exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from S. Krahmer

Email addresskrahmer at cs.uni-potsdam.de
First Active1999-08-17
Last Active2000-03-20
imexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween 4 local root exploit for imwheel-solo. Other distros maybe affected as well.

tags | exploit, local, root
SHA-256 | 7300584731a280968e5f1a1b1f9f36318180b511c516ed48887ec106be3e6d96
wmexp.c
Posted Mar 20, 2000
Authored by stealth, S. Krahmer | Site cs.uni-potsdam.de

Halloween Linux 4.0 and Debian Linux 2.1 local root exploit for wmcdplay. Other distros are maybe affected as well.

tags | exploit, local, root
systems | linux, debian
SHA-256 | b9017f7829fe03f891ee34fded6071de2ba1348fee2276fddd5db8f9193120dc
adv7.tar.gz
Posted Mar 16, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - A vulnerability within the kreatecd application for Linux has been discovered. An attacker can gain local root-access. Exploit included.

tags | local, root
systems | linux
SHA-256 | 6b75b08c163190a2f48460df04026108041a65be6542f340bc2ebbebc83a7a66
adv6.tar.gz
Posted Mar 16, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - A vulnerability within the imwheel application for Linux has been discovered. Some of these packages are shipped with an suid-root wrapper-script that invokes the insecure program 'imwheel' with UID 0. Exploit included.

tags | root
systems | linux
SHA-256 | ce2cf3b23cb544a222d43c6fcfc4168a3bd18450577b959771583ecb4a486ae2
teso.wmcdplay.txt
Posted Mar 13, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - A vulnerability within the wmcdplay CD playing application for the WindowMaker desktop has been discovered. It allows local root compromise through arbitrary code execution.Any system which has wmcdplay installed as setuid root is vulnerable.

tags | arbitrary, local, root, code execution
SHA-256 | 8d5071c1366d929bea61249f0900db3205b2b45ad04b4e9179fa21f235aaefe6
teso.atsadc.txt
Posted Mar 13, 2000
Authored by teso, S. Krahmer | Site cs.uni-potsdam.de

TESO Security Advisory - The atsar application contains an exploitable vulnerability. The Halloween 4 Linux distribution, which is based on RedHat 6.1 is shipped with this suid-root program. It might be used to gain superuser privileges. Any system that has atsar-linux-1.4.2 package installed is vulnerable.

tags | root
systems | linux, redhat
SHA-256 | 506159ce20ba014e7a4a853444879fe6306bfc6bad43dc564b8b124ccdf79f23
eoe232.tar.gz
Posted Nov 16, 1999
Authored by S. Krahmer

Eyes on Exec 2.32 is a set of tools which you can use to build your own host based IDS. It watches for programs getting exec'd and logs information about it to a file. Combined with perl this can be extremely powerful. Requires linux kernel 2.2.

tags | tool, kernel, perl, intrusion detection
systems | linux, unix
SHA-256 | 721aa1dc02e15a1fb8384fa30f37cc22af65e7cc1755e2bc04a94eaffd14de73
lncf.tar.gz
Posted Nov 16, 1999
Authored by S. Krahmer

List Not Closed Files. Lets you not only list not closed files but also write/read etc. to it. Also inserting commands into stdin of programs (say SSH) is possible. Needs libpopt and x86/linux kernel 2.2.

tags | x86, kernel
systems | linux, unix
SHA-256 | d7032e97709ff8da358464fef1040bbc91a9b3f460717572d116ffeb0631275f
acct0.91.tar.gz
Posted Oct 22, 1999
Authored by S. Krahmer | Site cs.uni-potsdam.de

Linux accounting-tool for 2.2.x.

systems | linux
SHA-256 | 9fea4c4d1397cf298dd5a4cfdd58e5ccac4e42e2a9f5fa8af2913c2db86a3676
scramble.tar.gz
Posted Aug 17, 1999
Authored by S. Krahmer

Ever thought that this is possible? A tool to encrypt strings in C-sourcefiles and automatically decrypt it at runtime. (version 1.0) Scramble was found to work also well on FreeBSD (3.1 tested).

systems | unix, freebsd
SHA-256 | 33a7406129091307c80ac170b4c32c9231fc5d4fdf0ea53ed2765b222d84b818
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close