?? indexdl.shtml
字號:
<html> <head> <title>.:[packet storm]:. - http://packetstormsecurity.org/</title> <link rel="STYLESHEET" type="text/css" href="/ps.css"> </head> <body class=sc bgcolor=black topmargin=0 leftmargin=0 rightmargin=0 marginwidth=0 marginheight=0 border=0 alink=#ffffff><a name=top></a> <table border=0 cellpadding=0 cellspacing=0 width="100%"> <form method=get action="http://209.100.212.5/cgi-bin/search/search.cgi"> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#5E5E9E><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr bgcolor=#000066 height=40> <td height=40> </td> <td><a href="/index.shtml"><IMG alt=".:[packet storm]:." border=0 height=30 src="/images/ps.gif" width=152></a></td> <td><IMG alt="" border=0 height=1 src="/images/spacer.gif" width=40></td> <td align=right><font color=white><input type=text size=20 class=inp name=searchvalue></font></td> <td nowrap><IMG alt="" border=0 height=10 src="/images/spacer.gif" width=1><br> <input type=image alt="[search]" name="[search]" border=0 height=16 src="/images/search.gif" width=50></td> </form> <td><IMG alt="" border=0 height=1 src="/images/spacer.gif" width=40></td> <form method=post action="http://209.100.212.5/cgi-bin/clickgo.cgi"> <td align=right> <font color=white> <select class=inp name=site> <OPTION SELECTED VALUE="/last20.shtml">recent files <OPTION VALUE="/last20.shtml">last 20 files <OPTION VALUE="/last50.shtml">last 50 files <OPTION VALUE="/last100.shtml">last 100 files <OPTION VALUE="">--------------- <OPTION VALUE="/advisories20.shtml">last 20 advisories <OPTION VALUE="/advisories50.shtml">last 50 advisories <OPTION VALUE="">--------------- <OPTION VALUE="/tools20.shtml">last 20 tools <OPTION VALUE="/tools50.shtml">last 50 tools <OPTION VALUE="">--------------- <OPTION VALUE="/exploits20.shtml">last 20 exploits <OPTION VALUE="/exploits50.shtml">last 50 exploits <OPTION VALUE="">--------------- <OPTION VALUE="/miscellaneous_files20.shtml">last 20 misc <OPTION VALUE="/miscellaneous_files50.shtml">last 50 misc</OPTION> </select> </font> </td> <td nowrap><IMG alt="" border=0 height=10 src="/images/spacer.gif" width=1><br> <input type=image name="[go]" alt="[go]" border=0 height=16 src="/images/go.gif" width=30></td> <td width="10%"> </td> </tr> <tr height=1 bgcolor=#26264D><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#3333CC><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000066><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333366><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#000000><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#D1D1D1><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=20 bgcolor=#999999><td height=20 colspan=9 valign=center nowrap><center><font face=verdana size=1><b><A class=top href="/pssabout.html">about</a> | <A class=top href="http://209.100.212.5/cgi-bin/cbmc/forums.cgi">forums</a> | <A class=top href="/assess.html">assessment</a> | <A class=top href="/defense.html">defense</a> | <A class=top href="/papers.html">papers</a> | <A class=top href="/magazines.html">magazines</a> | <A class=top href="/misc.html">miscellaneous</a> | <A class=top href="/links.html">links</a></b></font></center></td></tr> <tr height=1 bgcolor=#666666><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=1 bgcolor=#333333><td colspan=9><spacer type=block height=1 width=1></td></tr> <tr height=4 bgcolor=#000000><td colspan=9><spacer type=block height=4 width=1></td></tr> </table> </form> <center><p><br><p><table border=0 cellspacing=1 cellpadding=2 width=90% align=left cols=4><tr><td class=header bgcolor=black colspan=4 align=left></td></tr><tr><td colspan=2 valign=bottom align=left class=name></td><td class=title bgcolor=black colspan=2 width=100% valign=bottom align=right><p><font class=small>To Change Sort Order, Click On A Category.</font><br>Sorted By: Downloads.</td></tr><tr><td class=title bgcolor=#333399 align=left><a class=title href=http:///0110-exploits/index.shtml>File Name</a></td><td class=title bgcolor=#333399 align=center><a class=title href=http:///0110-exploits/indexdl.shtml>Downloads</a></td><td class=title bgcolor=#333399 align=center><a class=title href=http:///0110-exploits/indexsize.shtml>File Size</a></td><td class=title bgcolor=#333399 align=center nowrap><a class=title href=http:///0110-exploits/indexdate.shtml>Last Modified</a></td><td class=title bgcolor=#333399 align=center>MD5 Checksum</td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0110-exploits/zp-exp-telnetd.c">zp-exp-telnetd.c</a></td><td class=size bgcolor=#333366 align=center>12135</td><td class=date bgcolor=#444477 align=center>Oct 20 01:44:20 2001</td><td class=name bgcolor=#444477 align=center>5925939d4d0992779fc6249366dcb734</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Proof of concept netkit-0.17-7 local root exploit. Exploits buffer overflow in the AYT handling of in.telnetd, due to bad logic in the handling of snprintf(). By <a href="mailto:zen-parse@gmx.net">Zen-parse</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0110-exploits/XORrwhoisd.tgz">XORrwhoisd.tgz</a></td><td class=size bgcolor=#333366 align=center>6035</td><td class=date bgcolor=#444477 align=center>Oct 25 22:44:47 2001</td><td class=name bgcolor=#444477 align=center>85a4044b6c2d041ea9e9638fd4446c40</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Automated rwhoisd v1.5.x remote exploit for Linux, FreeBSD, and BSDi. By <a class=fd href="mailto:sectorx@gmx.net">Sectorx</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0110-exploits/webcache.pl">webcache.pl</a></td><td class=size bgcolor=#333366 align=center>1697</td><td class=date bgcolor=#444477 align=center>Oct 24 20:33:29 2001</td><td class=name bgcolor=#444477 align=center>6cc2f8598af0db6d419d680e0230d74a</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Proof-of-concept exploit for Oracle9iAS Web Cache/2.0.0.1.0. Creates the file c:\defcom.iyd. See def-2001-30.txt for more info. Homepage: <a href=http://www.defcom.com target=newbrowser>http://www.defcom.com.</a> By <a href="mailto:andreas@defcom.com">Andreas</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0110-exploits/sxp.c">sxp.c</a></td><td class=size bgcolor=#333366 align=center>9775</td><td class=date bgcolor=#444477 align=center>Oct 30 00:23:31 2001</td><td class=name bgcolor=#444477 align=center>4a6837286d952f1c05cba8c6fb7c9741</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Sendmail 8.11.5 and below local root exploit. By <a class=fd href="mailto:sd@sf.cz">sd@ircnet</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0110-exploits/ptrace24.c">ptrace24.c</a></td><td class=size bgcolor=#333366 align=center>3943</td><td class=date bgcolor=#444477 align=center>Oct 30 00:25:50 2001</td><td class=name bgcolor=#444477 align=center>0b6d461adc20cb12fef2920d329f920f</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Ptrace24.c is a local root exploit for linux kernels prior to 2.4.9. Works on openwall patched kernels. Uses the su, newgrp, or screen +s binaries. Originally by Nergal. Improved by sd.</td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0110-exploits/samba.sh">samba.sh</a></td><td class=size bgcolor=#333366 align=center>2031</td><td class=date bgcolor=#444477 align=center>Oct 17 00:14:56 2001</td><td class=name bgcolor=#444477 align=center>ad358ce3a84fb692ba4967e615fa5c8a</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>Samba prior to v2.0.8 local root exploit. Tested against Red Hat 5.1 - 7.0. By <a href="mailto:yuggoboy@hotmail.com">Snyggast</a></td></tr><tr><td class=name bgcolor=#333366 align=left><a href=/"0110-exploits/gen.c">gen.c</a></td><td class=size bgcolor=#333366 align=center>9863</td><td class=date bgcolor=#444477 align=center>Oct 25 22:37:49 2001</td><td class=name bgcolor=#444477 align=center>0f02e4b894906177bbf4534a593a36ac</td></tr><tr><td class=desc colspan=4 bgcolor=#000033 align=left>RWhoisd by NSI remote format string exploit affecting v1.5.x. Overflows the -soa directive. By <a class=fd href="mailto:root@cow.net">CowPower</a></td></tr><tr><td class=name height=10 colspan=4><img src=/images/spacer.gif></td></tr><tr><td class=name align=left colspan=4> </td></tr><tr><td class=name align=left colspan=4> </td></tr><tr><td class=small align=center><a class=small href=/privacy.html>Privacy Statement</a></td></tr><tr><td class=name align=left colspan=4><a href=#top><img border=0 src=/images/top.gif></a></td></tr></table></body></html>
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -