exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2013-06-06

Sanewall 1.1.3
Posted Jun 6, 2013
Authored by Costa Tsaousis, Phil Whineray | Site sanewall.org

Sanewall is a firewall builder for Linux which uses an elegant language abstracted to just the right level. This makes it powerful and easy to use, audit, and understand. It allows you to create very readable configurations even for complex stateful firewalls. Sanewall can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, all kinds of NAT, providing strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, and whitelists. Newer versions abstract the differences between IPv4 and IPv6, allowing you to define a common set of rules for both, while permitting specific rules for each as you need.

Changes: This release fixes IPv4/IPv6 auto-detection so it is not confused by VLAN interface names such as eth0.22.
tags | tool, spoof, firewall
systems | linux, unix
SHA-256 | f4baeaaad503a6e733fc98155a24a5842b86f244638b2018545645810223b907
Moscrack WPA Cluster Cracker 2.08b
Posted Jun 6, 2013
Authored by Ryan Babchishin | Site moscrack.sourceforge.net

Moscrack is intended to facilitate the use of a WPA cracker on a cluster. Currently, it has only been used with Mosix (clustering software) and SSH nodes. It works by reading a word list from STDIN or a file, breaking it into chunks and passing those chunks off to separate processes that run in parallel. The parallel processes can then execute on different nodes in your cluster. All results are checked (to a degree) and recorded on your master node. Logging, error handling, etc. are all handled for you. Moscrack is designed to be run for long periods of time (days, weeks, or more).

Changes: This version implements a new API which allows the CGI and commandline mosctop to work from remote machines. There are several small bugfixes, many of which were reported by users. A new USB Live image was released, as well.
tags | tool, cracker
systems | unix
SHA-256 | 5a08dbac7461ef9260bbc72b1d7369ff6adace6b3953a49855e03761bd8e4bed
MS13-037 MSIE 8 textNode Use-After-Free
Posted Jun 6, 2013
Authored by sgb | Site security-assessment.com

A use-after-free memory corruption vulnerability was identified in Microsoft Internet Explorer 8. This allows a malicious user to remotely execute arbitrary code on a vulnerable user's machine, in the context of the current user. The memory corruption happens when the application of a style sheet performs style computations on the DOM. A DOM textNode pointer becomes corrupted after the style computation. This pointer is then overwritten when the innerHTML property on the parent object is set.

tags | advisory, arbitrary
SHA-256 | 42e29adc4eef804c5f70dc15a5cf982d90aed29c7b2c9eba91d110e9941198d8
Pantea HTTP Hijacker Tool
Posted Jun 6, 2013
Authored by Nima Ghotbi

Pantea is a plugin-based HTTP session hijacking tool for well known websites. Written in Python.

tags | tool, web, python
systems | unix
SHA-256 | cd04c3ccd5bbc6ffef7c5877a03c9799a88c54a9db8dd50163cdfa6602824b36
Habbomobile / Sulake Blind SQL Injection
Posted Jun 6, 2013
Authored by Juan Carlos Garcia

Habbomobile.com and Sulake.com suffer from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7216bccc44fb13d787aae8860bec2a3ca9a20013ccc5d83fdc5c15b30a10aa39
Apple Security Advisory 2013-06-04-1
Posted Jun 6, 2013
Authored by Apple | Site apple.com

Apple Security Advisory 2013-06-04-1 - OS X Mountain Lion version 10.8.4 and Security Update 2013-002 is now available and addresses over 30 security issues.

tags | advisory
systems | apple, osx
advisories | CVE-2012-2131, CVE-2012-2333, CVE-2012-4929, CVE-2012-5519, CVE-2013-0155, CVE-2013-0276, CVE-2013-0277, CVE-2013-0333, CVE-2013-0975, CVE-2013-0982, CVE-2013-0983, CVE-2013-0984, CVE-2013-0985, CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0989, CVE-2013-0990, CVE-2013-1024, CVE-2013-1854, CVE-2013-1855, CVE-2013-1856, CVE-2013-1857
SHA-256 | 29c85f7c4991f40f099be32dac2f2a9438a7fc5388a3ae3de429d2a6ba9bb431
Apple Security Advisory 2013-06-04-2
Posted Jun 6, 2013
Authored by Apple | Site apple.com

Apple Security Advisory 2013-06-04-2 - Safari 6.0.5 is now available and addresses 26 security issues.

tags | advisory
systems | apple
advisories | CVE-2013-0879, CVE-2013-0926, CVE-2013-0991, CVE-2013-0992, CVE-2013-0993, CVE-2013-0994, CVE-2013-0995, CVE-2013-0996, CVE-2013-0997, CVE-2013-0998, CVE-2013-0999, CVE-2013-1000, CVE-2013-1001, CVE-2013-1002, CVE-2013-1003, CVE-2013-1004, CVE-2013-1005, CVE-2013-1006, CVE-2013-1007, CVE-2013-1008, CVE-2013-1009, CVE-2013-1010, CVE-2013-1011, CVE-2013-1012, CVE-2013-1013, CVE-2013-1023
SHA-256 | e4c05585872c8f1accdd9be9aef4509008eb45dd66dbd1ee0d0d2cef3ba21239
JBoss AS Administrative Console Password Disclosure
Posted Jun 6, 2013
Authored by amroot

JBoss AS administration consoles versions prior to 1.2 re-embed password that are disclosed when viewing page source. This is an obvious poor security practice and the vendor has decided not to fix it, possibly due to lack of comprehending why it is a bad idea.

tags | exploit, info disclosure
advisories | CVE-2013-3734
SHA-256 | c0f10c6904c19a05d1e8a3d0396455570738d1fbdff15f5f67e17fa95e061da2
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close