exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 87 RSS Feed

Files from teso

First Active2000-02-11
Last Active2004-06-25
adorebsd-0.34.tar.gz
Posted May 25, 2001
Authored by teso, Bind | Site team-teso.net

AdoreBSD 0.34 - Based off Linux Adore by Stealth. Features hiding files and directories from view, makes processes invisible, hides promiscuous flag and syslog messages, execute as root, hides sysctl mib entries, netstat service hiding, authentication, and module hiding. Developed on FreeBSD 4.3-STABLE.

tags | root
systems | linux, freebsd
SHA-256 | cfeece4d9e9d8347a58eddaf64786360a9187ee3f9bc5af4ee4426bc941f9e3b
adore-0.38.tar.gz
Posted May 25, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Added 64bit FS support, now fools protection modules as StMichael, and minor fixes.
systems | linux
SHA-256 | 81a2723c4a646ea1c9d07a8b8689f5d9f2b498231624d3516bf9a5a8729ca172
7350cfingerd-0.0.4.tar.gz
Posted Apr 24, 2001
Authored by teso, scut | Site team-teso.net

Cfingerd prior to v1.4.2 remote root format string exploit. Includes information on finding offsets. Tested against Debian cfingerd v1.3.2, 1.4.0, 1.4.1, and RedHat 7.0 cfingerd 1.3.2.

tags | exploit, remote, root
systems | linux, redhat, debian
SHA-256 | 27d6d03e401bbc5d64121d7bf098b55babef4798dff575768d01cd2abac1b648
arpmim-0.2.tar.gz
Posted Apr 7, 2001
Authored by teso, Skyper | Site team-teso.net

Arpmim v0.2 implements an ARP man in the middle attack. Includes single or multiple host support, asymmetric MiM, arpop_request, and macoff.

SHA-256 | 85d0ebf42ca0b511272bae44719270ba2cc579d2c7b4c60f48725bdb5c1487c5
adore-0.34.tgz
Posted Mar 27, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Improved 2.4 support, better authentication checking, permanent PID removal, configure script, experimental exec redirection for i386.
systems | linux
SHA-256 | cb6a7f28f3180a55c6b06e51a03d1a0d0fb4af64f083d6b2b94ca067652a1ed4
mipsshellcode.pdf
Posted Jan 19, 2001
Authored by teso, scut | Site team-teso.net

Introduction to the MIPS architecture and the IRIX operating system, focusing on how to write shellcode for IRIX. Includes 3 sample shell codes. This is an updated version of the article in Phrack 56.

tags | shell, shellcode
systems | irix
SHA-256 | 4ae9d1a99adae30ec567bcc47c657eb5fa712b7d9ea625abbd8747f87f01cfae
telnetfp_0.1.2.tar.gz
Posted Jan 13, 2001
Authored by teso, Palmers | Site team-teso.net

Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 72 OS fingerprints.

Changes: More fingerprints, bugfixes, interactive mode.
tags | remote
SHA-256 | ae48c9908a16c1891aecf361d8d8926967db8faac2b155964f6fb83ddb47c8d7
adore-0.31.tar.gz
Posted Jan 9, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Automatic configuration, bug fixes.
systems | linux
SHA-256 | 426425af2fe14766dcb5ee37af975be1d81fe96943bde9e12671fbf26a899a21
7350wu-v5.tar.gz
Posted Dec 31, 2000
Authored by teso, scut | Site team-teso.net

7350wu.c is a Wu-ftpd v2.6.0 remote root exploit which does it the proper way. Works on Linux/x86 and FreeBSD.

tags | exploit, remote, x86, root
systems | linux, freebsd
SHA-256 | 33f1db59facbfa0648cc1b9e7fac8958fdfbe6056b000bfbd7ca175b8b29af23
Vortrag-1.0.tar.gz
Posted Dec 31, 2000
Authored by teso, scut | Site team-teso.net

German speech given at the CCC - "exploiting format string vulnerabilities". Including examples.

tags | vulnerability
SHA-256 | fb6f4bbc3e3270eb0fdf54421051b06b4537b3129ca000b5f781fac055d4b629
7350nxt-v3.tar.gz
Posted Dec 19, 2000
Authored by teso | Site team-teso.net

Exploit for the Bind NXT remote root vulnerability, which affects Bind v8.2 - 8.2.1. Compiles on Linux, tested against Irix, BSD, and Linux. Includes Irix shellcode for breaking chroot.

tags | exploit, remote, root, shellcode
systems | linux, irix, bsd
SHA-256 | febfc0b34d825bb1fd2b1ea1e96374fa6816966c45c2f8ac101caef72cf4b91b
reverb-0.1.0.tar.gz
Posted Dec 19, 2000
Authored by teso | Site team-teso.net

Reverb is a tool to access firewalled, dynamic-dialin and otherwise protected hosts.

SHA-256 | 9548ad877de5a2911412ee36598b233d8e3896399e75768fa1aa5b678c016314
7350oftpd.tar.gz
Posted Dec 19, 2000
Authored by teso, Caddis | Site team-teso.net

OpenBSD ftpd v2.4_BASE through 2.8 remote root exploit. Includes offsets for v2.6 through v2.8 and instructions for finding offsets of other versions. Requires a writable directory.

tags | exploit, remote, root
systems | openbsd
SHA-256 | e60d36076da9b2566b60a358f1600945cb7392b7f05305acfc0f2dfa49415169
openssh.reverse.tgz
Posted Oct 3, 2000
Authored by teso, Sebastian Krahmer | Site team-teso.net

Openssh-Reverse is a patched OpenSSH which goes in reverse, allowing outside users to connect to machines behind NAT firewalls. In reverse mode, sshd acts as a client and brings the connection to a modified ssh server.

SHA-256 | c83bf07ed61053f6c369bd3bd2c8252548532e232e27ee4365928a0691d9ff64
telnetfp_0.1.1.tar.gz
Posted Sep 7, 2000
Authored by teso, Palmers | Site team-teso.net

Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 32 OS fingerprints.

Changes: New OS fingerprints and bug fixes.
tags | remote
SHA-256 | e83fb59569a1389c70a22f1b784ff37e5e031e4c84a72080ca8a08acbb023d67
telnetfp_0.1.0.tar.gz
Posted Sep 6, 2000
Authored by teso, Palmers | Site team-teso.net

Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 23 OS fingerprints.

tags | remote
SHA-256 | 0567b0152bd59007461af62751f10b20eabf48b7fd1831ae530a2e63fcafb436
7350qpop.c
Posted Jul 15, 2000
Authored by teso, scut | Site team-teso.net

qpopper 2.53 euidl x86/linux remote exploit. Includes a procedure to abuse format strings to find the correct offset. Tested on Debian 2.1, RedHat 6.1, Slackware 7, Suse 5.2 and 6.0.

tags | exploit, remote, x86
systems | linux, redhat, suse, slackware, debian
SHA-256 | d4fbf6b568b41b3a4ab5332d446981b085dcf13b1b623c727517903de3998105
zodiac-0.4.9.tar.gz
Posted Jun 19, 2000
Authored by teso, scut | Site team-teso.net

Zodiac is a portable, extensible and multithreaded DNS tool. It is meant to be used as a DNS packet monitor and DNS protocol test and debuging tool. It's basic features are: sniffing of DNS datagrams on an ethernet device, decoding of all types of DNS packets, including safe decompression (partly finished, SOA record are, for example, not decoded yet), nice display and gui, if you like ncurses and text based frontends, always interactive in all situations through built in command line, threaded and flexible design. Advanced features include: local DNS spoof handler, jizz DNS spoof, exploiting a weakness in old bind implementations, determines jizz-weakness, id-prediction and resolver type remotely, id spoofing, exploiting a weakness in the dns protocol itself, implements some advanced DNS denial of service attacks, including flood, label compression and unres attack, advanced DNS smurf.

Changes: Now runs on *BSD, and fixed some bugs.
tags | denial of service, local, spoof, protocol
systems | unix
SHA-256 | 87f79104df9555ecf18355d034a721bd7327ecf82037e1e480a0752bb07e3a14
teso-advisory-010.tar.gz
Posted May 31, 2000
Authored by teso, stealth | Site team-teso.net

TESO Security Advisory #10 - KDE KApplication {} configfile vulnerability. Due to insecure creation of configuration files via KApplication-class, local lusers can create arbitrary files when running setuid root KDE-programs. Tested with SuSE 6.4 standard installation under KDE 1.1.2.

tags | exploit, arbitrary, local, root
systems | linux, suse
SHA-256 | 004b3ec17b9d4970f5d766395aef75b5dbd5c2b046edf150e3773fa527b7f18b
execve-shell.tar.gz
Posted May 29, 2000
Authored by teso, scut | Site team-teso.net

execve-shell.tar.gz allows you to easily create linux x86 shellcode that execs any command you supply.

tags | shell, x86, shellcode
systems | linux
SHA-256 | 0cc554a1bcbc9a9ef9026428188060ef14886a2ba40aad275be5201d08d7fe39
l0phtl0phe-kid.c
Posted May 19, 2000
Authored by teso, scut | Site team-teso.net

l0phtl0phe-kid.c - Easy antisniff v1.02 exploit. l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks. This version has been made easy enough for script kiddies to use - to avoid that "doesn't work" lamer claim.

tags | exploit
SHA-256 | bd31032131862d82287cf734e1ae6420cdb563449a5eb13f9c348e7266dd300d
arpmitm-0.1.tar.gz
Posted May 18, 2000
Authored by teso, xdr | Site team-teso.net

Arpmitm.c is another tool for using arp man-in-the-middle attacks which keeps sending the packets. Requires Libnet 1.00.

SHA-256 | a19ed2757a2e4c0b49f24c7b64aee902e263d54e73f80c0eec793933f61e7856
l0phtl0phe.c
Posted May 18, 2000
Authored by teso, scut | Site team-teso.net

l0phtl0phe.c - antisniff exploit (1.02 included). l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks.

tags | exploit
SHA-256 | 936d433c03025bd9a3d606c0f3d43a479b07e715b0201d0e5f316e3adcac8c05
7350kscd.tar.gz
Posted May 15, 2000
Authored by teso | Site team-teso.net

New TESO kscd exploit (cd player is KDE multimedia package)

tags | exploit
SHA-256 | e2cfafa7ac798db283b6758278403a70baea8c1bc09a51fe0721f706e1a5989a
exman.c
Posted May 3, 2000
Authored by teso | Site team-teso.net

exman.c is a new man exploit.

SHA-256 | 832e578f11428c863468dabddea6bce1956334bf36020dad8673f91d5be34f3b
Page 2 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close