Section:  .. / 0209-exploits  /

Page 1 of 3
<< 1 2 3 >> Files 1 - 25 of 73
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: 0209-exploits.tgz
Description:
Packet Storm new exploits for September, 2002.
File Size:4528261
Last Modified:Oct 10 02:57:49 2002
MD5 Checksum:d61e47de2cd35e4a4c6debc4aecef9d2

 ///  File Name: ssh3.tar.gz
Description:
Ssh3.tar.gz is a LPRng, Named, FTPD, SSHD, RPC and Telnetd mass scanner/rooter.
Author:Daddy_cad
File Size:2241217
Last Modified:Sep 7 02:30:02 2002
MD5 Checksum:abf180ace6bd404efc6c00127e6d5213

 ///  File Name: massrooter.tar.gz
Description:
Massrooter takes advantage of vulnerabilities in bind, lpd, rpc, wuftpd, telnet, mail, ssl, and ssh on multiple systems.
Author:Daddy_cad
File Size:1505102
Last Modified:Sep 7 02:33:48 2002
MD5 Checksum:7b5a9c6d711c0796b6a85aa94c7a1f52

 ///  File Name: wuscan.tgz
Description:
Wu-ftpd 2.6.1 mass rooter / scanner.
Author:Daddy_cad
File Size:183110
Last Modified:Sep 7 02:32:43 2002
MD5 Checksum:eb2b86497f9b9f51773beea85d15123a

 ///  File Name: SSL-scan.tar.gz
Description:
Apache + OpenSSL v0.9.6d and below exploit for FreeBSD. Tested on FreeBSD 4.4-STABLE, FreeBSD 4.4-RELEASE, FreeBSD 4.5-RELEASE, and FreeBSD 4.6-RELEASE-p1 with Apache-1.3.26 and Apache-1.3.19. Modified to brute force the offset from openssl-too-open.c. Includes scanners. WARNING: The binaries in this archive are infected with the ELF_GMON.A virus which sets up a backdoor on UDP port 3049. Updated by CrZ and Ech0. Notice: Previous versions of this .tar.gz (before 3-11-03) had several binaries infected with the linux.osf.8759 virus. This tar contains both cleaned and infected binaries, with the cleaned ones running by default.
File Size:167196
Last Modified:Mar 12 06:25:12 2003
MD5 Checksum:f210224fbf3fbc145f3e84ab7c844ed1

 ///  File Name: teo-openssl-xpl.tgz
Description:
Teolupus OpenSSL Exploiter is an automated OpenSSL vulnerability scanner able to find, log and exploit a server "without human intervention". It is based on Nebunu apscan2 but has much more targets. Includes openfuckv2 and openssl-too-open both with more than 130 targets.
Author:Teolupus
File Size:146641
Last Modified:Oct 21 04:42:57 2003
MD5 Checksum:b05e333e5fa377ca6c476149ed50c8e9

 ///  File Name: apscan2.tgz
Description:
Apache OpenSSL v0.9.6d mass scanner. When a vulnerable server is found code is launched. Includes targets for Apache 1.3.6, 1.3.9, 1.3.12, 1.3.19, 1.3.20, 1.3.26, 1.3.23, and 1.3.14. Includes openssl-too-open binary.
Author:Nebunu
File Size:94609
Last Modified:Sep 30 08:37:40 2002
MD5 Checksum:f56c7c14685cd643a637f60e42497615

 ///  File Name: bugtraqworm.tgz
Description:
Linux Slapper Worm - This file contains the binaries and source code for the current Apache worm which affects multiple versions of Linux. It exploits an OpenSSL buffer overflow to run a shell on the remote system and also contains the ability to perform a DDoS attack. These files were found in the wild from machines that had been compromised.
File Size:87726
Last Modified:Sep 16 19:19:29 2002
MD5 Checksum:fc2a65953a4b98971888d9b5df4d1c53

 ///  File Name: SQLTools.rar
Description:
SQLTools is a collection of tools for auditing MSSQL servers including SQLScanner,SQLPing, SQLCracker, SQLDOSStorm, and SQLOverflowDos.
Author:Refdom
File Size:85807
Last Modified:Sep 6 08:05:17 2002
MD5 Checksum:efeeb8be77d011e25f8dc1cfb38fa77e

 ///  File Name: aspcode.c
Description:
Aspcode.c is an IIS v4.0, 5.0 5.1 asp.dll buffer overflow exploit for Windows.
Author:Yuange
File Size:45626
Last Modified:Sep 3 02:38:42 2002
MD5 Checksum:921d412df9cff8fa94e2aaff0a650ce3

 ///  File Name: cgitelnet.pdf
Description:
CGI-Telnet 1.0, a cgi telnet script that runs on various Unix and NT webservers has vulnerabilities which can be manipulated into giving a user access. The password file is accessible in the web path and passwords are kept DES encrypted.
Author:Lawrence Lavigne
Homepage:http://neoerudition.net
File Size:45271
Last Modified:Sep 2 17:35:23 2002
MD5 Checksum:cb3d0aa2678e9486c390c0e477aa0e01

 ///  File Name: targets.319
Description:
List of targets for the x2 remote crc32 ssh exploit which contains 319 entries.
File Size:34692
Last Modified:Sep 11 16:31:01 2002
MD5 Checksum:d6d6df1179ca1c74160efd5cdeb5b0c0

 ///  File Name: openssl-bsd.c
Description:
Apache + OpenSSL v0.9.6d and below exploit for FreeBSD. Tested on FreeBSD 4.4-STABLE, FreeBSD 4.4-RELEASE, FreeBSD 4.5-RELEASE, and FreeBSD 4.6-RELEASE-p1 with Apache-1.3.26 and Apache-1.3.19. Modified to brute force the offset from openssl-too-open.c. Updated by CrZ, Ech0, and ysbadaddn.
File Size:29820
Last Modified:Sep 30 11:24:51 2002
MD5 Checksum:93c74bbed4fa5628590f8a08cc6a569d

 ///  File Name: SQLScan.zip
Description:
SQLScan v1.0 is intended to run against Microsoft SQL Server and attempts to connect directly to port 1433. Features the ability to scan one host or an IP list from an input file, the ability to scan for one SQL account password or multiple passwords from a dictionary file, and the ability to create an administrative NT backdoor account on vulnerable hosts, which will fail if xp_cmdshell is disabled on the server.
Author:NTSleuth
File Size:24788
Last Modified:Sep 5 07:07:41 2002
MD5 Checksum:6e80ac480a5081c6d7b2b7381a02f471

 ///  File Name: apache-ssl-bug.c
Description:
This exploit abuses the KEY_ARG buffer overflow that exists in SSL enabled Apache web servers that are compiled with OpenSSL versions prior to 0.9.6e. The apache-ssl-bug.c exploit is based on the Slapper worm (bugtraq.c), which is based on a early version of the apache-open-ssl exploit.
Author:Andy.
File Size:19418
Last Modified:Sep 25 23:58:21 2002
MD5 Checksum:1be047c32ae0e2d1d8930d2ce4c4f7cc

 ///  File Name: openssl-too-open.tar.gz
Description:
OpenSSL v0.9.6d and below remote exploit for Apache/mod_ssl servers which takes advantage of the KEY_ARG overflow. Tested against most major Linux distributions. Gives a remote nobody shell on Apache and remote root on other servers. Includes an OpenSSL vulnerability scanner which is more reliable than the RUS-CERT scanner and a detailed vulnerability analysis.
Author:Solar Eclipse
Homepage:http://phreedom.org
File Size:18396
Last Modified:Sep 17 15:49:52 2002
MD5 Checksum:6c37282f541f13add85e5b2b76e3678e

 ///  File Name: apache-linux.txt
Description:
Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.
Author:Nebunu
File Size:18138
Last Modified:Sep 19 08:39:21 2002
MD5 Checksum:6c13247823eb45dd5c16db33f5077072

 ///  File Name: smbkillah.c
Description:
Smbkillah.c exploits the SMB death bug in the WinXX OS.
Author:b0uNtYkI113r
File Size:16004
Last Modified:Sep 5 00:54:35 2002
MD5 Checksum:6fd9ace29c75dceb75b2523f9af18d4f

 ///  File Name: pirch98.zip
Description:
Pirch98 irc client contains a buffer overflow which can allow remote code execution in the way that pirch 98 handles links to other channels and websites. The Pirch98 client now shipping at www.pirch.com has been fixed. Includes ASM source and Windows binary for an exploit which opens a shell on port 31337.
Author:Vecna
File Size:15901
Last Modified:Sep 5 09:14:24 2002
MD5 Checksum:4828fff9ebe60b2e0057cb601748011c

 ///  File Name: unishell.pl
Description:
Unicode IIS exploit in perl. Tries 20 ways.
Author:Pakk.
File Size:10904
Last Modified:Oct 22 08:58:42 2002
MD5 Checksum:b31f98e1ede92b439df11826c886cdd8

 ///  File Name: free-apache.txt
Description:
FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.
Author:Nebunu
File Size:9102
Last Modified:Sep 19 08:34:19 2002
MD5 Checksum:c951622daa65e39d1df562c2219acecc

 ///  File Name: bakkum.c
Description:
Remote root exploit for Linux systems running Null httpd 0.5.0. Tested to work against Red Hat Linux 7.3.
Author:eSDee
Homepage:http://www.netric.org
File Size:8137
Last Modified:Sep 23 16:24:48 2002
MD5 Checksum:88f53e3ca0b89baf95643a18cb9584bb

 ///  File Name: ohMy-another-efs.c
Description:
Efstool local root exploit which works against Redhat 7.3.
Author:Joker
Homepage:http://www.daforest.org/~j0ker/index.html
File Size:7612
Last Modified:Sep 20 20:11:34 2002
MD5 Checksum:c20b9e3e46a310536130a5d004e7bfff

 ///  File Name: scalpel.c
Description:
Local apache/PHP root exploit via libmm (apache-user -> root) temp race exploit. Spawns a root shell from the apache user.
Author:Sebastian Krahmer
Homepage:http://www.team-teso.net
File Size:7175
Last Modified:Nov 30 21:24:01 2002
MD5 Checksum:dcffeb448888592287ff24ca6be0c617

 ///  File Name: efstool.txt
Description:
Efstool local root exploit. A condition has been found in efstool which is shipped with Redhat and Slackware linux (and possibly other distributions) which, given the right environment, root privileges can be gained. Full research provided.
Author:ntfx
Homepage:http://www.soldierx.com
File Size:6573
Last Modified:Sep 13 00:27:30 2002
MD5 Checksum:044dc4da250fc55be975c7fb9c557d87