what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Zorgon

Email addresszorgon at linuxstart.com
First Active2000-08-17
Last Active2001-01-09
exhpcu.c
Posted Jan 9, 2001
Authored by Zorgon

HP-UX v11.00 /bin/cu local buffer overflow exploit - Exploits the -l option. Provides a uid=bin shell.

tags | exploit, overflow, shell, local
systems | hpux
SHA-256 | 4eb65814f18d048afcb2595ba4538c73bdf060588b077aeaa9201aff06040d45
xsold.c
Posted Dec 16, 2000
Authored by Zorgon | Site nightbird.free.fr

Linux Xsoldier local root buffer overflow exploit. Overflows the -display command line option.

tags | exploit, overflow, local, root
systems | linux
SHA-256 | b399b42f07b8641525a5352aaf822e9698210c090495c285cd9fc11af3fdf062
cgiforum-1.0.txt
Posted Dec 3, 2000
Authored by Zorgon

CGIForum v1.0i (cgi-bin/cgiforum.pl) allows remote users to view any file on the system via a ../.. bug.

tags | exploit, remote, cgi
SHA-256 | 54a31d246b1ce0df322a76314cf66492c32c1c40d5388c5187fc9b897b0070fa
cryptdata.pl
Posted Nov 29, 2000
Authored by Zorgon

Cryptdata.pl encrypts/decrypts files with Crypt::Blowfish perl module. It is useful to encrypt home directories.

tags | perl, encryption
SHA-256 | b68cedfd65d4cc3b13b3fa396e71959cc57c62ff32879503ad41579cce297a58
hp-ux.cu.overflow.txt
Posted Nov 5, 2000
Authored by Zorgon

HP-UX vB.11.00 comes with /bin/cu SUID bin, which has a buffer overflow in the -l switch.

tags | exploit, overflow
systems | hpux
SHA-256 | 77af8460241fd99399a8eb2a90950ce6aa3a1b5653ac799c208865c42b2ef1d5
riven-1.0.1.tar.gz
Posted Oct 27, 2000
Authored by Zorgon

Riven is a CGI scanner which uses RFP anti-IDS tactics, flase browser / referer, and a perl/GTK interface.

tags | cgi, perl
systems | unix
SHA-256 | 019a8748eaa49d241b60bb6fe6e9a2db8eba78d1cebf024f19f604827be4eb21
anyportal-0.1.txt
Posted Sep 11, 2000
Authored by Zorgon | Site nightbird.free.fr

Anyportal v0.1 allows remote users to read any file on the webserver by submitting modified forms.

tags | exploit, remote
SHA-256 | e1ec85ae33fed5f71b59bb5010d7c3248c2ba5c473dd1c55908c4be4e6a1ee39
bird.pl
Posted Sep 6, 2000
Authored by Zorgon

bird.pl is a source code scanner which uses regular expressions to search for 12 common insecure C calls and 8 common insecure perl functions.

tags | perl
systems | unix
SHA-256 | ecfc2feab3db209ede8d7618dbec2a07c23e18d23b6e2044b31f33e689ccd646
clientagent662.txt
Posted Aug 31, 2000
Authored by Zorgon | Site nightbird.free.fr

Client Agent 6.62 for Unix Vulnerability, Tested on a Debian 2.2.14, Client Agent has a hole allowing to execute an arbitrary code by root without its knowing. In the meantime, some conditions are necessary to exploit this vulnerability. Client Agent is used with ARCserveIT, the safe software. It must be installed on all the workstations. A global configuration file agent.cfg keep every sub-agents installed on your system. This file is in /usr/CYEagent, and receive the information from the sub-agent when the script /opt/uagent/uagensetup is run.

tags | exploit, arbitrary, root
systems | linux, unix, debian
SHA-256 | 1daaedd6f40ccb604880096f68d1f14543064744d2f5c8d9d8a384929bef9ccd
crackncftp.c
Posted Aug 17, 2000
Authored by Zorgon | Site zorgon.freeshell.org

The ncftp client uses an easily decrypted scheme to save passwords to remote FTP sites in a bookmark file. Crackncftp.c provides the plaintext when from the encrypted string.

tags | exploit, remote
SHA-256 | 4ed56e4e5d88cc9b9c62d4ce74ab7b94bc9d98b285cadb58d0da304ceca15a9b
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close