After sniffing a Netware 3.x RCONSOLE session, this utility by itsme decrypts the encrypted RCONSOLE password.
e4cc2a75a237d5766d02cbdd09f8c9a3e33f9984674c9c9a79b4066d3b06dcd2
Utilities for extracting, importing, and exporting bindery information. Passwords? Netware 3.x binderies.
d375b505e987a18a7c0f2edd021d0932905ce5c6148558e13cfa169877e72206
An NLM that will either create a Supe user or make an existing user Supe equivalent. For Netware 3.x.
5db16de5f6fc2b459a8a872ea2a9780ce817f80fa7fc677fe0fb2ee0542e60cb
Burn up drive space on SYS: volume by filling up the SYS$ERR.LOG. About 1MB per minute. Exe and source.
ff6ccdbf1d815a132cd7a8aae1e7030e3ea1d6d0bb3a131c1eb57998aa613ff2
Checks for users that have no password. Netware 3.x and 4.x.
6a2d374b8310402fb73a2fa5e84f0ee8ce6b730b01b21bf5c79c2937370f2317
Since Novell has removed copy.nlm from their web site it can now be downloaded here.
a2e1684e9d47d2de480f01c2d74881139d156f7599fc903f81c3c4a83f515fa5
DumpBind v1.0 - Set of small utilities to poke around inside the NetWare bindery files. DumpObj, DumpProp and DumpVal work with the individual files (Net$Obj, Net$Prop and Net$Val respectively) displaying all available fields, while DumpBind works with all three files and displays the full bindery structure.
10fffb8d964ba4963e59b86469556512e81e8a6ce086e2f55f059a4dc1d2304d
NEW -- Zipped version 6 of the Netware Hack FAQ.
fb0ffaa0753419bf12509123efa6364b215084c16f105ee3309d6fe24e2def41
itsme's utility that forges Supe if Supe is logged in, and then makes every user Supe equivalent. For Netware 3.x.
fcfecb38ee3991d0d930a682af85f68a76be2b75e975a1d96a0ce47904e077ce
For Netware 3.11, exploits bug in a Netware attach to log in without a password.
9d3d413a899e23dada32f42907b7dbbd21ef508aeae1b4352b91c7a0a8f46387
LANicide is a TSR IPX DoS attack program for Novell NetWare LANs ABOVE version 2.0a.
3903df0e63753d9b225add6a4cb6c24568ce81d4c2751399e8d74251666f9d9f
Utility for looking inside an NLM to see what it does. For Netware 3.x and 4.x.
a37e2ff6ea4f1f06f6111ff681d5e379877e742675e3f37303746a5e45e0a659
Novell Netware Administration Exploit - Description of vulnerability and exploit code used to gain Admin (supervisor) access on Novell NetWare 2.x, 3.x, 4.x, and Novell IntraNetWare 4.x.
86b627556640149953e95d5b25dee5b8df1bffea317ca64bff2ba761efa0fcdd
Brute force login attack program.
abc9f5c2a9f35f49f63f21344a6cbe51d141ffcdac968e705b7b9265a5bc7c81
Novell Login Spoof (source code) - This is a fake novell netware login screen that stores the username and password in the file c:\os31337.sys. Initial release by ManicX
8b5fd951c22cf32e48c8e8220c6e1d17f0176dea1157428d6a04a124c3455205
Novell Login Spoof (executable) - This is a fake novell netware login screen that stores the username and password in the file c:\os31337.sys. Initial release by ManicX
77537f8815ea64317e3ec7fac0bde6dc5781e52c1657037f82ec61717636e352
Funny stuff.
2b929f1682a6d515349f09985be2d755e46818b466965cd42b88a3e97b2ec50c
Very informative and detailed description of the algorithm used for Novell Remote.NLM passwords, and a method (exploit) used to decrypt the passwds.
7a9e8415313b434b7117dc6a1b97dfa10f62d2a734ba9c3bd6f323c34f74d2dc
New NetWare expanded fake login trojan that self-installs and removes the original EXE. Source code.
73d0e37f531f281c4f51d4ef0d9920b3171ef05242bcdf270a11ee47f66fd14e
itsme's example Netware 3.x login code.
3ed829b2223f444c672e7a5f99162193ecc8bbb735ee4165109a1ce705450d94
itsme's "other" hack file, similiar to HACK.ZIP.
9c27fe900a8a1d301294bc8a43a8713d622c8e52fa310648f45100691d09ff46
itsme's trojan LOGIN.EXE and utility for password retrieval on Netware 3.x.
e9de7d151734d2a9de27bc9daa9da171fff6924da98654fa957effd057ead75c
Yet Another Netware Game. Flood the server and its clients with bogus broadcast packets. Exe and source.
02aca0aa5fb98ba9bc85d25d804557a735d94ba145749eb9fd874966100ed3c5