DumpBind v1.0 - Set of small utilities to poke around inside the NetWare bindery files. DumpObj, DumpProp and DumpVal work with the individual files (Net$Obj, Net$Prop and Net$Val respectively) displaying all available fields, while DumpBind works with all three files and displays the full bindery structure.
10fffb8d964ba4963e59b86469556512e81e8a6ce086e2f55f059a4dc1d2304d
NEW -- Zipped version 6 of the Netware Hack FAQ.
fb0ffaa0753419bf12509123efa6364b215084c16f105ee3309d6fe24e2def41
itsme's utility that forges Supe if Supe is logged in, and then makes every user Supe equivalent. For Netware 3.x.
fcfecb38ee3991d0d930a682af85f68a76be2b75e975a1d96a0ce47904e077ce
For Netware 3.11, exploits bug in a Netware attach to log in without a password.
9d3d413a899e23dada32f42907b7dbbd21ef508aeae1b4352b91c7a0a8f46387
LANicide is a TSR IPX DoS attack program for Novell NetWare LANs ABOVE version 2.0a.
3903df0e63753d9b225add6a4cb6c24568ce81d4c2751399e8d74251666f9d9f
Utility for looking inside an NLM to see what it does. For Netware 3.x and 4.x.
a37e2ff6ea4f1f06f6111ff681d5e379877e742675e3f37303746a5e45e0a659
Novell Netware Administration Exploit - Description of vulnerability and exploit code used to gain Admin (supervisor) access on Novell NetWare 2.x, 3.x, 4.x, and Novell IntraNetWare 4.x.
86b627556640149953e95d5b25dee5b8df1bffea317ca64bff2ba761efa0fcdd
Brute force login attack program.
abc9f5c2a9f35f49f63f21344a6cbe51d141ffcdac968e705b7b9265a5bc7c81
Novell Login Spoof (source code) - This is a fake novell netware login screen that stores the username and password in the file c:\os31337.sys. Initial release by ManicX
8b5fd951c22cf32e48c8e8220c6e1d17f0176dea1157428d6a04a124c3455205
Novell Login Spoof (executable) - This is a fake novell netware login screen that stores the username and password in the file c:\os31337.sys. Initial release by ManicX
77537f8815ea64317e3ec7fac0bde6dc5781e52c1657037f82ec61717636e352
Funny stuff.
2b929f1682a6d515349f09985be2d755e46818b466965cd42b88a3e97b2ec50c
Very informative and detailed description of the algorithm used for Novell Remote.NLM passwords, and a method (exploit) used to decrypt the passwds.
7a9e8415313b434b7117dc6a1b97dfa10f62d2a734ba9c3bd6f323c34f74d2dc
New NetWare expanded fake login trojan that self-installs and removes the original EXE. Source code.
73d0e37f531f281c4f51d4ef0d9920b3171ef05242bcdf270a11ee47f66fd14e
itsme's example Netware 3.x login code.
3ed829b2223f444c672e7a5f99162193ecc8bbb735ee4165109a1ce705450d94
itsme's "other" hack file, similiar to HACK.ZIP.
9c27fe900a8a1d301294bc8a43a8713d622c8e52fa310648f45100691d09ff46
itsme's trojan LOGIN.EXE and utility for password retrieval on Netware 3.x.
e9de7d151734d2a9de27bc9daa9da171fff6924da98654fa957effd057ead75c
Yet Another Netware Game. Flood the server and its clients with bogus broadcast packets. Exe and source.
02aca0aa5fb98ba9bc85d25d804557a735d94ba145749eb9fd874966100ed3c5