Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Assessment-> Exploits » prdelka-vs-SCO-enable

This Directory TOP
Metasploit 3.2
Exploits 2006.01-06
ventrilobotomy.zip
jessica_biel_naked_in_my_bed.c
ms06070.c
ms08-25-exploit.zip
Exploits 2005
xssshellv039.zip
0608-exploits.tgz
openldap-kbind-p00f.c
Exploits 2004
exploit-avp-klin-2.zip
haloloop2.zip
0610-exploits.tgz
0xf_ftpxq.c
sipwitch-0.9.1
Exploits 2001
Exploits 2002
isr-evilgrade-2.0.0
Exploits 2000
0707-exploits.tgz
googlechrome-obfuscate 12.25
Windows Shortcut Exploit Protection Tool 1.0.0
exploitation-arm
hzzp 09.429
Quttera 0.3.1.0.9
asterisk-sip-kill.c
ieatm4v.c
sadmind-root.c
Exploits 2003
dnsfun.c
BitDefenderDOS 12.23
Search

prdelka-vs-SCO-enable

File Size: 1KB
Developer: https://prdelka.blackart.org.uk/
Description:     SCO Openserver 5.0.7 enable exploit. A standard stack-overflow exists in the handling of command line arguments in the enable binary. A user must be configured with the correct permissions to use the "enable" binary. SCO user documentation suggests "You can use the asroot(ADM) command. In order to grant a user the right to enable and disable tty devices". This exploit assumes you have those permissions.
Download:   prdelka-vs-SCO-enable

 

Sponsor Links

Sponsor Links

Share/Bookmark