Hacker Resource
d3373e3085eee17158efbab065b64284edf383a1820f996100892f19c3b732d6
The popular CGI web page access counter version 4.0.7 by George Burgyan allows execution of arbitrary commands due to unchecked user input. Commands are executed with the same privilege as the web server.
e0a35b69e4f5aef2395340390b513acaf3525217945eb4350d781f82b87e195f
Perl port of the /usr/bin/lpset local root vulnerability in Solaris/SPARC 2.7. Based on lpset.sh.
d7a3671db5103886a50d238f176908dbdf003c5e30c4ebc5ea6fba725fccf9ac
Zgv 3.0 local exploit for Linux.
97a09fdb60023de0734f695a952ce7ceec2f4651602772ae2bbd81286136ebe7
htaccess.tar - Perl script for adding users to the .htaccess file. Includes information on how to set up password protected web pages.
0136a4de0bb885ebc034bbecae45c0ad21f7fb4a273400f80ed682673066e15e
Linux Elm 2.4/2.5 local exploit - This will give you a shell(gid=12) if /usr/bin/elm is SGID. Tested on slackware 4.0 and redhat 5.1.
7536b4523e151c49801d69c7104c931fe2839096af6eb7cedb39b3bd7d2a48ff
Majordomo v1.94.5 local linux exploit - run commands as the UID that majordomo runs under.
953f408ed0e7227f1f766fd9a9fd554a804ae5ecd8f6c6aa40a809d4d15dc708
Apache DSO backdoor - A get request to a "special" url allows remote command execution.
d49407f8380be928bcc8cb57171d11ca41fd2ec1f61a4678089d8ce1b6f3aaa9
Evaluating the Security of a NT System Part II - In depth information on NT security. Includes discussion of Groups and User rights, The Administrator Account and Administrators Group, The Guest Account and Everyone Group, Files Folders Permissions and Shares, Virus and Trojan Horse Controls, Auditing and Event Logs, and backup.
a3ba4426df164c8f53bb9b8b31d38d2bce9306adea7f9f2dd16ec49f84f8514d
Buffer0verflow Security Advisory #1 - Mailtraq remote file retriving. The Mailtraq message server for Windows NT, 95, and 98 allows any file on the system to be read via a /../../ bug. All versions prior to 1.1.4 are affected.
811946ab0ebf72ba32eae273bd408419d58277b2cc6bec4feb1dad2886c8fc0e
Evaluating the security of a NT system. Includes security tips, logging options, and more.
a0766d9e54d84ea3d83a5bb9053d2b3629b6c1e62ee62709fb52e33c6679ae23