exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 1999-10-04

Linux_mini-sql_bof.txt
Posted Oct 4, 1999

Linux exploit for w3-auth authentication module from mini-sql package.

tags | exploit, overflow, sql injection
systems | linux
SHA-256 | 77c6fbba1d688a2dfe7705ee48d1a1110575cc153310572836ed7f7e75aed9f7
IE5_vuln.txt
Posted Oct 4, 1999

IE 5.0 vulnerability allows reading local and remote text files using "download behavior".

tags | exploit, remote, local
SHA-256 | 9c5b7796afb25afd1040621f831f7be4ec6b5c7e8506d7372f58c92c1b086fd8
AIX_ftpd_bof_exploit.txt
Posted Oct 4, 1999

Remote buffer overflow in ftpd under AIX 4.3.2 running on an RS6000.

tags | exploit, remote, overflow
systems | aix
SHA-256 | ab25d3859b9281678d4180181543c1f449090ff51c3881d1cf30f6005544d376
decfingerd-0.7.tar.gz
Posted Oct 4, 1999
Authored by Jon Beaton

decfingerd 0.7: The Deception Finger Daemon. This program will take place of the original finger service, providing totally false information to clients. This can be useful to catch people trying to crack your server, or to just really confuse them. You can define output for individual users, empty requests, and forward requests to another system. Tested on: Linux 2.2.7 -- GCC 2.7.2.3, Solaris 2.7 -- EGCS 1.1.1, OpenBSD 2.5 -- GCC 2.8.1.

tags | tool, intrusion detection
systems | linux, unix, solaris, openbsd
SHA-256 | 2f0703745ed109808ec2722a88bd0d120af0c3d11b4423d1453b61c8462f9e91
phreakupdate.txt
Posted Oct 4, 1999
Authored by Squiler

The Ultimate Beginners Guide to Phreaking,

tags | paper
SHA-256 | 620565028cfad78ee4f157cb0e4745f1050b5e335244924f1e54b88847f48036
singhack.exe
Posted Oct 4, 1999
Authored by CKS

This win95/98 program allows you, if you know the username of your target at Singapores biggest provider, Singnet. It will pull their monthly statistics which include, the phone number he called from, all his logins & logouts etc. Singhack exploits a bug which is in one of Singnets perl script which they havent fix it yet.

tags | exploit, perl
systems | windows
SHA-256 | ca431c0652a0d4e039e81b7003358a59b4f62df4401c33dce60acc512daacf2d
scanners.txt
Posted Oct 4, 1999

The top commercial vulnerability scanners have little to no security surrounding their licensing, making them excellent script kiddie tools. These scanners are actively being used by the underground against targets. Simple Nomad

tags | paper
SHA-256 | 8680c911d931fe25da053d0e8b1565ac46ec28b085e29ad7f6e67d76b651e323
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close