[Full-Disclosure] [HAT-SQUAD] new exploit code

2005-03-05 Thread class 101
I let you know that a new exploit code is available at class101.org cheers Computer-Associates :) - class101 Jr. Researcher Hat-Squad.com -

[VulnDiscuss] Re: [Full-Disclosure] [HAT-SQUAD] BadBlue, Easy P2P File Sharing Remote Exploit (update)

2005-02-28 Thread class 101
orcitos releases a dupe with fake date :> > or you sux doing private stuffs. Thats simply not true. Miguel Tarasco developed the first functional exploit for this vulnerability. This exploit was not published before because of disclosure Timeline. regards On Mon, 2

Re: [Full-Disclosure] [HAT-SQUAD] BadBlue, Easy P2P File Sharing Remote Exploit (update)

2005-02-28 Thread class 101
. regards On Mon, 28 Feb 2005 09:42:11 +0100, class 101 <[EMAIL PROTECTED]> wrote: > (reposting again with the hole history) > Andres Tarasco of sia.es has published yesterday a security hole affecting > BadBlue 2.5 and below. > > http://seclists.org/lists/ful

[Full-Disclosure] [HAT-SQUAD] BadBlue, Easy P2P File Sharing Remote Exploit (update)

2005-02-28 Thread class 101
(reposting again with the hole history) Andres Tarasco of sia.es has published yesterday a security hole affecting BadBlue 2.5 and below. http://seclists.org/lists/fulldisclosure/2005/Feb/0704.html Hat-Squad.com brought you a fresh exploit. The exploit and BadBlue v2.5 are both available at clas

[Full-Disclosure] [HAT-SQUAD] BadBlue, Easy P2P File Sharing Remote Exploit

2005-02-27 Thread class 101
Andres Tarasco of sia.es has published yesterday a security hole affecting BadBlue 2.5 and below. http://seclists.org/lists/fulldisclosure/2005/Feb/0704.html Hat-Squad.com brought you a fresh exploit. The exploit and BadBlue v2.5 are both available at class101.org for your exploitation's pratice

[Full-Disclosure] [HAT-SQUAD] 3com 3CDaemon FTP Unauthorized "USER" Remote BOverflow

2005-02-18 Thread class 101
Hat-Squad.com set a proper on that 5years old hole. Clean code class101.org, class101.hat-squad.com Here it is for a quick view on the list:   /*3com 3CDaemon FTP Unauthorized "USER" Remote BOverflow   The particularity of this exploit is to exploits a FTP serverwithout the need of any auth

[Full-Disclosure] [HAT-SQUAD] Findjmp2

2005-02-15 Thread class 101
Findjmp is a tiny tool originally released by Eeye, it's used to scan for call/jmp/pushret offsets. Findjmp2 additions by Hat-Squad :   pop/pop/ret scanner , logging to file.   Im temporaly fixing my new domain, here is a second domain to my website get sources and binary at http://class101.h

[Full-Disclosure] [HAT-SQUAD] Findjmp2

2005-02-14 Thread class 101
Findjmp is a Tiny tool originally released by Eeye, it's used to scan for call/jmp/pushret offsets. Findjmp2 additions by Hat-Squad :   pop/pop/ret scanner , logging to file.   get sources and binary at http://class101.org   -class101

[Full-Disclosure] Re: Nice call to ebx found

2005-02-11 Thread class 101
Yes this if for win2k's OS of course , XP and 2k3 anyway uses stack protection wich decrease the use of such offsets.   -class101Jr. ResearcherHat-Squad.com-

[Full-Disclosure] Nice call to ebx found

2005-02-09 Thread class 101
During the build of an exploit , I have found with the help of Dwarf, a nice call to ebx for the win2k platforms, pro AND server, SP4's serie, ALL languages. This might help some people to point out this.   0x7801B008.msvcrt.dll    

[Full-Disclosure] War-ftpd bug small addition

2005-01-28 Thread class 101
To fix the buggus advisory spreaded everywhere saying that you need to be authenticated, It's false Mc.Iglo ;)   USER %s*115A PASS blahblah   http://secunia.com/advisories/14054/   -class101Jr. ResearcherHat-Squad.com---

Re: [Full-Disclosure] VERITAS Backup Exec 8.x/9.x Remote UniversalExploit

2005-01-11 Thread class 101
you can get my clean code there dfind.kd-team.com Bye and good urgent patching ;) -class101Hat-Squad.com- - Original Message - From: class 101 To: full

[Full-Disclosure] VERITAS Backup Exec 8.x/9.x Remote Universal Exploit

2005-01-11 Thread class 101
Because k-otik are poor looser not respecting the publication of metasploit 2.3 , im forced to post my code.   /*VERITAS Backup Exec v9.1.4691.SP1    v9.1.4691.SP0 v8.5.3572Agent Browser Service, Remote Stack Overflow   Highly Critical   All credits to:   -iDEFENSE(disco

[Full-Disclosure] Netcat v1.11 , fixed release by VulnWatch, get it!

2005-01-02 Thread class 101
  thx to mr wysopal at vulnwatch for the bugfixed release:   Application: Netcat for Windows 1.1   Platform: Windows NT/2000/XP/2003   Severity: Remote code execution Status: Fixed, new version available   Date: 12/27/2004SummaryNetcat for Windows 1.1 has a buffer overflow vulnerab

[Full-Disclosure] (no subject)

2004-12-29 Thread class 101
December 26, 2004 Hat-Squad Advisory: Remote buffer overflow in Netcat TCP/IP Swiss Army Knife Product: Netcat - nc11nt.zip Vendor Url: http://www.securityfocus.com/tools/139/scoreit Version: Netcat v1.1 Vulnerability: Remote stack overflow in the DNS control part Release Date: 26 December, 2004

[Full-Disclosure] [HAT-SQUAD] NetCat Remote Critical Vulnerability, Poc inside.

2004-12-27 Thread class 101
December 26, 2004 Hat-Squad Advisory: Remote buffer overflow in Netcat TCP/IP Swiss Army Knife Product: Netcat - nc11nt.zip Vendor Url: http://www.securityfocus.com/tools/139/scoreit Version: Netcat v1.1 Vulnerability: Remote stack overflow in the DNS control part Release Date: 26 December, 2004

[Full-Disclosure] [HAT-SQUAD] NetCat Remote Critical Vulnerability, Poc inside.

2004-12-26 Thread class 101
December 26, 2004 Hat-Squad Advisory: Remote buffer overflow in Netcat TCP/IP Swiss Army Knife Product: Netcat - nc11nt.zip Vendor Url: http://www.securityfocus.com/tools/139/scoreit Version: Netcat v1.1 Vulnerability: Remote stack overflow in the DNS control part Release Date: 26 December, 2004

[Full-Disclosure] Re: Remote Mercury32 Imap exploit

2004-12-03 Thread class 101
WOW, 14 Targets now You are soo 1337 dude !!! LOL, poor farmer. Greets to only muts on that discovery , and fuck to the secnetops kiddies :) Greetz whitehat.co.il ;) - class101 Hat-Squad.com -

Re: [Full-Disclosure] Is www.sco.com hacked?

2004-11-29 Thread class 101
yes its wrote in background of this image "hacked by realloc" :x Added it in attachement if sco fixed <>

Re: [Full-Disclosure] Immunity, Inc. Advisor

2004-11-26 Thread class 101
nice lookup :) ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] [HAT-SQUAD][Sploit-FIXed-sorry] Remote buffer overflow in MailEnable IMAP service

2004-11-25 Thread class 101
Hat-Squad Advisory: Remote buffer overflow in MailEnable IMAP service   Product: MailEnable Mail ServerVendor Url: http://www.mailenable.comVersion: MailEnable Professional Edition v1.52, MailEnable Enterprise Edition v1.01Vulnerability: Remote buffer overflow in IMAP serviceRelease Date: 2

[Full-Disclosure] [HAT-SQUAD] Remote buffer overflow in MailEnable IMAP service

2004-11-25 Thread class 101
Hat-Squad Advisory: Remote buffer overflow in MailEnable IMAP service   Product: MailEnable Mail ServerVendor Url: http://www.mailenable.comVersion: MailEnable Professional Edition v1.52, MailEnable Enterprise Edition v1.01Vulnerability: Remote buffer overflow in IMAP serviceRelease Date: 2

[Full-Disclosure] Geffen/MCA Records .ASP Community Software, Critical hole

2004-11-21 Thread class 101
  Full disclosure by an Anonymous MCA Records isn't told about this vuln, this is a fulldisclosure, highly critical. More infos: http://www.hat-squad.com/weblog/archives/98.html   greetz to str0ke and milw0rm.com for the good lookup :)

[Full-Disclosure] Re: Why is IRC still around?

2004-11-19 Thread class 101
> Sorry to offend those that use IRC legitimately (LOL - > find something > else to chat with your buddies) Join #n3ws at EFnet, that's legit and not to speak with your buddies, yep , you will fall asleep less stupid tonight ... class101 ___ Full-Discl

[Full-Disclosure] [Advisory + Exploit] NetNote Server 2.2, Remote Crafted String Vulnerability

2004-11-13 Thread class 101
/*       NetNote Server v2.2 build 230, crafted string vulnerability.Poc included crash the server.   Full disclosure and poc exploit by class101 [at] DFind.kd-team.com [&] #n3ws [at] EFnet13 november 2004   --WHAT IS NETNOTE--   Homepage - http://www.alshare.c

[Full-Disclosure] [Advisory + Exploit] SlimFTPd <= 3.15

2004-11-12 Thread class 101
In answer to r00t3d, Im not complaining , I just wants my words to be listened , that's done with or without you agreement , honestly, and sincerly what should I care of you ..., nothing , and I proove you it there, bye and to the next one r00t3d ;> KOTIK sux ballz _

[Full-Disclosure] Re: [Advisory + Exploit] SlimFTPd <= 3.15

2004-11-11 Thread class 101
I dont mean this I mean kotik is receiving tons of exploits everydays and is not displaying the half of it, they keep mostly all codes for them. Of course I dont say this just because they didnt published an exploit that I sended to this site but I got many echo so of some friends wich s

[Full-Disclosure] [Advisory + Exploit] SlimFTPd <= 3.15

2004-11-10 Thread class 101
My nice words again are to kotik biatch. clean code on my website.     /*       SlimFTPd <= 3.15, Remote Buffer Overflow Exploit v0.1.Bind a shellcode to the port 101.   Full disclosure and exploit by class101 [at] DFind.kd-team.com [&] #n3ws [at] EFnet10 november 2004   Thanx to HDMoore and

Re: [Full-Disclosure] [New VULNERABILTY + Exploit] MiniShare, Minimal HTTP Server for Windows, Remote Buffer Overflow Exploit

2004-11-07 Thread class 101
"Inappropriate content was detected in an email you sent to a user at domain macquarie.net.au, the message has not been delivered. " Sorry so looks like the attachement cant be added due to a Symantec check prolly on my shellcodes wich are safe you can believe me... __

Re: [Full-Disclosure] [New VULNERABILTY + Exploit] MiniShare, Minimal HTTP Server for Windows, Remote Buffer Overflow Exploit

2004-11-07 Thread class 101
> Hi, > > nice job! :p > > on m'a di que tu parlais français? > > oui je parle aussi français mieux que l'anglais en tout cas ;) ___ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html

[Full-Disclosure] [Advisory + Exploit] MiniShare, Minimal HTTP Server for Windows, Remote Buffer Overflow Exploit

2004-11-07 Thread class 101
Hi List,     I found yesterday this bug in the last version of MiniShare. This is a simple buffer overflow in the address link. Vendors are contacted at http://minishare.sourceforge.net 1 hour only before the public advisorie.   Actually no fix are available. The exploit is available in att

[Full-Disclosure] [New VULNERABILTY + Exploit] MiniShare, Minimal HTTP Server for Windows, Remote Buffer Overflow Exploit

2004-11-07 Thread class 101
  Hi List,     I found yesterday this bug in the last version of MiniShare. This is a simple buffer overflow in the address link. Vendors are contacted at http://minishare.sourceforge.net 1 hour only before the public advisorie.   Actually no fix are available. The exploit is available in

[Full-Disclosure] Re: Windows 2000 Remote Buffer Overflow by class101

2004-10-22 Thread class 101
to correct you this is for ShixxNote 6.net, not so big app than Win2K, do not send me so many credits ^^   /* ShixxNote 6.net buffer overflow exploit v0.1 Public exploit overflows only Win2K systems, else crashs. Exploit code by class101 [at] DFind.kd-team.com Bind a shellcode to the port 101