what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files from scut

Email addressscut at team-teso.net
First Active1999-08-17
Last Active2003-08-10
objobf-0.5.0.tar.bz2
Posted Aug 10, 2003
Authored by teso, scut | Site team-teso.net

objobf is an obfuscater for x86/Linux ELF relocatable object files (.o files) that can produce fancy graphs to visualize function structures. Released at CCCAMP 2k3.

tags | x86
systems | linux
SHA-256 | 3afd6cb33f2bc2f444e4ae31ac730f84c53f71705207242063224711f8832449
reducebind.c
Posted Jan 27, 2003
Authored by teso, scut | Site team-teso.net

This utility converts a dynamically link Linux IA32 ELF binary to a static binary.

systems | linux
SHA-256 | b2f98619b069e576e51819658cb1142cc8d9a95a54a65bd7749c5f19124f8240
sparc.c
Posted Jan 5, 2003
Authored by teso, scut

Remote root exploit for Solaris Napalm heap overflow - SPARC version. Tested against SunOS 5.6, 5.7, 5.8, and 5.9. Attempts to add a root shell to inetd.conf.

tags | remote, overflow, shell, root
systems | solaris
SHA-256 | 31f1d3a448b985faea7b24302d4c77d14c5872c6dedf6a8acaba2c2b9b0d7b07
7350squish.c
Posted Jul 18, 2002
Authored by scut, Lorian | Site team-teso.net

7350squish is a Linux / x86 Squid remote exploit. Tested against Debian Squid_2.3.4-2, squid_2.4.1-1, and squid_2.4.2. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, x86
systems | linux, debian
SHA-256 | c9d3a3dd4dd2f657e576ad62e4b0332e4678ac9a512951acc8c4fe28403a63ef
7350963.c
Posted Jul 18, 2002
Authored by scut | Site team-teso.net

Solaris /bin/login remote root exploit for SPARC and x86. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, x86, root
systems | solaris
SHA-256 | 9a7dc0465ec7420e64c78c101c235a1124f003775a78c77e6d511355683dc689
irix-mips-bind.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

364 byte MIPS/Irix PIC port binding shellcode (source included)

tags | shellcode
systems | irix
SHA-256 | c46107fcb5c7497a3d6dd32bc368da7cc825324bae592dbed4b55090d2e2f813
irix-bin-sh.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

68 byte MIPS/Irix PIC execve shellcode (source included)

tags | shellcode
systems | irix
SHA-256 | 6d61eb0821d6cdc026bbc6ae30e9581bf9cef4c2446a60a4aa61309df60b9559
7350854.c
Posted Feb 22, 2002
Authored by scut | Site team-teso.net

7350854 - x86/bsd telnetd remote root exploit which takes advantage of the AYT buffer overflow. Tested against BSDI BSD/OS 4.1, NetBSD 1.5, FreeBSD 3.1, FreeBSD 4.0-REL, FreeBSD 4.2-REL, FreeBSD 4.3-BETA, FreeBSD 4.3-STABLE, and FreeBSD 4.3-RELEASE.

tags | exploit, remote, overflow, x86, root
systems | netbsd, freebsd, bsd
SHA-256 | 042fbb8216e3f92fad1e57df03d06a841a1450db42a5c0124584533b112dc627
formatstring-1.2.tar.gz
Posted Oct 11, 2001
Authored by teso, scut | Site team-teso.net

Exploiting Format String Vulnerabilities v1.2 - Includes over 30 pages of well organized information along with several examples.

tags | paper, vulnerability
systems | unix
SHA-256 | 4ec81ccf82417d72ae0551b3d1085e97a9b9867f7c180e6ba8dd7c5b18eb6b66
iob-0.1.tar.gz
Posted Oct 11, 2001
Authored by teso, scut | Site team-teso.net

IOB stands for I/O bridge, a simple tty chaining program. It can be used to log almost any session, including ssh, gpg, pgp, cfsattach, losetup, etc.

SHA-256 | 29c258374e9799d3f17c6e1042df216aa63e48c532e3dc875a467a0d72b893c3
teso-advisory-011.txt
Posted Jul 29, 2001
Authored by teso, scut | Site team-teso.net

TESO Security Advisory #11 - Multiple vendor Telnet Daemon vulnerability. Most current telnet daemons in use today contain a buffer overflow in the telnet option handling. Under certain circumstances it may be possible to exploit it to gain root privileges remotely. Affected systems include BSDI 4.x, FreeBSD, IRIX, Linux with netkit-telnetd < 0.14, NetBSD, OpenBSD 2.x, and Solaris.

tags | overflow, root
systems | linux, netbsd, solaris, freebsd, irix, openbsd
SHA-256 | 4849ac76d26caec6f947c4879fceb873db9d4fbf399d4ebadda0a88587f6c0ba
ldistfp-0.1.4.tar.gz
Posted May 30, 2001
Authored by teso, scut | Site team-teso.net

Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.

Changes: Bugfixes, new fingerprints, and an auto-update facility to get new fingerprints.
systems | linux, unix, bsd
SHA-256 | 2a08fdfb2ef25619d4dea35c00c18c685ae1ce253062aac1ea47fecf74f5383e
ldistfp-0.1.3.tar.gz
Posted May 10, 2001
Authored by scut | Site team-teso.net

Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.

Changes: New fingerprints and added raw mode to use scanlogs.
systems | linux, unix, bsd
SHA-256 | 2dd2ec6444e1af21666eded3968c31522c21dd0e5e2746574e87fcb334c614db
7350cfingerd-0.0.4.tar.gz
Posted Apr 24, 2001
Authored by teso, scut | Site team-teso.net

Cfingerd prior to v1.4.2 remote root format string exploit. Includes information on finding offsets. Tested against Debian cfingerd v1.3.2, 1.4.0, 1.4.1, and RedHat 7.0 cfingerd 1.3.2.

tags | exploit, remote, root
systems | linux, redhat, debian
SHA-256 | 27d6d03e401bbc5d64121d7bf098b55babef4798dff575768d01cd2abac1b648
mipsshellcode.pdf
Posted Jan 19, 2001
Authored by teso, scut | Site team-teso.net

Introduction to the MIPS architecture and the IRIX operating system, focusing on how to write shellcode for IRIX. Includes 3 sample shell codes. This is an updated version of the article in Phrack 56.

tags | shell, shellcode
systems | irix
SHA-256 | 4ae9d1a99adae30ec567bcc47c657eb5fa712b7d9ea625abbd8747f87f01cfae
7350wu-v5.tar.gz
Posted Dec 31, 2000
Authored by teso, scut | Site team-teso.net

7350wu.c is a Wu-ftpd v2.6.0 remote root exploit which does it the proper way. Works on Linux/x86 and FreeBSD.

tags | exploit, remote, x86, root
systems | linux, freebsd
SHA-256 | 33f1db59facbfa0648cc1b9e7fac8958fdfbe6056b000bfbd7ca175b8b29af23
Vortrag-1.0.tar.gz
Posted Dec 31, 2000
Authored by teso, scut | Site team-teso.net

German speech given at the CCC - "exploiting format string vulnerabilities". Including examples.

tags | vulnerability
SHA-256 | fb6f4bbc3e3270eb0fdf54421051b06b4537b3129ca000b5f781fac055d4b629
ldistfp-0.1.2.tar.gz
Posted Aug 17, 2000
Authored by scut | Site team-teso.net

Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.

Changes: New fingerprints, awk statistics script, and BSD compilation fixes.
systems | linux, unix, bsd
SHA-256 | 1881f6c6fa07883c7a887aaf7ae735cd73ebac2d08bc4e0ecfac8d01639138a8
ldistfp-0.1.1.tar.gz
Posted Aug 11, 2000
Authored by scut | Site team-teso.net

Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.

systems | linux, unix, bsd
SHA-256 | a0e02ae45f7bafdea7bf1bf796fdf701738fa98fb3b7144c5532341e9495418b
7350qpop.c
Posted Jul 15, 2000
Authored by teso, scut | Site team-teso.net

qpopper 2.53 euidl x86/linux remote exploit. Includes a procedure to abuse format strings to find the correct offset. Tested on Debian 2.1, RedHat 6.1, Slackware 7, Suse 5.2 and 6.0.

tags | exploit, remote, x86
systems | linux, redhat, suse, slackware, debian
SHA-256 | d4fbf6b568b41b3a4ab5332d446981b085dcf13b1b623c727517903de3998105
zodiac-0.4.9.tar.gz
Posted Jun 19, 2000
Authored by teso, scut | Site team-teso.net

Zodiac is a portable, extensible and multithreaded DNS tool. It is meant to be used as a DNS packet monitor and DNS protocol test and debuging tool. It's basic features are: sniffing of DNS datagrams on an ethernet device, decoding of all types of DNS packets, including safe decompression (partly finished, SOA record are, for example, not decoded yet), nice display and gui, if you like ncurses and text based frontends, always interactive in all situations through built in command line, threaded and flexible design. Advanced features include: local DNS spoof handler, jizz DNS spoof, exploiting a weakness in old bind implementations, determines jizz-weakness, id-prediction and resolver type remotely, id spoofing, exploiting a weakness in the dns protocol itself, implements some advanced DNS denial of service attacks, including flood, label compression and unres attack, advanced DNS smurf.

Changes: Now runs on *BSD, and fixed some bugs.
tags | denial of service, local, spoof, protocol
systems | unix
SHA-256 | 87f79104df9555ecf18355d034a721bd7327ecf82037e1e480a0752bb07e3a14
execve-shell.tar.gz
Posted May 29, 2000
Authored by teso, scut | Site team-teso.net

execve-shell.tar.gz allows you to easily create linux x86 shellcode that execs any command you supply.

tags | shell, x86, shellcode
systems | linux
SHA-256 | 0cc554a1bcbc9a9ef9026428188060ef14886a2ba40aad275be5201d08d7fe39
l0phtl0phe-kid.c
Posted May 19, 2000
Authored by teso, scut | Site team-teso.net

l0phtl0phe-kid.c - Easy antisniff v1.02 exploit. l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks. This version has been made easy enough for script kiddies to use - to avoid that "doesn't work" lamer claim.

tags | exploit
SHA-256 | bd31032131862d82287cf734e1ae6420cdb563449a5eb13f9c348e7266dd300d
l0phtl0phe.c
Posted May 18, 2000
Authored by teso, scut | Site team-teso.net

l0phtl0phe.c - antisniff exploit (1.02 included). l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks.

tags | exploit
SHA-256 | 936d433c03025bd9a3d606c0f3d43a479b07e715b0201d0e5f316e3adcac8c05
adv3.tar.gz
Posted Feb 16, 2000
Authored by teso, scut | Site team-teso.net

Nameserver traffic amplify (DNS Smurf) and NS Route discovery (DNS Traceroute) advisory and exploit.

SHA-256 | 0aaca81a09dcafa2ee112e0e4ed74641b4256e9d1f814bdb86735574a73c2f9f
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close