exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2003-04-05

ath0.c
Posted Apr 5, 2003
Authored by Cyber Bob

This script uses the linux ping command to simulate the +++ATH0 bug represented in modems that have thier gaurd time set low. Consider this a version of gin.c that actually works... but it is also more efficient in a way because of the emplementation of "ping".

tags | denial of service
systems | linux
SHA-256 | ad188dd1d0e4912673cdad5d3b3e4fa6f80962690fec38012d2b615413e7a23f
stuff.c
Posted Apr 5, 2003
Authored by Cyber Bob

stuff.c v1.0 sends an illegal character for ppp frames, causing a packet of double size to be returned.

tags | denial of service
SHA-256 | 6ffa52818243eca9d792e090449bb997f9a1f740b3ebe0cc9d96ca1ad2c40abf
stegtunnel-0.2.tar.gz
Posted Apr 5, 2003
Authored by Todd MacDermid | Site synacklabs.net

Stegtunnel is a tool written to hide data within TCP/IP header fields. It was designed to be undetectable, even by people familiar with the tool. It can hide the data underneath real TCP connections, using real, unmodified clients and servers to provide the TCP conversation. In this way, detection of odd-looking sessions is avoided. It provides covert channels in the sequence numbers and IPIDs of TCP connections.

tags | encryption, tcp, steganography
SHA-256 | ebef4d7fb76c4d35e30fe24a2260a12237b058adad112fa1c746f7a0277b289c
regexploit.c
Posted Apr 5, 2003
Authored by ThreaT | Site chez.com

Local exploit/trojan that makes use of REGEDIT.EXE. Any file containing a value of more than 260 characters causes an error exception by the RegSetValueExW function, which then uses a function of NTDLL.DLL which is vulnerable.

tags | exploit, local, trojan
SHA-256 | c874fde4ec04f62e0bde41e571ba6761e1c46629f665638a2753eb90b45c1471
OpenFuckV2.c
Posted Apr 5, 2003
Authored by SPAX | Site spabam.tk

Remote exploit for Apache + OpenSSL v0.9.6d and below. This exploit is based upon the openssl-too-open exploit by Solar Eclipse and offers more than 130 targets including various flavors of Linux. Updates: More targets have been added and this version of the exploit also attempts to download the ptrace exploit, compile, and execute it in an attempt to gain root privileges.

tags | exploit, remote, root
systems | linux
SHA-256 | a47755378b773f335a74bb7a4b40dcd8af408322961e6a3c7e5252d068998e50
yabbse.pl
Posted Apr 5, 2003
Authored by SPAX

Yabase v1.5.0 remote exploit to spawn bash shell with Apache uid.

tags | exploit, remote, shell, bash
SHA-256 | 58656cc32a0af4370be32b024340a8b698195d4cb03ac29dfab328c01e3fb61e
abyss.txt
Posted Apr 5, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Abyss Web Server v1.1.2 and below has a denial of service vulnerability where the server can be crashed remotely via uncompleted fields.

tags | exploit, web, denial of service
SHA-256 | d86a3e89daf4e0b1c43cb68523417f0347659320ea71449cfdd0694782755813
xlock-XLOCALEDIR.c
Posted Apr 5, 2003
Authored by Omega

Local root exploit utilizing the overflow in XLOCALEDIR under XFree86 Version 4.2.x using xlock. Written to work on Redhat 7.2.

tags | exploit, overflow, local, root
systems | linux, redhat
SHA-256 | 4f06feb2008a323c9ee1ec5fc10c12fb0db7abdec79524c84490367295d8d227
SRT2003-04-04-1106.txt
Posted Apr 5, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations Advisory 1106 - The AOLServer Proxy Daemon API contains exploitable syslog() calls in nspd/libnspd.a. This vulnerability is remotely exploitable.

tags | advisory
SHA-256 | 68e25eb097cfab06cdbd23579c0aa94b2ed828355e93606d120a274ab998f1fe
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close