exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Lawrence Lavigne

First Active2002-07-03
Last Active2004-06-07
cgitelnetdbman.pdf
Posted Jun 7, 2004
Authored by Lawrence Lavigne | Site neoerudition.net

CGI-Telnet 1.0, a cgi telnet script that runs on various Unix and NT webservers has vulnerabilities which can be manipulated into giving a user access. The password file is accessible in the web path and passwords are kept DES encrypted.

tags | exploit, web, cgi, vulnerability
systems | unix
SHA-256 | e0b5370c22e2597643e3465f2bbcd9a427ce709060d55d274bb546ca92480c8e
x1bpackV1.tar.gz
Posted Jun 7, 2004
Authored by Lawrence Lavigne

The x1b pack is a series of scripts written by the author as an exercise into socket programming with perl. Included are a port scanner with banner grabbing capabilities, a DNS service enumeration script with zonetransfer, some brute forcing utilities, a CGI web scanner, and a couple of other utilities.

tags | tool, web, cgi, scanner, perl
systems | unix
SHA-256 | 61cf850f403581fc48dae6ef8c8254b82800133a5b5ac3d08085a0ec6d259413
cgivti2.V2.pl
Posted Aug 30, 2002
Authored by Lawrence Lavigne | Site neoerudition.net

Cgivti2.V2.pl uses a webserver host list provided by the user to scan for cgi, vti, msadc and several other vulnerabilities. Like cgivti.V2.pl, this script is easily configured to include other vulnerabilities.

tags | cgi, vulnerability
systems | unix
SHA-256 | 8966b5fa7d151c0547e782abcc1f118f0e7298ccb898d0f31dd4ee49e5a02865
cgivti.V2.pl
Posted Aug 29, 2002
Authored by Lawrence Lavigne | Site neoerudition.net

This scanner searches for vulnerable web servers for Common Gateway Interface and Vermeer Technology Incorporated services. Version 2 allows for Class C IP generation done "On The Fly" and a timeout scheme added thanks to MaB of Efnets #programmers.

tags | web, cgi
systems | unix
SHA-256 | 77770362b50cb7fe074dde751149a9cfecd9db1fbc1b7b09fc46c9ec41d2715f
Debug_Enviroment_Variables.txt
Posted Aug 29, 2002
Authored by Lawrence Lavigne | Site neoerudition.net

The CGI Debugger v1.0 (/cgi-bin/debug.pl) displays information that may be useful to an attacker including the document root and server version info when passed a bogus argument.

tags | cgi, root
SHA-256 | fb7ac98f8314c3a58ff56f24e2e1c29c135d75c2f619f967ff2229d80ec3171f
cgivti.pl
Posted Aug 9, 2002
Authored by Lawrence Lavigne | Site neoerudition.net

This scanner searches for vulnerable web servers for Common Gateway Interface and Vermeer Technology Incorporated services.

tags | web, cgi
systems | unix
SHA-256 | 3178e91d7d1afb673055f6147eac68be504e83bb41b722d15eb3a98d6d9a3647
null.pl
Posted Jul 9, 2002
Authored by Lawrence Lavigne | Site neoerudition.net

Null.pl is a Perl script which uses a dictionary file to launch a brute force attach against a remote host using a null session.

tags | remote, perl
SHA-256 | 5268eddc91b7e3545bc81757d6e718c037e3ea66509d15890f601a10ba2092af
whois-ex.pl
Posted Jul 3, 2002
Authored by Lawrence Lavigne, Michelle Welday

This is a perl script that checks for the whois_raw cgi vulnerability. Code ripped from Piffys issscan.pl.

tags | tool, cgi, scanner, perl
systems | unix
SHA-256 | 79a982f5b7207a58334998ccd349d93b3fadbc457f773bd51bd09e4d6b8f8b1a
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close