Giving out exploits to the security community is very whitehatish. We'd like to think of ourselves as being more than whitehats, but whatever you want to call us is fine!

GOBBLES-own-nsmail.sh
Proof of concept exploit for "information leakage bug" in Netscape Mail.

GOBBLES-own-runas.sh
Proof of concept exploit for format bug in runas.

GOBBLES-own-wmcube-gtk.c
Local root exploit for wmcube-gtk (yields uid(kmem)) on FreeBSD.

GOBBLES-own-ettercap.c
Local root exploit for Ettercap.

GOBBLES-own-ettercap-with-irc.c
Remote root exploit for Ettercap.

GOBBLES-own-screen.c
Local root exploit for GNU screen <= 3.9.11.

xwall.s
Remote root exploit for rpc.walld on Sun Solaris.

apache-scalp.c
Rewritten from some of our private stash, works against OpenBSD machines running Apache servers vulnerable to the "chunking" bug that ISS claimed couldn't be exploited on x86.

apache-nosejob.c
Some secfocus critics tried to claim that it would only be exploitable on OpenBSD, after we showed ISS up. 3APAPAPA argued that it absolutely couldn't be exploited on FreeBSD. This version works against any vulnerable Open/Net/FreeBSD machine.

sshutup-theo.tar.gz
Many members of the $$$ community $$$ emailed us, asking if the ISS discovered hole in OpenSSH was actually exploitable, or if it was just some media stunt in order to try to cover for the embarassment of their previous advisory. Yup, it's exploitable!

back to main.