System Exploit


很抱歉,以下EXPLOIT现在本站只提供后缀为*.asm、*.c、*.pl、*.sh、*.txt文件的下载

默认当前窗口打开,如需新窗口打开,请在超链接上按下 SHIFT 然后点击鼠标左键
Hold down SHIFT and then hit the mouse button to get something in a new window.
ida-exploit.shThis exploit can make you get into the machine through port 8008.
vsyslog.txtLinux exploit for libc 5.4.38's vsyslog().
hanson.cThis lil program exploits mIRC's bound sockets, making the client crash.
ntpptp.cNT 4.0 SP3 PPTP denial of service attack exploit.
ntpwgrabber.txtA false FPNWCLNT.DLL can be stored in the %systemroot%\system32 directory under Windows NT 3, 3.51, 4 which collects passwords in plain text.
latierra.cAn enhanced version of land.c which works better against NT SP3 among other things.
rip.cRIP (Routing Information Protocol) Version 1 Spoofer
imaps.tar.gzServeral different versions of the remote imapd buffer overflow exploit.
xfree86.txtUsing XFree86, oridinary users can read any file with root permissions.
lownoise.txtExploit for Digital Unix v4.0 that let's you create a writeable /.rhosts file.
land.cCrash WFW311, Win95, and WinNT by sending a spoofed packet with the SYN flag from a host on an open port setting as source the same host and port.
teardrop.cExploits the overlapping IP fragment bug present in all Linux kernels and NT 4.0 / Windows 95 (others?)
Linux users: Download the linux binary of the exploit.
Windows users: Download this patch.
pentium_bug.cDenial of service attack for the Intel Pentium CPU for any operating system.
linux_perl.txtIt is still possible to overwrite a buffer a get root on Linux via sperl 5.003.
lizards.txtExplains how to get root on Slakware 3.4 from the suid lizards game.
evil-term.cThis is the remote buffer overflow termcap exploit for BSDI BSD/OS 2.1.
dgux_xterm.txtOn Digital Unix 4.0B, causing, xterm to core can overwrite arbitrary files.
php_exploit.cmlog.html and mylog.html w/ PHP dist. can be used to read arbitrary files.
wwwcount.cExploits Count.cgi, allowing remote exececution of arbitray commands.
ciscocrack.cThis contains script and source for decrypting cisco encrypted passwords.
wm_exploit.cOverwrites a buffer in 'wm' from Ideafix package for Linux, giving root.
brute_ssl.cThis program will brute force it's way into secure and non-secure webservers.
sr-crash.cSource routing exploit for Linux v1.0.x-v1.3.x that causes the kernel to panic.
aix_ping.cOverwrites a buffer in gethostbyname(), giving root access.Vendor Patch
aix_lchangelv.cAnother buffer overrun that gives root on AIX 4.x machines.Vendor Patch
aix_xlock.cThis will overwrite a buffer in /usr/bin/X11/xlock giving root.Vendor Patch
web_sniff.cA Linux sniffer that is designed to retrieve web usernames and passwords.
arp_fun.txtICMP and arp can be used to deny service and spoof other hosts on the LAN.
xf86_ports.txtA normal user can run X on a reserved port thus blocking legitmate daemons.
hostscan.cmdOS/2 Rexx-script that scans hosts by IP-adresses
solaris_telnet.cA program designed to attack a Solaris 2.5 box, making it totally unresponsive.
identd_attack.txtA massive amount of authorization requests can render a system unusable.
secure_shell.txtUsing SSH, a non-root user can open privleged ports and redirect them.
sshd_redirect.txtAny normal user can redirect privileged ports using secure shell daemon.
medax_linux.tgzA TCP sequence number predictor that also lets you execute commands.
samba_exploit.txtLocal and remote exploit for samba that sends an xterm back to your display.
bsd_procfs.cIn /proc under FreeBSD 2.2.1, you can modify a setuid executable's memory.
zgv_exploit.cThis will overwrite a buffer in /usr/bin/zgv on Redhat Linux systems, giving root.
heroin.cThis sample source illustrates the dangers of Linux modules in the kernel.
sgi_html.txtIt is possible to execute remote commands on IRIX 6.3 and 6.4 via /usr/sysadm.
ipd_probe.txtThe Internet Probe Droid can scan massive amounts of hosts very quickly.
smurf.cSpoofs IMCP packets resulting in multiple replies to a host from a single packet.
in.comstat.txtIf a user has biff y on, in.comstat can be used increase the system load.
bind_nuke.txtBind8.1.(1) can't update the same RR more than once in the same DNS packet.
chkexploit_1.13.tgzA shell script for Linux that checks for some publicly available exploits.
syslog_deluxe.cLets you write spoofed and arbitrary messages to another machine's syslogd.
dgux_fingerd.txtThe fingerd that ships w/ dgux allows remote execution of arbitrary commands.
smb_mount.cThis overwrites a buffer on Linux systems in smbmount from smbfs-2.0.1.
nmap.1.25.tar.gznmap is a utility for port scanning large networks and currently runs on Linux.
innd_exploit.cOverwrites a buffer in innd on Linux x86 systems thus giving a remote shell.
smlogic.cThis is a fully functional logic bomb designed render Linux systems unuseable.
intruderf.cA trojan for Linux system that mails you user's names and passwords.
ld.so.cOverwrites a buffer via LD_PRELOAD env. variable, giving root on Linux.
sol_syslog.txtIf Solaris syslogd gets a message and it can't resolve the sender's IP, it dies.
promisc.cThis program will scan your network devices to detect running sniffers.
solaris_ping.txtOn Solaris 2.x systems, any user can crash or reboot the system using ping.
seyon_exploit.shExploit for seyon, giving you the euid or egid of whatever seyon is suid to.
aixdtaction.cOverwrites a buffer in /usr/dt/bin/dtaction giving root access.Vendor Patch
datapipe.cMakes a pipe between a listen port on localhost and a port on a remote machine.
sping.tar.gzLinux binary and source of 'sping' which causes Win95 machines to crash.
linux_httpd.cOverwrites a buffer in NSCA httpd v1.3 on linux systems, giving a remote shell.
sgi_cgihandler.txtOn IRIX systems, /cgi-bin/handler can be used to issue arbitrary commands.
wuftpd_umask.txtThe umask for wuftpd 2.4.2-b13 is 002 making files group writeable by anyone.
majordomo.txtLocal and remote users can execute arbitrary commands from majordomo.
glimpse_http.txtGlimpse HTTP (Interface to Glimpse Search Tool) can issue remote commands.
pandora.tgzThis is the Unix version of the Netware version 4.x NDS cracking utility.
telnet_core.txtOn Linux systems, it is possible to get part of the shadow file w/ cores.
fake_ps.txtChecks for 'ps' trojans by running 'ps' and checking results against /proc.
hpux-cue.txtOn HP 10.20, users can truncate arbitrary files using the setuid cue program.
rpc.mountd_bug.txtOne can see what files a machine contains by looking at rpc.mountd responses.
ircd_kill.cOverwrites a buffer in ircII daemons, causing a segmentation fault in the server.
lpboost.cA simple program demonstrating problems with PLP/LPRng user authenticiation.
imapd_4.1b.txtIt's possible to crash imapd, thus leaving shadow and password files in core file.
sneakin.tgzA way to 'reverse telnet' from a box behind a firewall that allows ICMP packets.
qmail.tar.gzThis is a replacement sendmail-binmail system providing security and efficiency.
h_rpcinfo.tar.gzAllows you to sneak past port filters on port 111 and get dumps of RPC services.
synlog-0.4.tar.gzSynlog monitors half open TCP connections such as synfloods or synscans.
net_rpm.txtRedhat Package Manager (rpm) can be used to overwrite arbitrary files.
wrapper-v2.tgzThis is a generic wrapper to prevent the exploitation of suid/sgid programs.
solaris_ifreq.cOn Solaris, users can do control requests on a root created socket descriptor.
longpath.shScript that implements a long path attack causing various problems on Linux.
logarp.tar.gzUseful for seeing if users on your subnet are "stealing" IP addresses.
aix_dtterm.cThis will overwrite a buffer in /usr/dt/bin/dtterm, giving root.Vendor Patch
campus_cgi_holeDescribes a hole in campus cgi which allows execution of remote commands.
listhosts.cA host resolving program based on nslookup and other pieces of named tools.
irix-wrapper.cWraps programs on IRIX to prevent command line argument buffer overruns.
irix-df.cThis will overwrite a buffer in /bin/df on IRIX systems, thus giving a root shell.
irix-dp.cOverwrites a buffer in /usr/lib/desktop/permissions, giving egid of sys on IRIX.
irix-login.cThis will overwrite a buffer in /bin/login on IRIX systems, giving root.
irix-xlock.cThis will give root by overwriting a buffer in /usr/bin/X11/xlock on IRIX.
synsniff.tar.gzScript in perl which watches for inbound connections (SYN's) and logs them.
SunOS_crash.txtReading /dev/tcx0 on a SunOS 4.1.4 Sparc 20 causes a system panic.
imapd_exploit.cGet remote root access on Redhat systems by overwriting a buffer in impad.
xlock.cOn Linux systems, this will overwrite a buffer in setuid xlock, giving root access.
phobia.tgzThis utility does a scan of an internet host looking for various vulnerabilities.
elm_exploit.cOverwrites a buffer in Elm and Elm-ME+ on Linux via TERM environ. variable.
daynotify.shThis script will exploit a bug in SGI's Registration Software under IRIX 6.2.
brute_web.cThis program will brute force it's way into a web server giving a user and passwd.
tcpdump.tar.ZTool for network monitoring and data acquisition (needs library packet capture).
winnuke.cSends Out of Band Data to a Win95/NT computer causing panics and reboots.
sperl.tgzOverwrites a buffer in the sperl5.001 and sperl5.003, thus giving root access.
dip-prob.txtDip will allow an ordinary user to gain control of arbitrary devices in /dev.
nlspath.txtExploits for ping, minicom, su and others on Linux via NLSPATH env. variable.
solaris_lp.shScript for Solaris that breaks lp, then use lp priv to break root (or bin, etc...).
AIX_mount.cOverwrites a buffer in /usr/sbin/mount on AIX 4.x systems.Vendor Patch
vold_prob.txtIt is possible to corrupt CDROM management on Solaris by changing block size.
fdformat-ex.cThis will overwrite a buffer in /usr/bin/fdformat on Solaris 2.x systems giving root.
sunos-ovf.tar.gzThis program is designed to test buffer overflows on SunOS 4.1.x boxes.
cxterm.cOverwrites a buffer in Chinese xterm Linux systems, thus giving root access.
color_xterm.cThis will overwrite a buffer in /usr/X11/bin/color_xterm, giving root on Linux.
pepsi.cThis program is a random source host UDP flooder that compiles under Linux.
tlnthide.cAllocates a port and sets up a telnet gateway making it difficult to trace telnets.
jping.tar.gzThis is another simple IMCP flooding program that compiles under Linux.
LPRng.tgzA light weight printing system especially designed with security in mind.
jolt.cSends oversized fragmented packets to Win95 boxes causing them to lock up.
utclean.cThis will remove your presence from wtmp, wtmpx, utmp, utmpx, and lastlog.
eject.cOverwrites a buffer on Solaris 2.x systems in /usr/bin/eject, giving a root shell.
bind-8.1.1.tgzVersion 8.1.1 of bind with many improvements - (includes documentation).
puke.cSpoofs an ICMP unreachable error to a target, causing connection drops.
webs099.tgzA minimalist web server designed primarily for security and handles redirects.
talkd.txtThis explains how to get root remotely by overwriting a buffer in in.talkd.
pingmod.tar.gzA very flexible pinging program that is able to fake ICMP packets and more.
rbone.tar.gzAnother IP spoofer type program that guesses TCP sequence numbers.
bsd_cxterm.cThis will overwrite a buffer in xterm_color on BSD systems, giving root.
udpstorm.tgzThis is an implenmentation of the udpstorm attack. Works with Linux.
jakal.cPortscanner that avoids logging by not completing the 3-way TCP handshake.
lin_probe.cThis overwrites a buffer in /usr/X11/bin/SuperProbe on Linux, thus giving root.
AIX_host.cOverwrites a buffer in gethostbyname() giving a root shell.Vendor Patch.
sgi_systour.txtExploit for /usr/lib/tour/bin/RemoveSystemTour on IRIX 5.3 & 6.2 that gives root.
connect.cCrashes AIX 4.1.4, AIX 4.1.5, HP-UX 10.01, and HP-UX 9.05.Vendor Patch
sol2.5_nis.txtThis show how to exploit /usr/lib/nis/nispopulate on Solaris 2.5 systems.
xdm_bugs.txtShows how to deny service from xdm. It also doesn't close file handles correctly.
crack-2a.tgzUnix Password Cracker 2.0(a) by Scooter Corp. (Comes with crack dictionary).
lilo-exploit.txtGet root on the lastest versions of Linux (at the console) using LD_PRELOAD.
rsucker.plPerl script that acts as a fake r* daemon and logs usernames sent from clients.
synk4.cAn improved Syn Flooder that also supports a random IP spoofing mode.
portmap_5b.tar.gzPortmapper that supports access control in the style of the tcp wrapper package.
irix-login.txtOn Irix systems /var/adm/badlogin has failed logins and passwords in clear text.
iebugs.tar.gzMicrosoft Internet Explorer bugs one through six in text and html format.
arnudp.cShows how to send single UDP packets from an arbitray souce/destination.
sun-reboot.txtBy typing: perl -e 'print "\e[1J"' you can reboot a sun ultra sparc at the console.
cgiwrap-3.22.tgzThis is a gateway that allows a more secure user access to CGI programs.
fastcracker.tgzThis program is designed to quickly crack DES encrypted passwords.
pma.tar.gzPoor Man's Access - A daemon that lets you issue shell commands remotely.
lpr_bugs.txtIt is possible to create, read, and delete any file on the system using lpr/lpd.
vsr.tar.gzA loadable module for SunOS systems that creates a virtual IP interface.
makedir.txtPrograms to create thousands of directories and to delete these directories.
tcpprobe.cThis is a tcp portscanner that shows accepted connections on a remote host.
locktcp.cThis program will freeze a Solaris/x86 2.5.1 systems, causing denial of service.
irix-wrap.txtThis shows how to get a listing of directories (755) from cgi-bin/wrap on Irix 6.2.
block.cStops users from logging in by monitoring utmp and closing down user's tty ports.
tin_problem.txtrtin/tin creates /tmp/.tin_log w/ mode of 0666 in /tmp and follows symbolic links.
sun_patch.shIf you have a sun SPARC, this script will stop all forms of buffer overrun attacks.
riputils.tgzThis is a set of routing internet protocol utilities designed for Linux systems.
ipbomb.cThis will attack a target host by sending various sizes and numbers of IP packets.
test-cgi.txtUsing the CGI program test-cgi, you can inventory files on remote systems.
lquerypv.txtOn AIX systems you can read any file (in hex) on the system with lquerypv.
cops_104.tar.gz(Computer Oracle & Password System) checks for Unix misconfigurations.
Crack v5.0Got access to password or shadow file? Shows what other user's passwords are.
Crack DictionaryThis is a general 50,000 word dictionary for use with Crack or other programs.
Esniff.cThis is the source code for basic ethernet Sniffer. ( Straight out of Phrack ).
fakerwall.cLets you send an rwall message from an arbitrary host of your choice.
fpingLike UNIX ping(1), but allows efficient pinging of a large list of hosts.
simping.cSimulates the "ping -l 65510 victim.host" from Win95 - also compiles on Linux.
bind.txtThis describes a potenitaldenial of service problem with BIND-4.9.5-P1.
pong.cAttacks an arbitrary host by sending a flood of spoofed ICMP packets.
jizz.cA DNS spoofer that exploits the cache vulnerability in most BIND daemons.
any-erect.cAnother DNS spoofing type program much like jizz.c. Compiles on Linux.
hide.cExploits a world-writeable /etc/utmp and allow the user to modify it interactively.
hsh002.cThis is a neat little shell for experimentation with lots of interesting features.
netpipes4.0.tgzA package (that comes w/ Linux) to manipulate BSD TCP/IP stream sockets.
nfswatch4.1.tar.ZThis lets you monitor NFS requests to any given machine or the entire network.
nfstrace.tgzThis nfstrace package lets you to perform NFS tracing by network monitoring.
wuftpd-owrite.shExploit for wu-ftpd to create or overwrite a file anywhere on the filesystem.
wuftpd-sdump.shExploit a bug in wu-ftpd to assemble and view the shadow password file.
shadowyank.cReconstructs the shadow entries from a core file from ftp daemon segmenting.
ICMPinfo V1.10ICMPinfo is a tool for looking at ICMP messages received on the running host.
ident-scan.cTCP scanner that gets the username of the daemon running on the specified port.
ascend.txtProgram for Linux designed to attack Ascend routers with zero length tcp offsets.
gzip.txtWhile a file is being compressed with gzip it is world readable to all users.
iss13.tar.gzThe Internet Security Scanner scans subnets and collects info. about hosts.
libc.so.5A hacked libc.so.5 for Linux that spawns a shell when a call is made to crypt().
sdtcm_convert.txtExplains to how to exploit sdtcm_convert on Solaris boxes to get root access.
mnt.tar.gzExploits a bug in HP-UX 9 rpc.mountd program and gives you NFS file handles.
netcat (V1.10)Like Unix cat(1) but this one talks network packets (TCP or UDP).
NFS ShellThis should be very useful if you have located an insecure NFS server.
pmcrash.cThis allows you to crash ANY Livingston PortMaster by overflowing buffers.
pop3.cAttemps mulitple username/password guesses on machines running POP3.
psrace.cExploits a race condition in Solaris, thus allowing you to make a root shell.
Root KitPrograms like ps, ls, & du that are modified to hide certain files & processes.
rpc_chk.shScript to get a list of running hosts from a DNS nameserver for a given domain.
seq_number.cThis is a program that exploits the TCP Sequence Number Generator bug.
asppp.txtOn Solaris 2.5x86, /tmp/.asppp.fifo can make a world writeable .rhosts file.
kcms.txtGet root on Solaris 2.5 by exploiting /usr/openwin/bin/kcms_calibrate.
remove.cA universal utmp, wtmp, and lastlog editor that also compiles under AIX & SCO.
kmemthief.cIf /dev/kmem is writeable by normal users, then this program will get you root.
slammerSlammer lets you issue arbitray commands on hosts by exploting yp daemons.
socket_demon13.zipDaemon that sits on a specified IP port and provides passworded shell access.
Solaris SnifferThis is a version of ESniff.c that has been modified for Solaris 2.X.
xpusher.cThis is a neat way to send keyboard events to another user's X window.
xsnoop.cThis program allows you to spy on another user's keyboard events like xkey.c
Strobe (V1.03)Scans TCP ports on a target host and reveals which daemons are running.
Tiger (V2.2.3)Tiger attemps to exploit known bugs, holes, and misconfigurations to attain root.
lquerylv.cOverwrites a buffer in /usr/sbin/lquerylv on AIX systems, thus giving a root shell.
TracerouteTraceroute is an indispensable tool for troubleshooting and mapping your network.
open_bug.txtOn {Free,Open,Net}BSD, open() returns a file descriptor to a protected devices.
udpscan.cIdentifys open UDP ports by sending bogus UDP packets and wait for responses.
portd.cA daemon that listens on a port and provides passworded shell access.
pingexploit.cThis lets you send oversized ICMP packets from a unix box just like Win95.
checksyslog.tgzAnalyze your system logs for security problems while ignoring normal behavior.
dosemu.txtOn Debian v1.1, /usr/sbin/dos can be used to read any file on the system.
yaping.0.1.tgzYet another ping for Linux. Packets of size > 65535 octets are supported.
xcrowbar.cSource code that gets you a pointer to an X Display even after an xhost -
xkey.cAttach to any X server you have permission to and watch the user's keyboard.
xwatchwin.tar.gzIf you got access to another's X server,this shows the window on your X-server.
messages.shParses through /var/adm/messages to see if user typed password at login prompt.
FreeBSDmail.txtThis exploit will overwrite a buffer on sendmail 8.6.12 running on FreeBSD 2.1.0.
securelib.tar.ZShared library for SunOS 4.1 and later that will help protect your RPC daemons.
ypsnarf.cThis handy little program will get you yp domain names, yp maps, and yp maplists.
ypx.tgzGuesses NIS domain namesand also extract the maps directly from domains.
ftp-scan.cThis program exploits the ftp protocol to let you scan services on firewalls.
rdist-ex.cWrites past a buffer, straight onto the stack, giving a root shell on FreeBSD.
ttywatcher-1.1b.tgzttywatcher lets a user monitor and interact with every tty on the system.
splitvt.cAn older exploit for Linux that overwrites a buffer in /usr/bin/splitvt, giving root.
mount-ex.cAll Linux versions are vulnerable to this buffer overflow attack on suid mount.
perl-ex.shperl-ex.sh is a simple little sperl script that gives you a root shell via suidperl.
sndmail8.8.4.txtThis will explain how to exploit sendmail version 8.8.4 to get root access.
irix-xhost.txtIn the default setup on Irix, xhost is set to global access for console logins.
aix_bugfiler.txtOn AIX 3.x, /lib/bugfiler can be used to circumvent file access restrictions.
mod_ldt.cGives access to all of Linux's linear memory to user processes at will.
dipExploit.cLinux dip Exploit. Overwrite a buffer in do_chatkey(), thus giving you a root shell.
rexecscan.txtThe rexecd can be used easily to scan the client host from the server host.
rpcs.01b.tar.gzThis is program that is designed to scan subnets for rpc services.
rxvtExploit.txtExploits a popen() call issued by rxvt on Linux machines, thus giving a root shell.
nfsbug.cDemonstates a security problem in unfsd guessing the file handle of the root FS.
abuse.txtExploit for Red Hat 2.1 that gives a root shell by exploitng abuse.console.
xtermOverflo.cA program that overwrites a buffer in libXt.so while xterm is suid to root.
resolv+.expQuick and Simple way to read the /etc/shadow file as well as many other things.
resizeExp.txtAnother Red Hat 2.1 exploit for resizecons due to lack of absolute pathnames.
qcrack.tar.gzqcrack gives increased cracking speeds at the expense of disk space.
Linux rootkitA rootkit designed for Linux systems. Comes with ps, netstat, and login.
X webcomberA cool little tool that lets you search for things (like hacking) on the web.
gpm-exploit.txtThis will get root on Linux systems using /usr/games/doom/killmouse.
pingflood.cThis pings floods a host, thus wasting bandwidth and denying service.
telnetd exploitThis will create a shared library that gives a root shell remotely or locally.
balk.plThis is a perl script that will mess up another's users tty using talk/ntalk.
wallflash.cThis will mess up another user's tty remotely via remote write all (rwall).
pop3d exploitRead the contents of the mail spool of a user when they connect to in.popd.
popper.txtSome versions of (q)popper from qualcomm allow you to read other user's mail.
vif.tar.gzThis code lets you have multiple IP addresses for a single interface.
amod.tar.gzAmodload is a tool which allows the loading of arbitrary code into SunOS kernels.
getethers1.6.tgzgetthers scans all address on an ethernet and producing a hostname/ethernet list.
rootkitSunOS.tgzHere is another root kit designed for SunOS operating systems. Lots of cool stuff.
demonKit-1.0.tar.gzA suite of trojan programs opening back doors to root on a Linux system.
eviltelnetdtelnet-hacked.tgz is a hacked telnet daemon that gives a root shell w/o password.
cfexec.shThis let's you issue arbitrary commands as root on GNU cfingerd 1.0.1.
NFS ProblemsShows some potential problems with Linux in.nfsd concerning read-only exports.
cdromvuln.txtIf Linux CD is mounted w/ suid flag, old exploits still work on live filesystem.
vixie.cOn Redhat Linux systems this will overwrite a buffer in crontab, thus giving root.
linsniffer.cA Linux Sniffer that shows you incoming TCP packets on most ports.
rshd_problem.txtYou can figure out valid usernames by examining the response from in.rshd.
linux_sniffer.cAnother Linux sniffer much like the one above. Shows more detailed TCP info.
sniffit.0.3.5.tar.gzA very flexible network sniffer that has many interesting features (like curses).
Sol2.4Core.txtSolaris 2.4 exploit that lets you to overwrite files when a suid prog. core dumps.
SolAdmtool.txtOn Solaris 2.5, the Admintool can be used to create a writeable /.rhosts file.
irix-netprint.txtOn IRIX, /usr/lib/print/netprint calls 'disable' without specifying absolute path.
SYNpacket.tgzFloods a port with TCP packets w/ SYN bit turned on causing inetd to segment.
login_trojan.cA login trojan program to be run at the console to get other user's passwords.
phf.cA quick way to scan for hosts that still have the phf bug which gives /etc/passwd.
phfprobe.plThis tries to find out as much information about the person calling phf as possible.
SYNWatch.tar.gzThis program watches for TCP packets with the SYN bit turned on.
pinglogger.tar.gzLogs all ICMP packets to a log file so you can see who is ping flooding you.
screen.txtOn BSDi boxes, you can use /usr/contrbi/bin/screen to read /etc/master.passwd.
ftpBounceAttackImplementation of the ftp Bounce Attack allowing you to anonymously do things.
grabem.cA very simple program to get passwords from users logging in on the console.
tcpview.cAnother sniffer type program designed for Sun OS 4.1 architectures using /dev/nit.
pcnfsd.cAllows local users to chmod arbitrary directories on hosts running pcnfsd.
netcraft.tgzContains various (and older) web security issues and exploits from Netcraft.
superforker.cThis is a supercharged version of the classic fork() denial of service attack.
tripwire-1.2.tgzCreates a signature of binary files, and checks to see if these file were modified.
tcpr-1.3.tar.gzSet of perl scripts that let you to run ftp and telnet commands across a firewall.
syslogFogger.cThis allows you to write to system logging facilites via UDP packets to port 514.
ypbreak.cLets you change your username, password, gecos, or shell via yppasswd daemon.
hdtraq.cThis runs as a daemon and purportedly creates bad sectors on a hard drive.
finger_attack.txtBy recursively fingering a host, you can cause a possible crash of in.fingerd.
logdaemon.tar.gzVersion 5.6 of a suite of tcp/ip programs that enhance network system logging.
suTrojan.cA replacement program for su that mails you when an attempt to su is made.
sigurg.cThis code allows up to kill any process on Linux boxes running older kernels.
sushiPing.cOn Sun OS 4.x, this trojan ping gives you a root shell when you make a triggerfile.
webgais.txtThis will explain how to issue shell commands remotely using /cgi-bin/webgais.
sushiQuota.cAnother trojan for Sun 4 machines that is trigger with a triggerfile.
swap-uid.cOn Solaris, an I_PUSH call on an open tty followed by lseek() gived euid=0.
pcs.tgzA libpcap based sniffer that supports multiple interfaces as well as PPP.
sfingerd-1.8.tgzA replacement for the standard unix finger daemon designed for security.
snifftest.csnifftest.c will try to tell you if a sniffer is running on Sun machines.
IPInvestigator.tgzIPIvestigator is another sniffer that lets you watch traffic between machines.
gnmp.tar.gzGeneric Network Message Passing is a simple client server messaging system.
irixmail.shThis is an exploit shell script that will give a root shell on IRIX systems.
lpr ExploitThis small program exploit the suid root lpr program giving root.
Xfree86 ExploitThere is a problem withXFree86 3.1.2 that lets you overwrite files.
wipehd.asmAssembly Language program that will remove the first 10 sectors of a hardrive.
minicom.cThis is an exploit for minicom on Linux systems that will overwrite a buffer.
sam.txtOn HP-UX, the System Administration Manager (sam) can truncate files.
DenialofServicezip file illustrating five simple denial of service attacks on a unix.
xspy.tar.gzxspy is a program that will make user's logins appear on your display.
scan.shThis is a perl script that scans subnets and reports if rexd or ypserv is running.
xscan.tar.gzscans subnets for unsecured X clients and automatically logs results.
BSDcron-ex.cBSD cron exploit. This program overruns a buffer, giving root access.
OSF1_dxchpwdOn OSF1, /usr/tcb/bin/dxchpwd can be used to overwrite any file on the system.
bindExploit.txtSetting SO_REUSEADDR and calling bind allows user to steal udp packets.
cloak.cThis program wipes all traces of a user from a UNIX system.
convfontExploit.shScript that exploits /usr/bin/convfont on Linux systems to get root access.
ipspoof.cThis program demonstrates how to send arbitrary tcp/ip packets.
marry.cThis program is a log editor with lots of interesting features.
juju.cThis is an ICMP-router type program that will redirect ICMP packets.
redirect.cThis program is a generic ICMP redirect sender for Solaris machines.
portscan.cA Linux port scanner that reports the services running on another host.
dumpExploit.txtOn Linux systems /sbin/dump can be used to read arbitrary files.
fingerd.cThis program is another finger type daemon trojan program.
ttysurf.cThis program listens on ttys and tries to get login and passwords.
ttystuff.cThis program let's you input commands into another user's terminal.
generic_buffer.tgzGeneric buffer overrun program for Linux, SunOS, and Solaris.
linux_lpr.cThis program overwrites a buffer in the suid program lpr, thus giving a root shell.
SunOS_user.txtOn SunOS, chsh and chfn use getenv("USER") to validate userid of the caller.
kill_inetd.cThis program causes denial of service by attacking inetd. Runs on Linux systems.
grabBag.tgzTons of old and miscellaneous exploits from different versions of unix.
wu-ftpd.shThis shell script lets you create a file anywhere on the system.
sol_mailx.txtAn old security hole in /usr/bin/mailx still exists in the mailx on Solaris 2.5
oracle.txtDiscusses a denial of service attack against older versions of Oracle Webserver.
hp_stuff.tgzLots of exploits for HP/UX from the Scriptors of Doom.
hpjetadmin.txthpjetadmin can be tricked giving away root by a writeable .rhosts file.
irix-buffer.txtIRIX buffer overruns for df, eject, /sbin/pset, /usr/bsd/ordist, and xlock.
irix-xterm.cThis will overwrite a buffer in xterm on IRIX systems, giving a root shell.
irix-iwsh.cThis will overwrite a buffer in /usr/sbin/iwsh on IRIX 5.3, giving root access.
irix-printers.cThis will overwrite a buffer in /usr/sbin/printers on IRIX systems giving root.
spaceball.txtspaceball.sh can be exploited to give a setuid root shell on IRIX 6.2 boxes.
flash.cMesses up user's terminals by issuing a talk request with vt100 escape chars.
modstat.cThis program will overrun a buffer in /usr/bin/modstat on FreeBSD systems.
ping_bug.txtUsers of pine can overwrite any file in their home directory despite permissions.
pine_exploit.shThis script is an exploit for pine. It can be used to create .rhosts files.
view_source.txtOn some httpd distributions, /cgi-bin/view-source can be used to read files.
sendmail-ex.shThis is an exploit script for sendmail 8.7-8.8.2 for FreeBSD and Linux. Gives root.
smh.csmh.c is an exploit for sendmail 8.6.9. It gives a bin owned setuid shell.
rlogin_exploit.cThis overwrites a buffer in gethostbyame() on Solaris 2.5.1, giving a root shell.
octopus.cA denial of service attack by opening tons of connections to a remote host.
expect_bug.txtExpect does not make handles to pseudo tty's inaccessable to other processes.
html.txtShows interesting links to put in your HTML pages causing denial of service.
autoreply.txtautoreply(1) can be used to create root owned files with a mode of 666.
bdexp.cOn older versions of Linux, this will overwrite a buffer in suid bdash, giving root.
irix-csetup.txtGet root on IRIX via /usr/Cadmin/bin/csetup in conjunction with /usr/sbin/sgihelp.
solsocket.txtOn Solaris-x86 2.5, any normal user can connect to unix domain sockets.
lemon25.cExploit for Solaris 2.5.(1) that overwrites a buffer in passwd, giving root access.
reflscan.cAnother TCP port scanner that escapes logging by using half open connections.
yp.txtOn YP systems, when a password expires, the old password is not required.
bsd_core.txtOn BSDi 3.x, users arbitrarly write files with binary data, but not overwrite them.
ffbconfig-ex.cThis program overwrites a buffer in /usr/sbin/ffbconfig on Solaris 2.5.1 giving root.
FreeBSD-ppp.cThis will overwrite a buffer in pppd on FreeBSD systems, giving a root shell.
sol-license.txtOn Solaris 2.4, if the license manager is running, root can be obtained.
sparc_cpu.txtCompiling main(){while(1);} with optimizations turned on will hose a sparc.
lin-pkgtool.txtThis file explains how to get root on Linux system with the pkgtool program.
startmidi.txtOn IRIX systems, startmidi can be exploited to obtain root privileges.
linux_rcp.txtOn Linux, if you have access to uid 65535 (nobody), then root can be obtained.
doomsnd.txtThis will get root on Linux systems by exploiting the doom sndserver.
solaris_ps.txtExploit /usr/bin/ps and /usr/ucb/ps on Solaris systems, giving root access.
dec_osf1.shExploits /usr/sbin/dop on DEC unix 4.0, 4.0A, and 4.0B, giving a root shell.
tcp_wrapper.tgzVersion 7.5 of the tcp/ip wrapper for inetd. (Does logging and monitoring).
rpcbind_1.1.tgzThis is an rpcbind replacement that includes tcp wrapper style access control.
breaksk.txtNetscape's server key format is susceptible to dictionary attacks.
IP-spoof.txtExamples and text on the art of IP spoofing. (For Linux 1.3.x kernels).
irix-dataman.txtThis file show how to exploit dataman on irix system to obtain root access.
irix-fsdump.txtThis is an exploit for /var/rfindd/fsdump that gives root on irix systems.


E-Mail: schutium@hotmail.com

【乱〓站】  http://com.6to23.com/
 Copyright (C) 1998-2002 阿新(Seraph Chutium), Top_Best Studio. All Rights Reserved.