exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from eth0

Email addresseth0 at hwa-security.net
First Active2000-02-29
Last Active2000-10-31
sscan2k-pre6.HWA.tar.gz
Posted Oct 31, 2000
Authored by eth0 | Site hwa-security.net

Sscan2k is a remote auditing tool which scans for more than 200 known vulnerabilities that are able to be found remotely. Features remote OS detection to prevent unecessary bandwidth usage, a scripting language, modules, improved multiple host scanning, and easy configuration.

Changes: Bug fixes, enhancments, and more vulnerabilities checked for.
tags | remote, vulnerability
SHA-256 | 3523683cf6c1ec13cc211610d4c5467915a0ef2f6ce1ec789979c6fd67fc545c
sscan2k-pre5.HWA.tar.gz
Posted Aug 31, 2000
Authored by eth0 | Site hwa-security.net

sscan2k-pre5, Remote Auditing Tool that scans for more than 200 known vulnerabilities that are able to be found remotely, It depends on the operating system that the target host is running on to check for the vulnerabilities to prevent unecessary bandwidth to be used. Now comes with an easy to use configuration program much like xf86config, it also brings the option to use NMAP to guess operating system or to use sscan2k's scripted modules which are very updatable by the user. Multiple host scanning was improved.

tags | remote, vulnerability
SHA-256 | 142651be5ebe17ddb59e411574ccb8d9778eb8ce60349d3c16584cafead65519
sscan2k-pre4.HWA.tar.gz
Posted Aug 31, 2000
Authored by eth0 | Site hwa-security.net

sscan was given to buffer0verfl0w security by jsbach for the project to be continued for jsbach. From now on sscan will go as sscan2k. sscan2k now has updated vulnerability checks and the code has also been cleaned up. This scanner is now a release of HWA.

SHA-256 | 67bbe3fc726dad8001a1316048e0168304b62884accaa1d0ccdd859f189155a9
HWA-warpcrash.c
Posted Aug 30, 2000
Authored by eth0 | Site hwa-security.net

HWA-warpcrash - Systems Affected: OS/2 Warp 4.5 FTP server V4.0/4.2, OS/2 Warp 4.5 FTP server V4.3, Probably other versions of the software as well. Problem: The FTP server that comes with OS/2 Warp 4.5 TCP/IP can be brought down by a malicious connection attempt.

tags | exploit, tcp
SHA-256 | cf8fada37f8c1613e87c090555684cc0f5c51d3e63815104a2e3e47aeb5420ca
sscan2k-pre3.b0f.tar.gz
Posted Jun 8, 2000
Authored by eth0 | Site b0f.freebsd.lublin.pl

sscan2k is a remote auditing/vulnerability scanner which determines remote OS, and scans the host for applicable vulnerabilities. Features updated vulnerability checks, a scripting language, support for plugins and addons, configureable OS fingerprints, dns zone and subnet scans. Based off sscan by jsbach.

Changes: Fixes by mixter.
tags | remote, vulnerability
SHA-256 | e2be5ced88ce06701e0d2a7db26865443180d8781bcf73eb59d9ca6eba9ccc71
sscan2k-pre2.b0f.tar.gz
Posted May 22, 2000
Authored by eth0, axess. Fixes: Mixter | Site b0f.com

sscan was given to buffer0verfl0w security by jsbach for the project to be continued for jsbach. From now on sscan will go as sscan2k. sscan2k now has updated vulnerability checks along with all the other great features it had before, improved OS detection (user can update the fingerprints by editing Osdefs.ms [which comes in sscan2k scripting language]), etc.

SHA-256 | a6f61002b67b260dd9f801c9a629380896d815e51bf747ee8b98e09a42b77705
tp2.sh
Posted Apr 27, 2000
Authored by eth0 | Site b0f.freebsd.lublin.pl

Timbuktu Pro 2.0b650 denial of service exploit.

tags | denial of service
SHA-256 | 57c923b60dc99c9f00bd5df5a3490c3875a21a218befdfb11e7d5e49b5bd8ac6
warftpd.c
Posted Apr 15, 2000
Authored by eth0 | Site b0f.com

WarFtpd dos attack - The buffer overflow seems to occur because the bound check of the command of MKD/CWD is imperfect. War FTPd 1.70-1 does fix this problem, but it contains other vulnerabilities.

tags | overflow, vulnerability
SHA-256 | 75f5fa10bdcb027b11108ada9ad43286eb50f3575be3fbcb51715841603aff32
b0f-lin14.c
Posted Apr 3, 2000
Authored by eth0 | Site b0f.freebsd.lublin.pl

The following userspace code will locally hang recent linux machines. The send system call immediately puts the kernel in a loop spewing kmalloc: Size (131076) too large. Linux 2.2.14 and 2.3.99-pre2 are vulnerable.

tags | kernel
systems | linux
SHA-256 | 45b0fb037bd3274c47ba26f3c0a580d1dddbc4ee423482056d3cda35938d40b1
pirchslap.c
Posted Feb 29, 2000
Authored by eth0 | Site b0f.com

Pirch98 irc client ident/fserve daemon DoS overflow attack.

tags | denial of service, overflow
SHA-256 | a51683485dd5235a1ce5acee72a775e40b0a4252d1745c90c283550c164014c7
standalone.sh
Posted Feb 29, 2000
Authored by eth0 | Site b0f.com

A sample ipchains firewall script, featuring many options you can uncomment.

tags | tool, firewall
systems | unix
SHA-256 | c73bf8b50e6482f94f2b58e1d0d9d22ff9f47189b62981413f8451f53b316756
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close