what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from sd

Email addresssd at fucksheep.org
First Active2001-10-30
Last Active2013-05-14
Linux PERF_EVENTS Local Root
Posted May 14, 2013
Authored by sd

Linux local root exploit that requires that PERF_EVENTS be compiled into the kernel. This has been fixed in 3.8.10. This bug apparently got backported from 2.6.37 into CentOS5 2.6.32 kernels.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2013-2094
SHA-256 | 2f5dc509c381d9e991e5bf9ec1e43911abf68baf1a9e3035473ddfd75ba8c11a
Archlinux/x86-64 3.3.x-3.7.x x86-64 sock_diag_handlers[] Local Root
Posted Feb 26, 2013
Authored by sd

Local root exploit for Archlinux that allows an unprivileged user to take over control in kernel mode due to an out-of-bounds access of the sock_diag_handlers[] array. Works reliably against x86-64 3.3-3.7.

tags | exploit, x86, kernel, local, root
advisories | CVE-2013-1763
SHA-256 | 25f2aab0c8030a52582b1a4727080cb36afc4818b3e2b57e373fe61a918c940d
k-rad3.c
Posted Dec 31, 2005
Authored by sd, alert7 | Site xfocus.org

Linux kernel 2.6.11 and below CPL 0 local exploit. Third version/variant of this exploit.

tags | exploit, kernel, local
systems | linux
SHA-256 | 1ca572d08790256ea24ef02a696eaf5397c0fc2f20cbdaf34cbe38b22906afe9
suckit2priv.tar.gz
Posted Oct 13, 2005
Authored by sd | Site sd.g-art.nl

SucKIT Rootkit v2.0-devel-rc2. Easy-to-use, Linux-i386 kernel-based rootkit. The code stays in memory through /dev/kmem trick, without help of LKM support nor System.map or such things. Everything is done on the fly. It can hide PIDs, files, tcp/udp/raw sockets and sniff TTYs.

tags | tool, kernel, udp, tcp, rootkit
systems | linux, unix
SHA-256 | 7fca632fdea9a39f68498af15c5cf2af2989c26aaccbd99bb62ead37a0eecc69
pwned.c
Posted Mar 22, 2005
Authored by sd

Local sys_uselib root exploit for the Linux 2.4 and 2.6 kernel series.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | e95832127ef41cadddcf73aab42cbb0168d07344395d3aa6b43c4b4a5ffb0fdc
sendmail.8.11.x.c
Posted Oct 3, 2002
Authored by sd

Sendmail 8.11.5 and below local root exploit. Tested against Red Hat 7.0 and 7.1, SuSE 7.2, and Slackware 8.0.

tags | exploit, local, root
systems | linux, redhat, suse, slackware
SHA-256 | 91760643cbea23f0d407bfbe6adb92fff440f2e21775e64c29e8d836351f91b9
sk-1.3a.tar.gz
Posted Jul 8, 2002
Authored by sd | Site sd.g-art.nl

The SucKIT is easy-to-use, Linux-i386 kernel-based rootkit. The code stays in memory through /dev/kmem trick, without help of LKM support nor System.map or such things. Everything is done on the fly. It can hide PIDs, files, tcp/udp/raw sockets, sniff TTYs. Next, it have integrated TTY shell access (xor+sha1) which can be invoked through any running service on a server. No compiling on target box needed, one binary can work on any of 2.2.x & 2.4.x kernels precompiled (libc-free).

tags | tool, shell, kernel, udp, tcp, rootkit
systems | linux, unix
SHA-256 | 0782e8116250f17749de320363e484ece37a2856ab5f59c96075f788b0c901a8
sxp.c
Posted Oct 30, 2001
Authored by sd

Sendmail 8.11.5 and below local root exploit.

tags | exploit, local, root
SHA-256 | 7dddb7e68fd03e22cdedc657022b2a85c0486e0472018a47ea76df38320a9ff7
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close