All Hot News Popular Media
Windows NT Operating System, PacketStorm Security

Thu, 21 Sep 2017 00:43:18 GMT
SyncBreeze 10.1.16 SEH GET Overflow
There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs.

Mon, 14 Nov 2016 17:18:22 GMT
Disk Pulse Enterprise 9.9.16 GET Buffer Overflow
This Metasploit module exploits an SEH buffer overflow in Disk Pulse Enterprise version 9.9.16. If a malicious user sends a crafted HTTP GET request it is possible to execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account.

Mon, 03 Jun 2013 16:28:24 GMT
Disk Pulse Enterprise 9.0.34 Login Buffer Overflow
This Metasploit module exploits a stack buffer overflow in Disk Pulse Enterprise 9.0.34. If a malicious user sends a malicious HTTP login request, it is possible to execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account. Due to size constraints, this module uses the Egghunter technique.

Mon, 20 Jun 2011 08:35:37 GMT
Windows NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ Local ring0
There is a pretty obvious bug in win32k!EPATHOBJ::pprFlattenRec where the PATHREC object returned by win32k!EPATHOBJ::newpathrec does not initialize the next list pointer. This is a local ring0 exploit for Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7/8.

Mon, 02 May 2011 18:04:33 GMT
RegLookup Registry Parser 1.0.0
RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Tue, 09 Mar 2010 21:12:34 GMT
RegLookup Registry Parser 0.99.0
RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Thu, 21 Jan 2010 00:12:04 GMT
RegLookup Register Parser 0.12.0
RegLookup is a small command line utility for parsing and searching registry files from Windows NT and later.

Mon, 11 Jan 2010 22:21:23 GMT
Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()-
Microsoft Windows NT/2K/XP/2K3/VISTA/2K8/7 NtVdmControl()->KiTrap0d local ring0 exploit. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

Thu, 26 Nov 2009 00:34:53 GMT
Terminal Server License Bypass
This registry code allows any terminal client access to a Terminal Server. It bypasses the Microsoft "Terminal Server License" and allows the client to create a session on the server without a CAL (Client Access License) or MS Open License. It works on WinNT, Win2000, Win2003 server and Win2008 server.

Thu, 26 Nov 2009 00:34:53 GMT
Microsoft IIS 4.0 .HTR Path Overflow
This exploits a buffer overflow in the ISAPI ISM.DLL used to process HTR scripting in IIS 4.0. This Metasploit module works against Windows NT 4 Service Packs 3, 4, and 5. The server will continue to process requests until the payload being executed has exited. If you've set EXITFUNC to 'seh', the server will continue processing requests, but you will have trouble terminating a bind shell. If you set EXITFUNC to thread, the server will crash upon exit of the bind shell. The payload is alpha-numerically encoded without a NOP sled because otherwise the data gets mangled by the filters.

Thu, 26 Nov 2009 00:34:53 GMT
Microsoft RPC DCOM Interface Overflow
This Metasploit module exploits a stack overflow in the RPCSS service, this vulnerability was originally found by the Last Stage of Delirium research group and has bee widely exploited ever since. This Metasploit module can exploit the English versions of Windows NT 4.0 SP3-6a, Windows 2000, Windows XP, and Windows 2003 all in one request :)

Wed, 22 Oct 2008 22:50:17 GMT
Microsoft Server Service NetpwPathCanonicalize Overflow
This Metasploit module exploits a stack overflow in the NetApi32 CanonicalizePathName() function using the NetpwPathCanonicalize RPC call in the Server Service. It is likely that other RPC calls could be used to exploit this service. This exploit will result in a denial of service on on Windows XP SP2 or Windows 2003 SP1. A failed exploit attempt will likely result in a complete reboot on Windows 2000 and the termination of all SMB-related services on Windows XP. The default target for this exploit should succeed on Windows NT 4.0, Windows 2000 SP0-SP4+, Windows XP SP0-SP1 and Windows 2003 SP0.

Thu, 04 Jan 2007 02:53:42 GMT
Cisco Security Advisory 20081022-asa
Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. These include Windows NT domain authentication bypass, IPv6 denial of service, and a Crypto Accelerator memory leak.

Wed, 29 Nov 2006 02:41:50 GMT
A critical security vulnerability has been found in the Windows NT Message compiler. Arbitrary code execution might be possible.

Sun, 27 Aug 2006 23:00:39 GMT
NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. The enumerated information includes the network transports, NetBIOS name, account lockout threshold, logged on users, local groups and users, global groups and users, and shares. If run under the context of a valid user account additional information is enumerated including operating system information, services, installed programs, Auto Admin Logon information and encrypted WinVNC/RealVNC passwords. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP/2003. PERL source included.

Sun, 21 May 2006 17:51:29 GMT
Whitepaper discussing the hardening of Windows NT.

Wed, 12 Apr 2006 04:22:52 GMT
eEye Digital Security has discovered a second vulnerability in the Microsoft Distributed Transaction Coordinator that could allow an attacker to take complete control over a vulnerable system to which he has network or local access. The vulnerable MSDTC component is an RPC server which is network accessible by default on Windows NT 4.0 Server and Windows 2000 Server systems, over a dynamic high TCP port.

Wed, 14 Dec 2005 07:57:35 GMT
lbture is a local Windows account password brute forcer. It supports dictionary attacks and resume. Works on Windows NT/2K/XP/2K3.

Wed, 02 Nov 2005 06:20:13 GMT
eEye Security Advisory - eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that could allow any code executing on a Windows NT 4.0 or Windows 2000 system to elevate itself to the highest possible local privilege level (kernel).

Sun, 30 Oct 2005 23:33:42 GMT
GoodTech Telnet Server for Windows NT/2000.

Tue, 04 Oct 2005 03:09:21 GMT
318 byte useradd shellcode for Russian Windows NT/2k/XP variants.

Fri, 23 Sep 2005 07:32:28 GMT
Debian Linux Security Advisory 830-1
Debian Security Advisory DSA 830-1 - Drew Parsons noticed that the post-installation script of ntlmaps, an NTLM authorization proxy server, changes the permissions of the configuration file to be world-readable. It contains the user name and password of the Windows NT system that ntlmaps connects to and, hence, leaks them to local users.

Sun, 28 Aug 2005 19:14:10 GMT
Protty is a ring 3 library developed to protect against shellcode execution on Windows NT based systems.

Wed, 17 Aug 2005 05:08:33 GMT
HP Security Bulletin 2005-10.23
HP Security Bulletin - A potential vulnerability has been identified with Openview Network Node Manager (OV NNM). This vulnerability could be exploited remotely by an unauthorized user to gain privileged access. Affected versions: Openview Network Node Manager (OV NNM) 6.2, 6.4, 7.01, 7.50 running on HP-UX, Solaris, Windows NT, Windows 2000, Windows XP, and Linux.

Efilter is an automatic exception reporting utility. It is very useful and handy while doing vulnerability research on any software designed to work under Windows NT platforms. Due to that it hooks KiUserExceptionDispatcher function, it acts BEFORE any of program's active SEH frames take over the exception. In short words it reports programs exceptions even if they are handled by original program.
view page: 194

Save $150 on ALL Home and Home Office Laptops and Desktops when you spend over $1699.99 with coupon code: $150OFF$1700PC

Code: $150OFF$1700PC

Start: 01 May 2017 | End: 01 Mar 2018

Save Up to 25% Off Top Quality Used Tires at!

Start: 03 Oct 2017 | End: 30 Apr 2018



Start: 08 Aug 2017 | End: 30 Apr 2018

Search All Amazon* UK* DE* FR* JP* CA* CN* IT* ES* IN* BR* MX B.V. is based in Amsterdam in the Netherlands. Ready for some statistics? Our 1,534,024 properties, including 860,482 holiday rentals, are located in 123,105 destinations in 229 countries and territories, and are supported internationally by 198 offices in 70 countries.
2013 Copyright © Mobile version 2015 | PeterLife & company
Terms of use Link at is mandatory if site materials are using fully or particulary.
Were treated to the site administrator, a cup of coffee *