured Research, Counterpane Internet Security News, The Doghouse: Cyber Security Information Act, Microsoft Active Setup "Backdoor", The Uniform Computer Information Transactions Act (UCITA), and Comments from Readers.

tags | cryptography, magazine
SHA-256 | 1ecdc6ce3a58a7f087fe74065e4831f41987d3282b128d31159013cf3cd45bde
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close