exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Todd Sabin

Email addresstsabin at optonline.net
First Active1999-12-17
Last Active2001-12-18
hk-0.1.zip
Posted Dec 18, 2001
Authored by Todd Sabin | Site razor.bindview.com

Microsoft HK local exploit - Executes any command as SYSTEM, as described in MS01-003. Good for recovering lost admin rights. Includes C source and binary.

tags | exploit, local
SHA-256 | cd88e00055d120a493e12b4c85d7918cb835d162033519a2bfc4df5c703507c9
bindview.lpc.txt
Posted Oct 4, 2000
Authored by Todd Sabin | Site razor.bindview.com

BindView Security Advisory - Windows NT 4.0 and 2000 contain multiple vulnerabilities in the LPC ports, as described in ms00-070. Implications range from denial of service to local promotion.

tags | exploit, denial of service, local, vulnerability
systems | windows
SHA-256 | e24169f769ff08b95674ca0b151e7ca48901eed39216c7984e0e4d0e2e4797ae
pwdump2.zip
Posted Apr 26, 2000
Authored by Todd Sabin | Site razor.bindview.com

pwdump2 - This is an application which dumps the password hashes (OWFs) from NT's SAM database, whether or not SYSKEY is enabled on the system.

Changes: It can now dump password hashes on W2K domain controllers. The previous version was unable to get the hashes from Active Directory.
tags | cracker
SHA-256 | 16a77e246b28114635e53ac29ced3bab37b377719626d78e44fb26f7ff6499d4
ntreg.tar.gz
Posted Feb 17, 2000
Authored by Todd Sabin | Site razor.bindview.com

This is a file system driver for linux, which understands the NT registry file format. With it, you can take registry files from NT, e.g., SAM, SECURITY, etc., and mount them on linux. Currently, it's read-only, though I may add read-write capability in the future.

tags | tool, registry
systems | linux, unix
SHA-256 | fbd28017cf1376b3ebdb20590e0a8ad28f3e175df8176d40ca1d701f7c442aed
nbtstat.tar.gz
Posted Feb 15, 2000
Authored by Todd Sabin | Site razor.bindview.com

This is a small unix utility that does the equivalent of NT's nbtstat -A . It sends a Node Status request to the host specified on the command line, and waits (up to 10 seconds) for the reply. If it gets the reply, it dumps the reply as hex, and then interprets the name table.

tags | tool, scanner
systems | unix
SHA-256 | f2d1cda851422ba2c3988c1bfce5d3c633d2dd73e5be637a2665736f778bf67e
bindview.syskey.txt
Posted Dec 17, 1999
Authored by Todd Sabin

BindView Security Advisory - Windows NT's SYSKEY feature. SYSKEY does not fully protect the SAM from off-line attacks. Specifically, dictionary and brute-force password cracking are still possible, even when SYSKEY is enabled and the attacker is not in possession of the SystemKey.

tags | exploit
systems | windows
SHA-256 | ed21462fc63b5f9e8702adc0dc85afa7134cb844786d5211b01a9c25a543ad2d
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close