exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 2,403 RSS Feed

Files Date: 1999-09-01 to 1999-09-30

bindinfo.c
Posted Sep 29, 1999
Authored by Joshua James Drake

Bindinfo v1.01: allows root to make DNS queries behind firewalls. Works on Solaris, OpenBSD.

tags | root
systems | unix, solaris, openbsd
SHA-256 | e29d6b8da305c8f8800aec4d238d658d7d8ec51f60cf8b5a1659907388cfb189
Guile-scan.c
Posted Sep 29, 1999

Cgi Scan v3.1: scans for vulnerable web servers. Based on Ech0's cgi scanner, modified and re-written by Guilecool (### - ircNET - ImperialS). Scans 44 known vulnerabilities.

tags | web, cgi, vulnerability
systems | unix
SHA-256 | 032700ebd0a78cfdac4738909b0120a5f7918bcbf24870952327c173ffe3ecf8
ms99-040
Posted Sep 29, 1999

Microsoft has learned of a vulnerability in Microsoft\xae Internet Explorer 5 that could allow a malicious web site operator to take inappropriate action on the computer of a person who visited the site. Customers can immediately protect themselves against this vulnerability by disabling Active Scripting in IE 5, as discussed in the FAQ. Microsoft is also developing a patch that will restore safe operation to the affected feature; when the patch is available, this bulletin will be re-released.

tags | web
SHA-256 | 3504b624a70dd1f36dbe722244cef00791e4b705d0ab25b0acb83f50908f5323
tscan.c
Posted Sep 29, 1999
Authored by Mirage

threaded tcp port scanner 1.1 - september 1999.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 2411d477cb2b99f2ab069994a3abb50486e3298a49f1301b35b9e3973cf3fc09
default1.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #1: Last weeks news on Help Net Security, Y2K: As the millenium approaches, A look into basic cryptography, The history of Zero Knowledge Systems, Telecommunications 101, Macintosh security: How to make your mac a babel tower!, Computing: A closer look at hard- and software, An approach to Linux System Security, Infection & Vacination, Spam: The problems with junk e-mail, Freedom of speech - related incidents, Meet the underground.

tags | magazine
systems | linux
SHA-256 | bba707d22f2ebf95680af99290e2f4fd516ba71b51f813951b3a22eeb268356f
default2.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #2: Y2K: As the millenium approaches, A look into basic cryptography, Internet privacy: What are the issues?, Telecommunications 101, Macintosh Security: How to set up a gateway and firewall, Computing: A closer look at hard- and software, Linux Firewalls, Infection and vaccination, More from the ACPO front, Freedom of speech - related incidents, Intrusion and detection.

tags | magazine
systems | linux
SHA-256 | f36b07ac2c4039e4a15ddc5e069c16261545cf3364fa4b563c5cabe3178c3184
default3.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #3: Y2K: As the millennium approaches, A look into basic cryptography, Internet privacy: Freedom Network, Macintosh Security: F33r my hybride M4c, I'm coding!, Computing: A closer look at hard- and software, Linux: IP Masquerading, Infection and vaccination, Freedom of speech - related incidents, Scams - Getting something by all means, Intrusion and detection part two.

tags | magazine
systems | linux
SHA-256 | a56b7023af5b02dad19a56f846a65e927683fa27d5239a1bbe46847ca442c147
default4.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #4: Description of the Millenium problem, A look into basic cryptography, Telecom 101: Receiving through the serial port, Macintosh security: Security audit with our Mac, Computing: Matrox G400 MAX Review, Understanding basic crypto techniques, Infection & Vaccination, New programs on Net-Security (NS Watch!), More news from the ACPO front, The Hotmail security hole, Meet the underground, Freedom of speech - related incidents, Microsoft Installs US Spy Agency with Windows.

tags | cryptography, magazine
systems | windows
SHA-256 | 135c1a3d2ad99b4219bb1b0c1cd135db1e677acc96aa882c3c5f5bc6c7612a10
default5.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #5: Defaced pages, Hit2000 report, Interview with v00d00, Want secure and encrypted e-mails? , Security audit with our Mac Part-2/2, More from the ACPO front, Infection and vaccination, Watch out for documents you publish on The Internet, Freedom of speech - related incidents, Y2K survey for 72 countries, Journalism.

tags | magazine
SHA-256 | 2b9073119a8837c4048e7e69b7d34298d9573c23892ddc3c08c6ed1784621d41
default6.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #6: Defaced pages, Ech0 Security Scanner - What's that again ?, Y2K: hoaxes and scams, Infection & Vactination, Hi, my name is..., Virology 101: A primer to computer viruses, More from the ACPO front, Network Solutions Stumbles on WebMail Offering, Securing your Mac, Why NT isn't what it is claimed to be, Freedom of the speech related incidents, Meet the underground.

tags | magazine
SHA-256 | a8c7df1a687f8285f90ff9500c5fca7ae6f11b3b597aff3c294b82633707d43e
leapfrog_1_0a.tar.gz
Posted Sep 28, 1999

Leapfrog 1.0. Leapfrog will anonymize and redirect any port. It can be used to work around firewall configuration and other issues requiring a port redirect. For example, you have a firewall that does not allow telnet (23), but it does allow http (80). Set leapfrog up on the other side of the firewall to listen on port 80 and send to 23, then telnet to port 80 of the leapfrog machine and you will ricochet to the machine you wish to connect. You will have the Leapfrog machines' IP and MAC addresses. It supports unlimited users (well, limited by memory). Leapfrog can be chained, reconfigured on the fly, and customized to change ports/machine redirects without the need to log into the box. It can be configured (with little work) to remove all traces of itself from disk after being loaded, or it can be configured to log everything (default). It supports colors and some basic admin tools. It is very fast. Leapfrog compiles on Solaris 2.6, 2.7, x86 (2.6, 2.7), Linux with pthread libs, BSD with pthread libs. Possibly others, but it wasn't tested on others. (Official Site).

tags | tool, web, x86
systems | linux, unix, solaris, bsd
SHA-256 | bf04847a1339af71fba9081ff56a10ae386aa7898991dc6d61ec08ad310c9f2d
patch-netfilter-0.1.8-0.1.9.bz2
Posted Sep 28, 1999

Patch to upgrade from Netfilter 0.1.8.

tags | tool, firewall
systems | linux
SHA-256 | 6b9ffe80db6fc4b7f4bf6a9f9307fefd002e63f60fa89356be6cf2ee65992b70
netfilter-0.1.9.tar.bz2
Posted Sep 28, 1999

Netfilter 0.1.9 for Linux 2.3.18: Packet Mangling for Linux 2.3. New features: Should work with gcc 2.7.x (no more 'memset undefined'), local NFS and conntrack should work fine, speed should be fine for modems, 'Call rusty: need skb_realloc_tailroom!' for ftp cured, tcp and udp ports printed correctly in iptables, should compile on libc5 for SURE this time. (Official Site).

tags | tool, local, udp, tcp, firewall
systems | linux
SHA-256 | eadf483fa8256d69fa34e56f42ecd01ee2329ba9eaf195e4593bbadc58892088
udp-backdoor-v2.0.tgz
Posted Sep 28, 1999

UDP backdoor v2.0 for UNIX by {MANIAC}. Archive password is set to p4ssw0rd. Use at your own risk.

tags | udp, trojan
systems | unix
SHA-256 | 11892b19990bc077400e60528a6a411a
unsetenv.txt
Posted Sep 28, 1999

The unsetenv function in glibc 2.1.1 suffers from a problem whereby when running through the environment variables, if the name of the variable being unset is present twice consecutively, the second is not destroyed.

tags | exploit
SHA-256 | e95f036725c67eeb8bbbae8a91e4c1024e21dd154ce64c42d89d5f8972a412d8
suse6.2pbpg.txt
Posted Sep 28, 1999

On SuSE 6.2, /usr/bin/pb and /usr/bin/pg, suid root by default allow any user to read any file on the system.

tags | exploit, root
systems | linux, suse
SHA-256 | bee33e1b284d9c26735967f8e5656a85d2c39e8e862ab38ebecde0fa73eb1db0
unix_virus.c
Posted Sep 28, 1999

A fully functional unix virus that will infect your manpages when started

tags | exploit, virus
systems | unix
SHA-256 | 7a21d58433fa270c7e2dad8c566f8df79a0b4d09c4e1d0864c08a4f8b8dd1733
SuSE_overflow_exploit.txt
Posted Sep 28, 1999

/usr/bin/sccw contains a bug allowing a local root compromise through an overflow in handling $HOME. For Linux x86 tested on SuSE 6.2.

tags | exploit, overflow, x86, local, root
systems | linux, suse
SHA-256 | 1a4ba5966711dd2350d5c844fc2fd33fd80a54d53e53c1833f89d49d306a2a05
SuSE_root_exploit.txt
Posted Sep 28, 1999

nlservd/rnavc local root exploit for Linux x86 tested on SuSE 6.2. Exploits Arkiea's Knox backup package.

tags | exploit, x86, local, root
systems | linux, suse
SHA-256 | 20ae153167802687c55fbf998a0f2a1a04c7f30f5207c19ae0ed3a19f237ebeb
ssh_exploit.txt
Posted Sep 28, 1999

SSH 1.2.27 vulnerable to a denial of service attack

tags | exploit, denial of service
SHA-256 | 52db1d05b27b6f7d8b74feae305f307c509b18a2db01b105867f9738c709aa92
SSH.1.2.27.DOS.txt
Posted Sep 28, 1999

SSH has the option of setting up "authentication sockets", used to pass authentication keys securely. When this is used, a socket is created on both client and server machines; the socket created on the server uses an often easy to guess filename (based on the PID)...

tags | exploit
SHA-256 | 75491b9d176b71151fc9e9366f1486cb0fe9a8525c93ee0c5a2c52acb43f9ff4
solaris_root_exploit.txt
Posted Sep 28, 1999

Local root exploit for Solaris 2.6 through ps and way it handles $LD_PROFILE.

tags | exploit, local, root
systems | solaris
SHA-256 | f506a2474914c827ec7a0c0bf71a2c49ecf7efebc987a21b65784bbd6935e068
sco_local_exploit.txt
Posted Sep 28, 1999

SCO 5.0.x exploits for scosession and scoterm allowing bin/root respectively.

tags | exploit, root
SHA-256 | a61174f64ded7a55fac1aadd1f8c4b9fbd79b7bfc3f5f36cdf34cca15ae44bb3
SDI.exploit4.proftpd.txt
Posted Sep 28, 1999

root exploit for the ProFTPD log_xfer() buffer overflow.

tags | exploit, overflow, root
SHA-256 | db92d949feac85635925af2c68c4a2d9061dce0a00179e24c9161365329e6f94
lynx.2.8.2.extern.txt
Posted Sep 28, 1999

When lynx calls external programs for protocols (e.g. telnet), the location is passed unchecked. This can be used to activate commandline parameters.

tags | exploit, protocol
SHA-256 | 2efb9a7b590a7fdfbaaf65d327cae8fdd80728736bce172044d775dd8f2118a4
Page 1 of 97
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close