exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files from priestmaster

First Active2004-04-14
Last Active2006-01-21
vsexploit.zip
Posted Jan 21, 2006
Authored by priestmaster | Site priestmasters.org

Visual Studio 2005 and below code execution exploit.

tags | exploit, code execution
SHA-256 | f474e8cd34809a660252ae97ee80d5be531c9b414e3d576accb0feb55e852f8b
phpcountxss.txt
Posted Jul 14, 2005
Authored by priestmaster | Site priestmaster.org

PHP Counter 7.2 is susceptible to a cross site scripting flaw.

tags | exploit, php, xss
SHA-256 | ec9bc45f5335ff03bbf960c7eb269e2336ee2411eddca3d5198516c68bbe1552
cuteftpexpl.c
Posted Dec 31, 2004
Authored by priestmaster | Site priestmaster.org

CuteFTP Professional version 6.0 local denial of service exploit that makes use of a flaw in the client.

tags | exploit, denial of service, local
SHA-256 | daa23e42c47eed98d84004e5b252b4271f1b5dbd8762bbe7fffe1723ba842163
efuzz01.zip
Posted Nov 24, 2004
Authored by priestmaster | Site priestmaster.org

Efuzz is an easy to use Win32 tcp/udp protocol fuzzer which finds unknown buffer overflows in local and remote services. Uses config files to define the range of malformed requests. Includes C source, released under GPL.

tags | remote, overflow, local, udp, tcp, protocol, fuzzer
systems | windows
SHA-256 | 83c25ea1e5b3ca8eaa392c20d213c89de0afe7961f65d36d43a2f77976f63a9c
challenges.tgz
Posted Sep 15, 2004
Authored by priestmaster | Site priestmaster.org

This package contains example vulnerable C programs. The best way to learn exploit coding is by doing it. Start your search with the index.html. There are examples of buffer overflows (stack and heap) and format string vulnerabilities. All examples are exploitable with a standard linux/x86 environment.

tags | paper, overflow, x86, vulnerability
systems | linux
SHA-256 | b4a6e4ad9e67fa0be8869334a9ea7b86a7d1712e80c47179e80a481dd08dbd3b
keylog.txt
Posted Sep 10, 2004
Authored by priestmaster | Site priestmaster.org

Small white paper regarding keyloggers and basic circumvention.

tags | paper
SHA-256 | 9e625c2d10f7855d72e6d471bb18629a3b4d78f9f4ace1c443a07dc73b3314f4
Apldos.tgz
Posted Aug 18, 2004
Authored by priestmaster | Site priestmaster.org

Paper written to discuss application layer denial of service attacks with a test script that provides an example attack.

tags | denial of service
SHA-256 | 99e71bfefca08435bffe95e4201c73896fedd95f61d35792f8b30c3e2718aeb9
dnsspoof.zip
Posted Aug 17, 2004
Authored by priestmaster | Site priestmaster.org

Utility that automates the DNS spoofing vulnerability in Microsoft Windows XP SP1 as described in the Phrack 62 linenoise chapter. It generates a script file that launches the netwox application with correct parameters. It works with Windows and Linux. Binary files are included.

tags | tool, spoof
systems | linux, windows, unix
SHA-256 | 85bdd1f07f2ad093ca6f2d51d289fbb5d912c199a4d830314571f23051a130fa
snmpfile.txt
Posted Jun 3, 2004
Authored by priestmaster | Site priestmaster.org

If any ucd-snmp version, 4.2.6 and below, is installed setuid root, a local attacker can overwrite any file using the -P and -l parameters.

tags | advisory, local, root
SHA-256 | 1016752386d08c853e5ec5531500830362c7331f992a62a1b91766d6ec8dab73
nops.tgz
Posted May 26, 2004
Authored by priestmaster | Site priestmaster.org

Small whitepaper on nop usage and a random nop generation utility is included.

tags | shellcode
SHA-256 | 3406580aa94c1fef3dd119dcc1ae93a8d14aebba8e84a5657d72cce1e07e5292
metaexpl.tgz
Posted May 26, 2004
Authored by priestmaster | Site priestmaster.org

Metamail remote exploit that makes use of a buffer overflow and upon successful exploitation, binds a listening socket to UDP/13330 awaiting shellcode. Affected versions: 2.2 through 2.7.

tags | exploit, remote, overflow, udp, shellcode
advisories | CVE-2004-0104, CVE-2004-0105
SHA-256 | 4b90ebafdf1d434a218d36dfbf9b51ff8ab8e7a904b5b69a39f31b140b267ee8
snmpdadv.txt
Posted May 21, 2004
Authored by priestmaster | Site priestmaster.org

ucd-snmp versions 4.2.6 and below suffer from a buffer overflow on the command line when the daemon is spawned.

tags | advisory, overflow
SHA-256 | 24514b893dcbc9255cf0b3b4192324d7c0f00059646711e8fb3fc0a35111ed7c
shellcode_kit.tgz
Posted May 17, 2004
Authored by priestmaster | Site priestmaster.org

Paper discussing shellcode usage that also includes troubleshooting and functionality information. Included are other whitepapers that help offer guidance, some tools, and some shellcodes.

tags | shellcode
SHA-256 | 4ec0245150d0f387da8ee2844e769c59d9caac00f74d87dd99b63675db28cafe
hsftpexpl.tgz
Posted May 1, 2004
Authored by priestmaster | Site priestmaster.org

HSFTP versions 1.11 and below remote exploit that makes use of a format string vulnerability when processing file names.

tags | exploit, remote
SHA-256 | 0f0b1134f526e9e119a43dac0a36550ab2c1495e9c627acdb6f4557b53503898
gvexpl.tgz
Posted Apr 18, 2004
Authored by priestmaster | Site priestmaster.org

Remote root proof of concept exploit for gv versions 3.5.8 and below. Binds a shell to port 65535. Makes use of an old vulnerability that does not have an exploit circulating for it.

tags | exploit, remote, shell, root, proof of concept
SHA-256 | 11d8cbe05d44de0b0c307ee9081118802cb84f87aeb270e7921d6390d73955dc
cdpexpl.tgz
Posted Apr 14, 2004
Authored by priestmaster | Site priestmaster.org

Proof of concept demonstration exploit for cdp versions 0.4 and below.

tags | exploit, proof of concept
SHA-256 | 71e8dcfd75673f8e3b2dd6868f7308fc0129309e7be74ce7e3020b9fd0c39176
gdbvuln.txt
Posted Apr 14, 2004
Authored by priestmaster | Site priestmaster.org

Brief tutorial on using gdb for developing exploits.

tags | paper
SHA-256 | dd65c2569a794f3b7b150515a3f2ed9f78bfb12095612a88d76604a4d0f3fa8d
perlvuln.txt
Posted Apr 14, 2004
Authored by priestmaster | Site priestmaster.org

Brief tutorial on using Perl for developing exploits.

tags | paper, perl
SHA-256 | e4720a44d55438b6c8443d0789e3f56d813d0b5b979efac1ac7a1e23c05e3fac
tutorial.txt
Posted Apr 14, 2004
Authored by priestmaster | Site priestmaster.org

Small tutorial discussing common types of exploitation methods. Cites examples and points to other papers that can provide more information.

tags | paper
SHA-256 | ace1ee12ef0af05798d0bff8c62d68803fe68f862ffc43fa3d3e621c5906609d
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close