exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2002-09-19

adore-0.42.tgz
Posted Sep 19, 2002
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Added devpts fix, fixed is_secret64() to properly hide files, and fixed a memory leak.
systems | linux
SHA-256 | ee53884a983a43ec25707f506863dc74451ddf00c166ffe16702abe049b32a70
burneye-1.0-linux-static.tar.gz
Posted Sep 19, 2002
Authored by teso | Site teso.scene.at

Burneye ELF encryption program, x86-linux binary, version 1.0 - new year release!

tags | x86
systems | linux
SHA-256 | abb3b6307900d42db68bca1fe91b32ee37668ddf3c3bc2481803bfd3c64fe830
burneye-stripped.tar.gz
Posted Sep 19, 2002
Authored by teso | Site teso.scene.at

Stripped burneye sources, for educational purposes (beside the speech + article).

SHA-256 | 6930a9cad59edd2543fbb07609b403472baa7babb7dcb0d0d20eeb60059386ad
HexView Security Advisory 2002-09-02.01
Posted Sep 19, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020902-01-I - SGI IRIX 6.5 systems apply world-readable permissions on all coredumps. This can allow local users to disclose sensitive information from system coredumps. This affects IRIX versions prior to 6.5.15.

tags | local
systems | irix
SHA-256 | 8865c4316b71f35b8b1d3a39f7a567c21b5039bfae4604de43980cfb6abfae49
HexView Security Advisory 2002-09-01.01
Posted Sep 19, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020901-01-A - It has been found that several operating systems have insecurely implemented the IGMP protocol and several attacks can be used to take down network segments that are being routed by such systems. SGI acknowledged the problem but did not release patches yet.

tags | protocol
SHA-256 | 08b944c933f57062e0415a18cfab72760323dd032a31c138c3794625199b5b1c
sara-4.0.1.tgz
Posted Sep 19, 2002
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Added XML format to ReportWriter, Updated to CVE Version 20020625, Added 'dig' support for dns checks, Updated smb.sara to handle new rpcclient arguments, Added test for backdoor based on bnc variant, Added test for binshell backdoor, Added test for OpenSSL vulnerabilities, Added test for OpenSSH vulnerabilities, Added tests for PHP vulnerabilities, Added test for Apache pre 2.0.39 (non Unix) exploit, Fixed configure to build rpcgen correctly, Fixed problem with tcpscan.sara, Fixed problem with MS Terminal tutorial, Fixed HTML error in tutorials (problem with MS Word conversion), and enhanced the correction facility in the ReportWriter.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 437ac39377017a6b8e21b0d7657972f364942993f9aa15419e8937d9d70a2204
ES-cisco-vpn.c
Posted Sep 19, 2002
Authored by electronicsouls

Cisco VPN 5000 Linux client version 5.1.5 local root exploit that uses the close_tunnel binary.

tags | exploit, local, root
systems | cisco, linux
SHA-256 | ace076932d0664c2056944cff5c03f7c2d82699188fdeea7f90ecefb6ae7e279
cisco-vpn-5000-lnx.c
Posted Sep 19, 2002
Authored by Zillion | Site safemode.org

This exploit abuses a local buffer overflow in the Cisco VPN 5000 Linux client v5.1.5 close_tunnel binary to spawn a root shell.

tags | exploit, overflow, shell, local, root
systems | cisco, linux
SHA-256 | 34bafeee302ca398ef823196ebb28939ffd4c7fc879cf8d54ed08151f5f4034e
091802-ISSC
Posted Sep 19, 2002
Authored by Tony Bettini | Site foundstone.com

Foundstone Labs Advisory 091802-ISSC - A vulnerability found in the manner used by Internet Scanner to parse certain types of non-standard HTTP responses can result in a remotely exploitable buffer overflow condition. This affects Internet Scanner version 6.2.1 for Windows (NT/2000) and has been corrected with X-Press Update 6.17.

tags | web, overflow
systems | windows
advisories | CVE-2002-1122
SHA-256 | 655c1b08b83654c57d4a7f81aaac0806532b8ff0621b06ad39c9e03d7f841c8b
k3.c
Posted Sep 19, 2002
Authored by Sacrine | Site netric.org

k3.c is a Linux proof of concept exploit for a buffer overflow vulnerability that exists in the atftp client version 0.5 and 0.6.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | c88dc7b4f80fa1f4177433c0caa63dacaa45a74d5342a1f914ded575b8ce3386
personal_ftp.txt
Posted Sep 19, 2002
Authored by Ernesto Tequila | Site MRdownload.de

Personal FTP 4.0 stores all user names and passwords in the program in clear text, making it often possible to download all the users passwords.

SHA-256 | 4181e7f6b58a63526cec229d1d3ad58588252fdd1e3681f7f083a1f7753e2193
apache-linux.txt
Posted Sep 19, 2002
Authored by Nebunu

Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.

tags | exploit, worm, shell, x86, tcp
systems | linux
SHA-256 | d556b921afa65987fbfce40ecaf730bfb6ad9fb761d32e4aaff71b95149502eb
free-apache.txt
Posted Sep 19, 2002
Authored by Nebunu

FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.

tags | exploit, worm, shell, tcp
systems | freebsd
SHA-256 | f406bf2bf696f6639b1cc39d57ebe81efe602557b5527375dfa26c0efe708046
bof4kids2.txt
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

Buffer Overflows for Kids part 2 - This is part two, the follow on from bofs4kids. In this tutorial I am going to attempt to give you the knowledge to be able to e exploit a program, without coding in C. But we will need to use gdb quite a bit, so any prior knowledge would be helpful but not necessary.

tags | overflow
SHA-256 | 39a87ffcaf6f339e334dc1cda6f41e33561a41b19cd6e1c899d2b2fa9e343ef2
bofs4kids.txt
Posted Sep 19, 2002
Authored by Bob, dsr | Site blaat.dtors.net

This tutorial is not going to teach you how to code an exploit, but what it is going to do is give you a good understanding of what a buffer overflow is, what types of buffer overflows there are, how we would go about exploiting a buffer overflow, and how to identify a buffer overflow. C and ASM knowledge is not required.

tags | overflow
SHA-256 | 3b09e6c7b77a96b63d7b66bb3c986b732511691a13617d29880e2b53c3d34f5a
lastloge.c
Posted Sep 19, 2002
Authored by Danny | Site ebcvg.com

Lastlog log editor.

tags | tool, rootkit
systems | unix
SHA-256 | 602feed9a779a7106619a527ad02835fd6bddabf4eb46d84ef3a54902c3ff825
lastlog.txt
Posted Sep 19, 2002
Authored by Danny | Site ebcvg.com

This tutorial was written to show Unix users how to create a simple Unix LogFile editor.

tags | tool, rootkit
systems | unix
SHA-256 | d4ad19517e0180b17fd80c7d62561eae9a764b3d79eb2c17e3b94b0d1d1dd2f5
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close