what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 4,437 RSS Feed

Files Date: 1999-08-01 to 1999-08-31

AIDE 0.4
Posted Aug 25, 1999
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

tags | tool, intrusion detection
systems | unix
SHA-256 | d995ff1e66845a2e0725d86d2ef681f559fcaf430b984f9180a1b2a746798742
ISS Security Advisory August 23, 1999
Posted Aug 24, 1999

Internet Security Systems (ISS) X-Force has discovered additional local vulnerabilities in the Oracle Intelligent Agent that may lead to root compromise. Local attackers may use these vulnerabilities to execute arbitrary commands as root, as well as create root-owned world-writable files anywhere on the file system.

SHA-256 | b4c7007361061b0c9b49fa5f9c01d795290c6aec86d020f87565d5e2b4b0e414
ISS Security Advisory August 23, 1999
Posted Aug 24, 1999

Internet Security Systems (ISS) X-Force has discovered vulnerabilities in superuser owned executables that may allow local root compromise. Attackers may uses these vulnerabilities to create, destroy, or modify any file on the system, including files owned by the superuser. This attack may be particularly useful to gain complete control of the database system, to manipulate Oracle database files, or to deny service.

SHA-256 | a0c7c030a737f6939d10ed9581dc9750037d12245313248801f08f9c85c940b2
ISS Security Advisory August 23, 1999
Posted Aug 23, 1999

Lotus Domino Server is an integrated messaging and web application server. An attacker can crash the Lotus Notes Domino server and stop e-mail and other services that Domino provides for an organization.

SHA-256 | 8227aba9a12aa60e0a38674bc014c052811274a3f938ad3c81bb834f31cda77a
ISS Security Alert Summary August 15, 1999
Posted Aug 17, 1999

ISS Security Alert Summary for August 15, 1999.

SHA-256 | aea040939f5a04ee9a04044715bfa9bc64dd231351f542d0dd1bd31f8d67bcac
AIX 4.1 gethostbyname() Local Root
Posted Aug 17, 1999

AIX versions 4.1 ,4.x, and 3.x gethostbyname() and /bin/host local root exploit.

tags | paper
SHA-256 | 078223e0cc15496976e5f5eed3ccb736999f49d92b8b3f662506f6bccfa77725
An Interview With Aleph One
Posted Aug 17, 1999
Authored by Network Command

An interesting interview with Aleph One, the moderator of the BugTraq mailing list.

tags | paper
SHA-256 | 53f65d1ad4fbd41bcdaa9a60f75c2f82b64020eccb6afb1d05e153dc839c443a
Stay Anonymous On The Web
Posted Aug 17, 1999
Authored by Max

Stay anonymous on the web - How to maintain your anonymity on the web.

tags | paper, web
SHA-256 | 45ce2300d2627861d9d966d197426130d073d8fe43bf00fe2b5dd88b373c5a9e
Apache 1.1.1 Cookie Issue
Posted Aug 17, 1999

There is a serious vulnerability in the cookies module of the Apache httpd, version 1.1.1 and earlier, which makes it possible for remote individuals to obtain access to systems running the Apache httpd. Only sites which enabled mod_cookies, a nondefault option, are vulnerable.

tags | paper
SHA-256 | 415bebb205840539ae2b17c5545d041bd57718a9f52efe06857b791f9e5cecfb
Hacking Root
Posted Aug 17, 1999

Text about hacking from your web browser by checking the PHF bug and some CGI bugs.

tags | paper, web, cgi
SHA-256 | 6083224d95d5acfbc20b146b869d6b1a8aa0534b55712a0e774946fd4dd73105
Beginners Guide To Hacking
Posted Aug 17, 1999

Beginners guide to hacking that includes an old sendmail exploit.

tags | paper
SHA-256 | 87d0317fbaeb10bddb3b2b64ca8a2d221634a3e1ed1626302e2c829983ded8cc
Berkeley Unix Nuances
Posted Aug 17, 1999

Brief paper discussing security on BSD.

tags | paper
SHA-256 | 026139f602cab91f6fcd3bacb81e14212d96e8ed84b28fb1d2ff8ebf56993d88
BIND Unchecked DNS Data
Posted Aug 17, 1999

In research for our upcoming network auditing tool, SNI has uncovered a serious problem present in implementations of BIND which trust invalid data sent to them. This vulnerability specifically applies to hostname to address resolution and can result in local and remote users obtaining root privileges.

tags | paper
SHA-256 | 859f295eb53b572358085865ed77446854a85dd5a5cdb0284a0ee7123f66f271
Hacking From Your Web Browser
Posted Aug 17, 1999

This file will describe several techniques to acquire a password file just by using an ordinary web browser. The information provided will be best described for the beginner hacker, but all hackers should benefit from this information.

tags | paper
SHA-256 | 4e1a44d79d2b2e0654bfad6a83e62a6c7529e4e3650a189535b3b1585b2494ee
Cyber Christ Meets Lady Luck
Posted Aug 17, 1999
Authored by Winn Schwartau

"Cyber-Christ meets Lady Luck" - With DEFCON is, read this excellent chronicle of Winn's trip to DEFCON II in Las Vegas.

tags | paper
SHA-256 | 33cea51066995a9c4847bebef2f4cd585fded0c560010eae2bc4ff9e5126d0b2
Cyber Christ Bites The Big Apple
Posted Aug 17, 1999
Authored by Winn Schwartau

"Cyber Christ Bites The Big Apple" - We couldn't post Part I of the Cyber Christ series, HOPE (Hackers On Planet Earth) in New York City on August 13-14, 1994.

tags | paper
systems | apple
SHA-256 | 099356f6af4af41de108fa3400d8e38f3aad398d2c95043861a42482126e7c17
A Characteristic Model of Computer Criminals
Posted Aug 17, 1999

Write up called A Characteristic Model of Computer Criminals.

tags | paper
SHA-256 | 32f692c00f079b9d702d915057021bdd5d976ff420ef66c864e1f3c0f484691b
Countermeasures
Posted Aug 17, 1999

This is a whitepaper about countermeasures.

tags | paper
SHA-256 | 36fe0e8dc12ce485cc6068990770578278d4542695f3973f7cf9c747e625dfcb
Covering Your Tracks
Posted Aug 17, 1999
Authored by van Hauser

Interesting text explaining how to cover your tracks when you leave the system.

tags | paper
SHA-256 | d9c1e68a8518fff37df1b395e9629ff68524e7dd103307da1968cff4bcb1c288
Cron Local Privilege Escalation
Posted Aug 17, 1999

SNI has become aware of serious problems relating to the handling of temporary files by the default BSD cron jobs /etc/security and later became aware of an equally serious problem in /etc/daily. In addition, the 4.4BSDlite2 version of /etc/security passes unchecked data to a shell. These bugs make it possible for unpriviliged users to obtain root access, EVEN IF THERE ARE NO SETUID PROGRAMS ON THE SYSTEM.

tags | paper
SHA-256 | 5ca61e56aee4ef540984270e547da4953f9f595ef2022006e71664ad9a93aa72
Using Defunct IPs To Your Advantage
Posted Aug 17, 1999
Authored by optiklenz

Defunct IPs can be used to over ride restrictions set by proxies.

tags | paper
SHA-256 | cd86bfae9038bcf69d749a2181d7e2c863e0dabf413030539ad1a22d0f2ace2c
Denial Of Service Attacks
Posted Aug 17, 1999

The complete text about very old old Denial Of Service Attacks - Contains info on the following attacks: Finger, UDP and SunOS, freezing Xwindows, malicious use of UDP services, attacking with lynx clients.

tags | paper, denial of service, udp
systems | solaris
SHA-256 | 463e7898b6b2aa9555a36473db84072f726275dc3666a85f84e43503e1a75a67
Concerning Hackers Who Break Into Computer Systems
Posted Aug 17, 1999

Whitepaper called Concerning Hackers Who Break Into Computer Systems.

tags | paper
SHA-256 | fe727cd53c18c21231cf9c55821d733ec8d316e5b5fc4bf243ed4b9ea1e55790
DHCP Frequently Asked Questions
Posted Aug 17, 1999

This is a FAQ for DHCP.

tags | paper
SHA-256 | 5046a6a6c8f2d2114eb6a4de84ed742ddad611cf09a500741350756e61e0359c
Random Hacker Rant
Posted Aug 17, 1999

Interesting and well thought out rant sent in by Anonymous.

tags | paper
SHA-256 | 5de02bb3ccad824061afe0d2b3f722815a25e7d3244b9d6f8433b691a2b25429
Page 1 of 178
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close