what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files from Arne Vidstrom

Email addressarne.vidstrom at ntsecurity.nu
First Active1999-10-05
Last Active2013-01-11
Cryptzone / McAfee Bypass / Code Execution
Posted Jan 11, 2013
Authored by Arne Vidstrom

SE46 from Cryptzone and Application Control from McAfee suffer from file handling issues that can allow for arbitrary binary execution.

tags | exploit, arbitrary, bypass
SHA-256 | efbcdf48625ce7bc7327f19051a636ea8f8e2c3089629f3de29c07c0d05ac2b9
Siemens SIMATIC S7-1200 PLCs Denial Of Service
Posted Dec 24, 2012
Authored by Arne Vidstrom, Prof. Dr. Hartmut Pohl

Siemens SIMATIC S7-1200 PLCs, version 2 and higher, allow device management over TCP port 102 (ISO-TSAP) and retrieving status information over UDP port 161 (SNMP). It is possible to cause the device to go into defect mode by sending specially crafted packets to these ports.

tags | advisory, udp, tcp
SHA-256 | 679ddc6a6dfabb319c2d94eaa550f322d746da693bd83835da6ccdc4172e3a1f
pmdump.exe
Posted Apr 1, 2005
Authored by Arne Vidstrom | Site ntsecurity.nu

pmdump.exe is a tool that dumps memory for a specified process to a file (as opposed to tools like memdump and dd which dump all of the RAM at once). It is useful for auditing things that might store passwords in memory (for example, VPN clients, email clients, and instant-messaging applications).

systems | windows
SHA-256 | 9a4af71c1a5d4d3180957f67eb75609469b0cc0b24c245ff7b96adfbb0c22915
promiscdetect.exe
Posted Apr 23, 2002
Authored by Arne Vidstrom | Site ntsecurity.nu

PromiscDetect for Windows NT 4.0 / 2000 / XP checks if your network adapter(s) is in promiscuous mode or not (that is, in most cases, if a sniffer is running on the computer or not). Of course the attacker might be intercepting the communication between the tool and the adapter, making the result unreliable, but there are probably many more cases out there where the tool will really detect a sniffer.

systems | windows
SHA-256 | 8a4345015f03031fc61b7d463780177d80619f954ab9748ce8585b34ea995058
sqldict.exe
Posted Nov 9, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

Sqldict is a dictionary attack tool for Microsoft SQL Server which lets you test if the accounts are strong enough to resist an attack or not.

SHA-256 | 41e688c7185065b68cd74e8c1c66f03331b936fc512c25400bdd89eda271d5a0
winzapper.zip
Posted Nov 5, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

WinZapper is a tool which allows you to erase event records selectively from the Security Log in Windows NT 4.0 and Windows 2000. Winzapper FAQ available here.

systems | windows
SHA-256 | f48b79bec06f0ac8d48c122ec1a7af1c9a59ff354aeda78b6c751004093eb002
ackcmd.zip
Posted Aug 15, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

AckCmd is a special kind of remote Command Prompt for Windows 2000. It communicates using only TCP ACK segments. This way the client component is able to directly contact the server component through a firewall in some cases. More information can be found in the ACK Tunneling Trojans paper.

tags | remote, trojan, tcp
systems | windows
SHA-256 | 76bfbdd19f3bc39942b1179dd39f4ee701c18efc216705a72c44051bde2db503
snitch.exe
Posted Aug 15, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

Snitch turns back the asterisks in password fields to plaintext passwords.

SHA-256 | 42ac6b745abd6ab4895ecab7baa93ec7cbdd618cc9419a1e7f8609f403d3110a
inzider.exe
Posted Aug 15, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

Inzider v1.2 shows which processes listen at which ports, and can be used to find Back Orfice 2000 when it is hidden in another process. This is like LSOF for Windows 95/98, Windows NT 4.0 and Windows 2000.

systems | windows
SHA-256 | 2e6466d6e3dddc4f8a9cbd550dc4bdf278548f173b6f6f055ed30ebfbff8d7b9
fakegina.zip
Posted Aug 15, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

FakeGINA intercepts the communication between Winlogon and the normal GINA, and while doing this it captures all successful logins (domain, username, password) and writes them to a text file. FakeGINA shows at least one very important thing - one should never use the same password on more than one system. If one system is compromised, the attacker might use something like FakeGINA to capture all the passwords, and then use them against other systems.

SHA-256 | 5a9e498c2ef801c16119a90749139794ff69b96fbd1ef6e91651a427170d3b2f
fw1_script.tags.txt
Posted Feb 1, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

The "Strip Script Tags" feature in Firewall-1 can be circumvented by adding an extra less than sign before the SCRIPT tag. The code will still execute in both Navigator and Explorer.

tags | exploit
SHA-256 | 63dba9e4776e49be0b9d685899d424e7c95359cd0499b13e8116377966747f78
nt.ie5.scheduler.txt
Posted Dec 2, 1999
Authored by Arne Vidstrom, Svante Sennmark

A vulnerability has been found that the installation of Internet Explorer 5 introduces in Windows NT through the Task Scheduler service. This vulnerability makes it possible for a User to become a member of the Administrators group if he/she can do an interactive logon. The Task Scheduler service is an "improved" version of the usual Schedule service - they are not the same thing. The Schedule service is replaced by the Task Scheduler when Internet Explorer 5 is installed on Windows NT. Microsoft security bulletin 51 addresses this issue and is available here.

tags | exploit
systems | windows
SHA-256 | e586b63470a7536dfa7b26cc02b77cf27aea8efa4fc13b852d5f0a78a50e98c8
delguest.exe
Posted Nov 30, 1999
Authored by Arne Vidstrom | Site ntsecurity.nu

DelGuest deletes the built-in Guest account in Windows NT. This account is supposed to be impossible to delete, and it is impossible to delete through the ordinary user interface, but with DelGuest you can do it.

systems | windows
SHA-256 | e0828fcde478bd09c2faeac52cd28067f6a1545284e87d4cc32d4fa4b6faeeaf
a1.html
Posted Oct 5, 1999
Authored by Arne Vidstrom

Buffer overflows in FTP Serv-U 2.5.

tags | overflow
SHA-256 | 3a0930556d22757867dbc57017c8360dce0eea7e4d7cf71bb2f9c0c7a452b56c
a2.html
Posted Oct 5, 1999
Authored by Arne Vidstrom

".."-hole in Alibaba 2.0.

SHA-256 | ab85df42ea84cf87c53ad28ae97e61da057744109d4ecd488d109858fb7b295e
a3.html
Posted Oct 5, 1999
Authored by Arne Vidstrom

Vulnerabilities in BisonWare FTP Server 3.5.

tags | vulnerability
SHA-256 | 1afa959029404442157477e21c28438df90a40354bf7959843d365e82fdebf6f
a4.html
Posted Oct 5, 1999
Authored by Arne Vidstrom

".."-hole in Broker FTP Server v.3.0 Build 1.

SHA-256 | acfc6c3200dab5bf7eab84848292f6b0484d0d94053fc3bd9537b80dcaf13b5b
a5.html
Posted Oct 5, 1999
Authored by Arne Vidstrom

Netscape Enterprise Server SSL Handshake Bug

SHA-256 | 285d0656db3855b2db3b7e41b331819b487551a63280b537fc0b7c149ef6c543
a6.html
Posted Oct 5, 1999
Authored by Arne Vidstrom

Buffer overflow in AspUpload 1.4.

tags | overflow
SHA-256 | 5ad4e0688d466820ec188552e81108419055d14da22cdd713bf4a438d2bf83d0
gsd.exe
Posted Oct 5, 1999
Authored by Arne Vidstrom

GSD (Get Service Dacl) gives you the DACL (Discretionary Access Control List) of the Windows NT service you specify as a command line option.

systems | windows
SHA-256 | 207e65ce416221840f3ea2bdd7b9ff9ee7a7a1ebf1ab4e9599eab2ee19af02c4
strongpass.dll
Posted Oct 5, 1999
Authored by Arne Vidstrom

A DLL that works like passfilt.dll, but enforces some extra password policies to make it harder for password crackers like l0phtcrack to crack LANMAN hashes of the passwords.

SHA-256 | 46c055ddc72e9b13f964b8310997adc7198cac1962db7fc18277c4aea581363b
downgrade.exe
Posted Oct 5, 1999
Authored by Arne Vidstrom

Fake SMB server that tries a dialect downgrade to get plaintext passwords from remote users. For Windows NT.

tags | remote
systems | windows
SHA-256 | 62340b061d7a15fec551bb7363ad26af415e1c46046113635019a369ec27025b
winfo.exe
Posted Oct 5, 1999
Authored by Arne Vidstrom

Uses Null Sessions to retrieve account and share information from Windows NT.

systems | windows
SHA-256 | 438d40336b187ddd4f1ae7936aab6bee89668ec6aa6a4955fd9e39953de21f77
wups.exe
Posted Oct 5, 1999
Authored by Arne Vidstrom

A UDP port scanner for Windows. Works with Win95/Winsock2.2, Windows 98, NT.

tags | udp
systems | windows
SHA-256 | f4da110b14db5eb5c4c6d2d526bd46237c0b42079d3b886adce824f5112e65a1
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close