what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from tracewar

Email addresstracewar at gmail.com
First Active2002-07-11
Last Active2007-05-03
VP-ASP-SQL.txt
Posted May 3, 2007
Authored by tracewar

VP-ASP suffers from a SQL injection vulnerability. Details provided.

tags | exploit, sql injection, asp
SHA-256 | 688110bd3b6796180b031f9d3cd1dc83a93d1a47dc937364764b82c320563468
vp-asp-new.txt
Posted May 22, 2006
Authored by tracewar

VP-ASP versions 6.00 through 6.08 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection, asp
SHA-256 | 1b5495f9c3740506d9edae8c1736c015f16f163c6fc0bb4ef38ccbaa0eb08332
vpasp600.txt
Posted May 6, 2006
Authored by tracewar

VP-ASP version 6.00 is susceptible to SQL injection attacks. Exploitation details provided.

tags | exploit, sql injection, asp
SHA-256 | 88610c2c58aeabbf0a85467404b623b0dd9f1bf34a86fdf0a43adf16f0eafb0b
pwned-vpasp.txt
Posted Jan 29, 2006
Authored by tracewar

VP-ASP Shopping Cart version 5.50 is susceptible to SQL injection attacks.

tags | exploit, sql injection, asp
SHA-256 | 332f445af6a6c5c47f068cb8d8c03ed007441924b9c1604249e696ad8d996b1f
dl-mancgi.c
Posted Sep 7, 2005
Authored by tracewar

Man-cgi/Man2web/ManView remote command execution exploit. Tested against Man-cgi 1.11. All versions are affected.

tags | exploit, remote, cgi
SHA-256 | 3300bb4e9b0b107c205b3358667f3e44b2322107d91b974768b345a5d6beebc5
dl-cups.c
Posted Sep 7, 2005
Authored by tracewar

CUPs 1.x denial of service exploit.

tags | exploit, denial of service
SHA-256 | ff8f9da2b2ed05af80951b23e43eb74ed987f6722dc4d1ea584c2d80c7787aa3
twlib.tar.gz
Posted Jul 21, 2005
Authored by tracewar

Simple replacement binaries for netstat, ls, and ps that enable an attacker or administrator to hide specific strings.

tags | tool, rootkit
systems | unix
SHA-256 | 60b4569d41899121ba50b99fc410a2bd24142d5f2c7bf9931f2512e999cf5ae0
login-back.c
Posted Oct 2, 2003
Authored by tracewar

Backdoor for login where the original binary must be renamed and only gets called whenever the remote user's TERM variable is not set to the magic password. If the magic password is set, the user gets the option of a shell with or without logging.

tags | tool, remote, shell, rootkit
systems | unix
SHA-256 | e3fb9f9f65c704ddf3602b2cf854c54524ca1cacb73518276e083cfaff3953db
tw-imap.c
Posted Aug 1, 2002
Authored by tracewar

IMAP4rev1(lsub) remote exploit. Tested against v12.264, 12.250, 11.241, and 10.223. Requires username and password. Includes offsets for Red Hat and Slackware.

tags | exploit, remote
systems | linux, redhat, slackware
SHA-256 | fab9c3c9f5c88eb5ccef31cc210a623985245fd8043724121dc1b172c2b35492
twgen.c
Posted Jul 31, 2002
Authored by tracewar

Class a/b/c ip list generator.

tags | tool, scanner
systems | unix
SHA-256 | cab6ef757f8875a2ca483e53e574b580bfad6bc37676c6d0f66b6c4194a221b6
snmpXauto.c
Posted Jul 11, 2002
Authored by tracewar

SnmpXdmid auto rooter based on snmpXdmid exploit from http://lsd-pl.net.

tags | exploit, web
SHA-256 | 94ebe956f7f5a101e3099ef94b7ebd458085d3ce2490d32e37966d74a51c61e6
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close