all things security
Showing 1 - 25 of 2,405 RSS Feed

Files Date: 1999-09-01 to 1999-09-30

bindinfo.c
Posted Sep 29, 1999
Authored by Joshua James Drake

Bindinfo v1.01: allows root to make DNS queries behind firewalls. Works on Solaris, OpenBSD.

tags | root
systems | unix, solaris, openbsd
MD5 | 063e41e6f5018c2d3112340138f20628
Guile-scan.c
Posted Sep 29, 1999

Cgi Scan v3.1: scans for vulnerable web servers. Based on Ech0's cgi scanner, modified and re-written by Guilecool (### - ircNET - ImperialS). Scans 44 known vulnerabilities.

tags | web, cgi, vulnerability
systems | unix
MD5 | bbc48a743d8c50f168c2a825604b1afc
ms99-040
Posted Sep 29, 1999

Microsoft has learned of a vulnerability in Microsoft\xae Internet Explorer 5 that could allow a malicious web site operator to take inappropriate action on the computer of a person who visited the site. Customers can immediately protect themselves against this vulnerability by disabling Active Scripting in IE 5, as discussed in the FAQ. Microsoft is also developing a patch that will restore safe operation to the affected feature; when the patch is available, this bulletin will be re-released.

tags | web
MD5 | 68ff9295c35fe9bb3a5fcd910b1c6d81
tscan.c
Posted Sep 29, 1999
Authored by Mirage

threaded tcp port scanner 1.1 - september 1999.

tags | tool, scanner, tcp
systems | unix
MD5 | c1b25db15a792a57d18daf066103fe33
default1.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #1: Last weeks news on Help Net Security, Y2K: As the millenium approaches, A look into basic cryptography, The history of Zero Knowledge Systems, Telecommunications 101, Macintosh security: How to make your mac a babel tower!, Computing: A closer look at hard- and software, An approach to Linux System Security, Infection & Vacination, Spam: The problems with junk e-mail, Freedom of speech - related incidents, Meet the underground.

tags | magazine
systems | linux
MD5 | e38213f628c7d80f152e5e3dff419a29
default2.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #2: Y2K: As the millenium approaches, A look into basic cryptography, Internet privacy: What are the issues?, Telecommunications 101, Macintosh Security: How to set up a gateway and firewall, Computing: A closer look at hard- and software, Linux Firewalls, Infection and vaccination, More from the ACPO front, Freedom of speech - related incidents, Intrusion and detection.

tags | magazine
systems | linux
MD5 | 55a18b62a6521067059b13c3a04da8cd
default3.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #3: Y2K: As the millennium approaches, A look into basic cryptography, Internet privacy: Freedom Network, Macintosh Security: F33r my hybride M4c, I'm coding!, Computing: A closer look at hard- and software, Linux: IP Masquerading, Infection and vaccination, Freedom of speech - related incidents, Scams - Getting something by all means, Intrusion and detection part two.

tags | magazine
systems | linux
MD5 | 564d69fa3329554bd69b95b900f286e4
default4.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #4: Description of the Millenium problem, A look into basic cryptography, Telecom 101: Receiving through the serial port, Macintosh security: Security audit with our Mac, Computing: Matrox G400 MAX Review, Understanding basic crypto techniques, Infection & Vaccination, New programs on Net-Security (NS Watch!), More news from the ACPO front, The Hotmail security hole, Meet the underground, Freedom of speech - related incidents, Microsoft Installs US Spy Agency with Windows.

tags | crypto, magazine
systems | windows
MD5 | 6840cea1f5aae8fbaee0542f0e435ceb
default5.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #5: Defaced pages, Hit2000 report, Interview with v00d00, Want secure and encrypted e-mails? , Security audit with our Mac Part-2/2, More from the ACPO front, Infection and vaccination, Watch out for documents you publish on The Internet, Freedom of speech - related incidents, Y2K survey for 72 countries, Journalism.

tags | magazine
MD5 | 78dceea1193cfdcc8e0676417015d30a
default6.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #6: Defaced pages, Ech0 Security Scanner - What's that again ?, Y2K: hoaxes and scams, Infection & Vactination, Hi, my name is..., Virology 101: A primer to computer viruses, More from the ACPO front, Network Solutions Stumbles on WebMail Offering, Securing your Mac, Why NT isn't what it is claimed to be, Freedom of the speech related incidents, Meet the underground.

tags | magazine
MD5 | d3aa177357630c1b659d4665deffef75
leapfrog_1_0a.tar.gz
Posted Sep 28, 1999

Leapfrog 1.0. Leapfrog will anonymize and redirect any port. It can be used to work around firewall configuration and other issues requiring a port redirect. For example, you have a firewall that does not allow telnet (23), but it does allow http (80). Set leapfrog up on the other side of the firewall to listen on port 80 and send to 23, then telnet to port 80 of the leapfrog machine and you will ricochet to the machine you wish to connect. You will have the Leapfrog machines' IP and MAC addresses. It supports unlimited users (well, limited by memory). Leapfrog can be chained, reconfigured on the fly, and customized to change ports/machine redirects without the need to log into the box. It can be configured (with little work) to remove all traces of itself from disk after being loaded, or it can be configured to log everything (default). It supports colors and some basic admin tools. It is very fast. Leapfrog compiles on Solaris 2.6, 2.7, x86 (2.6, 2.7), Linux with pthread libs, BSD with pthread libs. Possibly others, but it wasn't tested on others. (Official Site).

tags | tool, web, x86
systems | linux, unix, solaris, bsd
MD5 | 6453bbcdca763c7d23cc533ff5a58329
patch-netfilter-0.1.8-0.1.9.bz2
Posted Sep 28, 1999

Patch to upgrade from Netfilter 0.1.8.

tags | tool, firewall
systems | linux
MD5 | 40ea9df18411325aea0db213bc1877b7
netfilter-0.1.9.tar.bz2
Posted Sep 28, 1999

Netfilter 0.1.9 for Linux 2.3.18: Packet Mangling for Linux 2.3. New features: Should work with gcc 2.7.x (no more 'memset undefined'), local NFS and conntrack should work fine, speed should be fine for modems, 'Call rusty: need skb_realloc_tailroom!' for ftp cured, tcp and udp ports printed correctly in iptables, should compile on libc5 for SURE this time. (Official Site).

tags | tool, local, udp, tcp, firewall
systems | linux
MD5 | 8ddc5259b0d51108ed51deed252d4947
udp-backdoor-v2.0.tgz
Posted Sep 28, 1999

UDP backdoor v2.0 for UNIX by {MANIAC}. Archive password is set to p4ssw0rd. Use at your own risk.

tags | udp, trojan
systems | unix
MD5 | 11892b19990bc077400e60528a6a411a
unsetenv.txt
Posted Sep 28, 1999

The unsetenv function in glibc 2.1.1 suffers from a problem whereby when running through the environment variables, if the name of the variable being unset is present twice consecutively, the second is not destroyed.

tags | exploit
MD5 | 4529909a635f9bbdcfe84047c2098958
suse6.2pbpg.txt
Posted Sep 28, 1999

On SuSE 6.2, /usr/bin/pb and /usr/bin/pg, suid root by default allow any user to read any file on the system.

tags | exploit, root
systems | linux, suse
MD5 | 5a682377f2bf004596a748a2c5d3105f
unix_virus.c
Posted Sep 28, 1999

A fully functional unix virus that will infect your manpages when started

tags | exploit, virus
systems | unix
MD5 | 8fca1fcb3b8cf397db15d8aadcf2e50c
SuSE_overflow_exploit.txt
Posted Sep 28, 1999

/usr/bin/sccw contains a bug allowing a local root compromise through an overflow in handling $HOME. For Linux x86 tested on SuSE 6.2.

tags | exploit, overflow, x86, local, root
systems | linux, suse
MD5 | 999bc34265cbc09cdc5da047ad04f596
SuSE_root_exploit.txt
Posted Sep 28, 1999

nlservd/rnavc local root exploit for Linux x86 tested on SuSE 6.2. Exploits Arkiea's Knox backup package.

tags | exploit, x86, local, root
systems | linux, suse
MD5 | da1961ba54069b5f3dc255102cf03207
ssh_exploit.txt
Posted Sep 28, 1999

SSH 1.2.27 vulnerable to a denial of service attack

tags | exploit, denial of service
MD5 | 8d1ce7f8432b61de4cd7763bf36870fa
SSH.1.2.27.DOS.txt
Posted Sep 28, 1999

SSH has the option of setting up "authentication sockets", used to pass authentication keys securely. When this is used, a socket is created on both client and server machines; the socket created on the server uses an often easy to guess filename (based on the PID)...

tags | exploit
MD5 | f4df5c33dc23f4302cf81588e4119461
solaris_root_exploit.txt
Posted Sep 28, 1999

Local root exploit for Solaris 2.6 through ps and way it handles $LD_PROFILE.

tags | exploit, local, root
systems | solaris
MD5 | 551bfa3074f8ea348922b7243658515b
sco_local_exploit.txt
Posted Sep 28, 1999

SCO 5.0.x exploits for scosession and scoterm allowing bin/root respectively.

tags | exploit, root
MD5 | dcf8a826a71aba3ecbec4c6ff0b9dc9c
SDI.exploit4.proftpd.txt
Posted Sep 28, 1999

root exploit for the ProFTPD log_xfer() buffer overflow.

tags | exploit, overflow, root
MD5 | 36f58bf2b4ae6702077144913e7681e6
lynx.2.8.2.extern.txt
Posted Sep 28, 1999

When lynx calls external programs for protocols (e.g. telnet), the location is passed unchecked. This can be used to activate commandline parameters.

tags | exploit, protocol
MD5 | e9217106bf08e25490b55400cb9cc511
Page 1 of 97
Back12345Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    8 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close