what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-03-20

beamcrack.zip
Posted Mar 20, 2000
Authored by Kingpin | Site l0pht.com

BeamCrack is a simple application that will set or reset the bit in each application's database header which tells the launcher that it should or shouldn't be beamable, thus bypassing the PalmPilot's infantile copy-protection.

SHA-256 | 217629f25097a18e38f40fa24472ef4c6bc44bbf1af6810bb6f8fd8c62739cb8
cisco.pix-ftp.txt
Posted Mar 20, 2000
Site cisco.com

The Cisco Secure PIX Firewall interprets FTP (File Transfer Protocol) commands out of context and inappropriately opens temporary access through the firewall. This is an interim notice describing two related vulnerabilities.

tags | vulnerability, protocol
systems | cisco
SHA-256 | d9dd5eea66870d2029e813abe94d615ab12458e3e984c0e779c9e025f32d89b2
findfixed.pl
Posted Mar 20, 2000
Authored by Missinglnk | Site tribune.intranova.net

Findfixed.pl searches through C code looking for fixed-length buffers.

systems | unix
SHA-256 | 01d0d1983a1244903c29f0891f8551f178f9ab00f53ef34a47f1e24869d2240d
gpm-root.sh
Posted Mar 20, 2000
Site hack.co.za

A vulnerability exists in the gpm-root program, part of the gpm package. A local console user can obtain root. Tested under RedHat Linux (6.2 / 6.1 / 6.0 / 6.0 / 5.2 / 5.1) and Debian Linux (2.2 / 2.1 / 2.0).

tags | exploit, local, root
systems | linux, redhat, debian
SHA-256 | fdc7878064ad331939f1b74e447a8ba7472f14e883ff96a2f93eaecb0a3154f5
imexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween 4 local root exploit for imwheel-solo. Other distros maybe affected as well.

tags | exploit, local, root
SHA-256 | 7300584731a280968e5f1a1b1f9f36318180b511c516ed48887ec106be3e6d96
isoaq61.zip
Posted Mar 20, 2000
Site connect.to

Good crack for ICQ, the best. Trust me.

SHA-256 | a61ee154ca244e2327bc6274756a3f6dd0a2acb2de4c3b3937f7c3d07e33f73a
led_color.c
Posted Mar 20, 2000
Authored by Larry W. Cashdollar | Site team-teso.net

Overflows the -l arg buffer in wmcdplay due to a bad sprintf call. Tested on Mandrake.

tags | exploit, overflow
systems | linux, mandrake
SHA-256 | dcaf4f08e182ca245fd5a67f7a6513167be09b045d4dbb23c1b92103c9d70d18
melik.zip
Posted Mar 20, 2000
Site connect.to

Meliksah nuke v2.5 is one of the best nukers in existance.

tags | denial of service
SHA-256 | 88c8fbd4dd392ec27178cf0c79fd32e85cee7441269a899f38532cd24bd1a301
printtool.sh
Posted Mar 20, 2000
Authored by Phonic | Site hack.co.za

printtool is an X11 printer configuration tool shipped with RedHat Linux and possibly other linux distributions. When configuring a printer with printtool, the permissions of the config file are set world-readable. When this happens, this script will kick in and give you the password.

tags | exploit
systems | linux, redhat
SHA-256 | 7595d758939654cb1d717d248da15ef5cdd8257cceeab9d8435768872eebf6a1
reset_state.c
Posted Mar 20, 2000
Authored by Andrew Alston

reset_state.c exploits a recent bug in pix firewalls which drops an entry in the state table when a rst packet is received.

tags | exploit
SHA-256 | fbd4f85d44914f1cf74917bc5237cc57b2f2878219c337a7f80ec6aed8e49709
spawncmd.pl
Posted Mar 20, 2000
Site hack.co.za

Spawn a command shell on remote host with MSADC.

tags | exploit, remote, shell
SHA-256 | 3b3d993144d7e5d8ebee215008210e705944ca13dfff4aadcaaf701627f586af
wmexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween Linux 4.0 and Debian Linux 2.1 local root exploit for wmcdplay. Other distros are maybe affected as well.

tags | exploit, local, root
systems | linux, debian
SHA-256 | b9017f7829fe03f891ee34fded6071de2ba1348fee2276fddd5db8f9193120dc
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close