![]() |
ex·ploit\'ek-sploit,'ik-\
1 a: to put to productive use
|
Email Exploits: they take advantage of weaknesses in email related programs and protocols...Just FYI, the Root? column is to identify whether or not it is necessary to have root privileges in order to execute the exploit. The other columns should be self explanatory...if you have any questions or find any errors, feel free to drop an email my way. Other than that, take it easy gang...
Regards, |
FILE NAME |
SIZE |
EXPLOIT |
ROOT? |
|
![]() |
autoreply(1).txt |
(2k) |
autoreply(1) exploit that allows you to read any file as root |
|
![]() |
autoreply(2).txt |
(2k) |
Creates root owned files with mode 666 |
|
![]() |
blackmail.sh |
(7k) |
Shell based anonymous emailing script |
|
![]() |
expn.pl |
(2k) |
Queries sendmail daemon about address interpretations |
|
![]() |
filter.sh |
(1k) |
Filter exploit - obtains user account information (passwords) |
|
![]() |
fm.c |
(4k) |
SMTP host exploit |
|
![]() |
forgery.h |
(10k) |
Forges email messages via sendmail |
|
![]() |
grabfd.c |
(2k) |
Initiate commmands as another user |
|
![]() |
lsmail.c |
(5k) |
Prints out the contents (or headers) of a users mailbox |
|
![]() |
NNTPforger.c |
(9k) |
NNTP news forgery script |
|
![]() |
pop3hack.c |
(6k) |
POP3 protocol exploit script |
|
![]() |
pop3scan.c |
(8k) |
POP3 exploit to obtain username/password pairs |
|
Copyright © 1995-1997 Silicon Toad
Thou Shalt Not Copy
silicon@netwalk.com
Latest Revision: 01.Apr.1997
_________.___.____ .____________ ________ _______ / _____/| | | | \_ ___ \ \ \ \ \ \_____ \ | | | | / \ \/ | | \ / | \ / \| | |___| \ \____| | \/ | \ / _____ /|___|________|___|\________/\_________/\ __|__ / | / \/ [ T O A D ] \/ \ | |( )| (' ') |