exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 51 RSS Feed

Files from Ramon de C Valle

Email addressprivate
First Active2003-09-13
Last Active2015-11-06
View User Profile
Linux eCryptfs parse_tag_11_packet Literal Data Overflow
Posted Jul 28, 2009
Authored by Ramon de C Valle | Site risesecurity.org

There exists a vulnerability within a function of Linux eCryptfs (Enterprise Cryptographic Filesystem), which when properly exploited can lead to compromise of the vulnerable system. This vulnerability was confirmed in the Linux kernel version 2.6.30.3. Linux kernel versions 2.6.19 and later have eCryptfs support and may be also affected.

tags | advisory, kernel
systems | linux
SHA-256 | 0f6b82fb65eaf4098684c2a395ac109857a9ba2417bbdefbbffd6286eb1d03d7
TooTalk Buffer Overflow
Posted Jun 20, 2009
Authored by Ramon de C Valle, Adriano Lima | Site risesecurity.org

ToolTalk suffers from a rpc.ttdbserverd _tt_internal_realpath related buffer overflow vulnerability. IBM AIX versions 5.1.0 through 6.1.3 appear affected.

tags | advisory, overflow
systems | aix
SHA-256 | 444f71cdcf6793937036925f0f55f4904dc7eb7fd8ff621556e979d2148ce216
Linux On Power/Cell BE Architecture Buffer Oveflows
Posted Jan 15, 2009
Authored by Ramon de C Valle | Site risesecurity.org

Whitepaper called Linux on Power/Cell BE Architecture Buffer Overflow Vulnerabilities.

tags | paper, overflow, vulnerability
systems | linux
SHA-256 | 6f0f5225518ea3a48a4c06600fde8fd3ac3600d92bcdf768072d926d39dc8060
Linux Slab Allocator Buffer Overflow Vulnerabilities
Posted Dec 12, 2008
Authored by Ramon de C Valle | Site risesecurity.org

This article discusses buffer overflow vulnerabilities in Linux kernel's Slab Allocator. All examples presented on this article were developed and executed on a x86 processor-based machine running Slackware Linux 10.2. Previous knowledge of buffer overflows is required.

tags | paper, overflow, x86, kernel, vulnerability
systems | linux, slackware
SHA-256 | de9f3af11d7e245892dedad5aacde5562b9c0a81ac458d179d52453f718c6faf
unixasm-1.3.0.tar.gz
Posted Nov 18, 2008
Authored by Ramon de C Valle | Site risesecurity.org

A collection of shellcodes for various platforms such as bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.

Changes: Some small bug fixes to AIX Power assembly components and payload modules. New assembly components and payload modules for AIX Power. New assembly components and payload modules for Linux Power/Cell Broadband Engine Architecture. New assembly components and payload modules for Linux Power/Cell Broadband Engine Architecture.
tags | x86, shellcode, proof of concept
systems | linux, solaris, bsd
SHA-256 | d25fcf7756089a75b6e419be8e5587a8b3471d72d2e0112c2cb38b7403c693ae
unixasm-1.2.0.tar.gz
Posted Sep 11, 2008
Authored by Ramon de C Valle | Site risesecurity.org

A collection of shellcodes for various platforms such as bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.

Changes: This new version includes new Network server code (bndsockcode), Network connect code (cntsockcode) and Find socket code (fndsockcode) assembly components for AIX POWER/PowerPC.
tags | x86, shellcode, proof of concept
systems | linux, solaris, bsd
SHA-256 | 3c4966cd588618c8497a8e094806f48cc10932032077447528eef558dc204afc
unixasm-1.1.0.tar.gz
Posted Feb 8, 2008
Authored by Ramon de C Valle | Site risesecurity.org

A collection of shellcode for various platforms bsd-x86, linux-x86, sco-x86, and solaris-x86. This project contains a set of assembly components for proof of concept codes on different operating systems and architectures. These components were carefully designed and implemented for maximum reliability, following strict coding standards and requirements, such as system call invocation standards, position independent, register independent and zero free code. A special attention was put on code length when designing and implementing them, resulting in the most reliable and shortest codes for such purpose available today.

tags | x86, shellcode, proof of concept
systems | linux, solaris, bsd
SHA-256 | 7b909d52a2bd4314a9cab14b33be3cd40f0d773af5bd5df25329e968b8b0a1f4
RISE-2007004.txt
Posted Nov 16, 2007
Authored by Ramon de C Valle, Adriano Lima | Site risesecurity.org

There exists a vulnerability within an architecture dependent function of the Apple Mac OS X 10.4.x kernel, which when properly exploited can lead to local compromise of the vulnerable system. Proof of concept code included.

tags | exploit, kernel, local, proof of concept
systems | apple, osx
SHA-256 | a2f42affdf7e92cfb45ee12031a066c7505e5f3fb2f05c870d00879bbf8cb294
RISE-2007003.txt
Posted Oct 5, 2007
Authored by Ramon de C Valle, Adriano Lima | Site risesecurity.org

There exists multiple vulnerabilities within functions of Firebird Relational Database, which when properly exploited can lead to remote compromise of the vulnerable system.

tags | advisory, remote, vulnerability
SHA-256 | 1c86a390506eff2926bd6e4aa1194c457840db61d3266849eacf36611c21d7d8
RISE-2007002.txt
Posted Oct 5, 2007
Authored by Ramon de C Valle, Adriano Lima | Site risesecurity.org

There exists multiple vulnerabilities within functions of Borland InterBase, which when properly exploited can lead to remote compromise of the vulnerable system.

tags | advisory, remote, vulnerability
SHA-256 | 4677f1e27489c5e2f6da840db8cc4baacfe3704811d7e3fa34b629b2925dd959
interbase_create.rb.txt
Posted Aug 8, 2007
Authored by Ramon de C Valle, Adriano Lima

This Metasploit module exploits a stack overflow in Borland Interbase 2007 by sending a specially crafted create request.

tags | exploit, overflow
advisories | CVE-2007-3566
SHA-256 | 3e86d3a39bb4d94d658211aedac9393c5ed438275012efe2be5e6a027d43a17a
lsa_transnames_heap-osx.rb.txt
Posted Jul 26, 2007
Authored by H D Moore, Ramon de C Valle, Adriano Lima | Site risesecurity.org

This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the szone_free() to overwrite the size() or free() pointer in initial_malloc_zones structure. OSX version.

tags | exploit, overflow
systems | apple
advisories | CVE-2007-2446
SHA-256 | 41df3765c835402280aab01fc03d46c9b2c7b29c3dc978680897dd0fb25af88e
lsa_transnames_heap-solaris.rb.txt
Posted Jul 26, 2007
Authored by H D Moore, Ramon de C Valle, Adriano Lima | Site risesecurity.org

This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon and Adriano), which only works with Samba versions 3.0.21 through 3.0.24. Additionally, this module will not work when the Samba "log level" parameter is higher than "2". Solaris version.

tags | exploit, overflow
systems | solaris
advisories | CVE-2007-2446
SHA-256 | de2f7abb618670f26477578d2cf35a14414c6516b9a7f7271f2d1b1d3ca0ba65
lsa_transnames_heap-linux.rb.txt
Posted Jul 26, 2007
Authored by H D Moore, Ramon de C Valle, Adriano Lima | Site risesecurity.org

This Metasploit module triggers a heap overflow in the LSA RPC service of the Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon and Adriano), which only works with Samba versions 3.0.21 through 3.0.24. Additionally, this module will not work when the Samba "log level" parameter is higher than "2". Linux version.

tags | exploit, overflow
systems | linux
advisories | CVE-2007-2446
SHA-256 | ecad9d88ed773b5eba7139281a534e16adc238b07ada385028643a4c54900d67
mswin-anim.txt
Posted Jun 11, 2007
Authored by Ramon de C Valle | Site risesecurity.org

Microsoft Windows animated cursor stack overflow exploit with reverse shellcode.

tags | exploit, overflow, shellcode
systems | windows
SHA-256 | 1a4e222ee915a53deac41e525052a79fdeba491946f5b20afd80db953052b3e9
RISE-2006002.txt
Posted Oct 2, 2006
Authored by Ramon de C Valle, RISE Security | Site risesecurity.org

RISE-2006002: There exists a vulnerability within a architecture dependent function of the FreeBSD kernel (FreeBSD 5.2-RELEASE through FreeBSD 5.5-RELEASE), which when properly exploited can lead to local compromise of the vulnerable system. This vulnerability was fixed in FreeBSD 6.0-RELEASE, but production (legacy) releases 5.2 through 5.5 are still vulnerable.

tags | advisory, kernel, local
systems | freebsd
SHA-256 | 94ae7ebd3c47291aab33892e9d461968249c807d5246b761a801423c4e3cd32e
sco-x86-xkb.c
Posted Sep 8, 2006
Authored by Ramon de C Valle, RISE Security | Site risesecurity.org

Proof of concept code for the X11R6 XKEYBOARD extension strcmp() buffer overflow vulnerability. Written for SCO UnixWare 7.1.3.

tags | exploit, overflow, proof of concept
systems | unixware
SHA-256 | e767c4244c85d6574cfdd4eb3f5e611e1e55038f5361a51054cbbc92acb58183
sol-x86-xkb.c
Posted Sep 8, 2006
Authored by Ramon de C Valle, RISE Security | Site risesecurity.org

Proof of concept code for the X11R6 XKEYBOARD extension strcmp() buffer overflow vulnerability. Written for Solaris 8, 9, and 10 on the x86 architecture.

tags | exploit, overflow, x86, proof of concept
systems | solaris
SHA-256 | 59b8701f86673823e6d2be4c038f685e96a1f7b835eed17860522d06c2383da1
sol-sparc-xkb.c
Posted Sep 8, 2006
Authored by Ramon de C Valle, RISE Security | Site risesecurity.org

Proof of concept code for the X11R6 XKEYBOARD extension strcmp() buffer overflow vulnerability. Written for Solaris 8, 9, and 10 on the SPARC architecture.

tags | exploit, overflow, proof of concept
systems | solaris
SHA-256 | 6743da2899320f9c17b75434128525c671ea1118b660678fc056a9a0f8449a0b
RISE-2006001.txt
Posted Sep 8, 2006
Authored by Ramon de C Valle, RISE Security | Site risesecurity.org

There exists a vulnerability within a string manipulation function of the X11R6 (X11R6.4 and lower) X Window System library, which when properly exploited can lead to local compromise of the vulnerable system.

tags | advisory, local
SHA-256 | 7911db7873cc4ace006bc5fcc5187ae6d8cd1f496a76dd9932cbcd786aa5bc69
osx86_mmdfdeliver.c
Posted Oct 26, 2004
Authored by Ramon de C Valle

MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86.

tags | exploit, x86, local, root
advisories | CVE-2004-0510
SHA-256 | 5a32e0e43ec0a91696cd2732619706797117d91a12166e0b705430b2a2d691a5
unixasm-1.0.0.tar.gz
Posted Oct 24, 2004
Authored by Ramon de C Valle | Site risesecurity.org

A collection of shellcode for various platforms bsd-x86, linux-x86, sco-x86, and solaris-x86.

tags | x86, shellcode
systems | linux, solaris, bsd
SHA-256 | 4ea425bd8e8add22af39fcb210a108dff108ad05535d97ce8c0b6f3b84699efc
x86-linux-shellcode
Posted Sep 13, 2003
Authored by Ramon de C Valle | Site risesecurity.org

Code that executes /bin/sh.

tags | shellcode
SHA-256 | 11e293324484a29a36787255c819b460d7830e2359d8331471dfd2121836cde0
x86-linux-setuidcode
Posted Sep 13, 2003
Authored by Ramon de C Valle | Site risesecurity.org

Code that attempts to restore root privileges.

tags | root, shellcode
SHA-256 | 5003f212fcd49a9b5b28e29825d3e9d16357bd5435a2f33fd2e63e05acc535de
x86-linux-bindsocketshellcode
Posted Sep 13, 2003
Authored by Ramon de C Valle | Site risesecurity.org

Network server code that creates a listening TCP socket on port 65535 and executes /bin/sh.

tags | tcp, shellcode
SHA-256 | 5c33126a97310122075e5c934031c3ed15df533b9d0ebfb96f8e77ddd038ce0f
Page 2 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close