exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 48 of 48 RSS Feed

Files

rcon.zip
Posted Aug 17, 1999

After sniffing a Netware 3.x RCONSOLE session, this utility by itsme decrypts the encrypted RCONSOLE password.

SHA-256 | e4cc2a75a237d5766d02cbdd09f8c9a3e33f9984674c9c9a79b4066d3b06dcd2
bindery.zip
Posted Aug 17, 1999

Utilities for extracting, importing, and exporting bindery information. Passwords? Netware 3.x binderies.

SHA-256 | d375b505e987a18a7c0f2edd021d0932905ce5c6148558e13cfa169877e72206
burglar.zip
Posted Aug 17, 1999

An NLM that will either create a Supe user or make an existing user Supe equivalent. For Netware 3.x.

SHA-256 | 5db16de5f6fc2b459a8a872ea2a9780ce817f80fa7fc677fe0fb2ee0542e60cb
burn.zip
Posted Aug 17, 1999

Burn up drive space on SYS: volume by filling up the SYS$ERR.LOG. About 1MB per minute. Exe and source.

SHA-256 | ff6ccdbf1d815a132cd7a8aae1e7030e3ea1d6d0bb3a131c1eb57998aa613ff2
chknull.zip
Posted Aug 17, 1999

Checks for users that have no password. Netware 3.x and 4.x.

SHA-256 | 6a2d374b8310402fb73a2fa5e84f0ee8ce6b730b01b21bf5c79c2937370f2317
copynlm3.exe
Posted Aug 17, 1999

Since Novell has removed copy.nlm from their web site it can now be downloaded here.

tags | web
SHA-256 | a2e1684e9d47d2de480f01c2d74881139d156f7599fc903f81c3c4a83f515fa5
dumpbind10.zip
Posted Aug 17, 1999
Authored by Wastelands Technologies

DumpBind v1.0 - Set of small utilities to poke around inside the NetWare bindery files. DumpObj, DumpProp and DumpVal work with the individual files (Net$Obj, Net$Prop and Net$Val respectively) displaying all available fields, while DumpBind works with all three files and displays the full bindery structure.

SHA-256 | 10fffb8d964ba4963e59b86469556512e81e8a6ce086e2f55f059a4dc1d2304d
faq.zip
Posted Aug 17, 1999

NEW -- Zipped version 6 of the Netware Hack FAQ.

SHA-256 | fb0ffaa0753419bf12509123efa6364b215084c16f105ee3309d6fe24e2def41
hack.zip
Posted Aug 17, 1999

itsme's utility that forges Supe if Supe is logged in, and then makes every user Supe equivalent. For Netware 3.x.

SHA-256 | fcfecb38ee3991d0d930a682af85f68a76be2b75e975a1d96a0ce47904e077ce
knock.zip
Posted Aug 17, 1999

For Netware 3.11, exploits bug in a Netware attach to log in without a password.

SHA-256 | 9d3d413a899e23dada32f42907b7dbbd21ef508aeae1b4352b91c7a0a8f46387
lanicide.zip
Posted Aug 17, 1999

LANicide is a TSR IPX DoS attack program for Novell NetWare LANs ABOVE version 2.0a.

SHA-256 | 3903df0e63753d9b225add6a4cb6c24568ce81d4c2751399e8d74251666f9d9f
nlm.zip
Posted Aug 17, 1999

Utility for looking inside an NLM to see what it does. For Netware 3.x and 4.x.

SHA-256 | a37e2ff6ea4f1f06f6111ff681d5e379877e742675e3f37303746a5e45e0a659
nov_admin.txt
Posted Aug 17, 1999
Authored by Mnemonic

Novell Netware Administration Exploit - Description of vulnerability and exploit code used to gain Admin (supervisor) access on Novell NetWare 2.x, 3.x, 4.x, and Novell IntraNetWare 4.x.

SHA-256 | 86b627556640149953e95d5b25dee5b8df1bffea317ca64bff2ba761efa0fcdd
novelbfh.zip
Posted Aug 17, 1999

Brute force login attack program.

SHA-256 | abc9f5c2a9f35f49f63f21344a6cbe51d141ffcdac968e705b7b9265a5bc7c81
novell_login_src.zip
Posted Aug 17, 1999

Novell Login Spoof (source code) - This is a fake novell netware login screen that stores the username and password in the file c:\os31337.sys. Initial release by ManicX

tags | spoof
SHA-256 | 8b5fd951c22cf32e48c8e8220c6e1d17f0176dea1157428d6a04a124c3455205
novell_login.zip
Posted Aug 17, 1999

Novell Login Spoof (executable) - This is a fake novell netware login screen that stores the username and password in the file c:\os31337.sys. Initial release by ManicX

tags | spoof
SHA-256 | 77537f8815ea64317e3ec7fac0bde6dc5781e52c1657037f82ec61717636e352
novell-crash.html
Posted Aug 17, 1999

Funny stuff.

SHA-256 | 2b929f1682a6d515349f09985be2d755e46818b466965cd42b88a3e97b2ec50c
novell.remote.nlm.passwd.txt
Posted Aug 17, 1999
Authored by TheRuiner

Very informative and detailed description of the algorithm used for Novell Remote.NLM passwords, and a method (exploit) used to decrypt the passwds.

tags | remote
SHA-256 | 7a9e8415313b434b7117dc6a1b97dfa10f62d2a734ba9c3bd6f323c34f74d2dc
novell95.zip
Posted Aug 17, 1999
Authored by x-empt [lvhc / lou]

New NetWare expanded fake login trojan that self-installs and removes the original EXE. Source code.

tags | trojan
SHA-256 | 73d0e37f531f281c4f51d4ef0d9920b3171ef05242bcdf270a11ee47f66fd14e
nvpw.zip
Posted Aug 17, 1999

itsme's example Netware 3.x login code.

SHA-256 | 3ed829b2223f444c672e7a5f99162193ecc8bbb735ee4165109a1ce705450d94
nw-hack.zip
Posted Aug 17, 1999

itsme's "other" hack file, similiar to HACK.ZIP.

SHA-256 | 9c27fe900a8a1d301294bc8a43a8713d622c8e52fa310648f45100691d09ff46
nwl.zip
Posted Aug 17, 1999

itsme's trojan LOGIN.EXE and utility for password retrieval on Netware 3.x.

tags | trojan
SHA-256 | e9de7d151734d2a9de27bc9daa9da171fff6924da98654fa957effd057ead75c
yang.zip
Posted Aug 17, 1999

Yet Another Netware Game. Flood the server and its clients with bogus broadcast packets. Exe and source.

SHA-256 | 02aca0aa5fb98ba9bc85d25d804557a735d94ba145749eb9fd874966100ed3c5
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close