what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 1999-10-07

celsetupb.exe
Posted Oct 7, 1999
Authored by Mike Machado

ClearEventLog is a freeware NT application that can clear the system, application, and security event logs via a simple command-line operation.

SHA-256 | a080a54f583f5a2bc7b08daea2e6fe8f2352c517563b08887d67aab7e10e30d5
anonymity-es.txt
Posted Oct 7, 1999
Authored by R a v e N

Anonymity Tutorial (In Spanish).

tags | paper
SHA-256 | ae2dca7e900e253c36598876ed68e5e3e6908baa13ecc6e451b11e68b26ec391
adblock-es.txt
Posted Oct 7, 1999
Authored by R a v e N

Ad and Spam Blocking Tutorial (In Spanish).

tags | paper
SHA-256 | 535e665257f0b720a9f74534e97e035b9a93afbab504d1959ced8a8211bcb5ee
proxy-de.txt
Posted Oct 7, 1999

Proxies/Wingates/SOCKS Firewalls Tutorial (In German). Original by Jatt, translated /uebersetzt by I.RAM.S.

tags | paper
SHA-256 | bb8b163d4cb8e2f941bbe2a4ad83ab2358daa09efbd8396e26418c18f4468442
eggdrop.txt
Posted Oct 7, 1999
Authored by The Cyber God

The Eggdrop Bots Tutorial.

tags | paper
SHA-256 | b55ec02f32787cf68bfbbaf6b87c9adfe2597cbbf7b0af47eb253ffd1ee6d7b7
exploit1.txt
Posted Oct 7, 1999
Authored by little_v

Exploits Explained I: The New JavaScript Hole in Hotmail.

tags | paper, javascript
SHA-256 | fefc92790c0e1f6582e99bee56576b24b1cdd804a4598c67b697503e22643fb8
ddc_src.zip
Posted Oct 7, 1999

Donald Dick: Sources of Client (command line) v1.53. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | 90c3eedafc87fbe2821752e54718b8ea655d8f3d35a57bcd4e1e208fdc4f07ac
ddc153.zip
Posted Oct 7, 1999

Donald Dick: Client (command line) v1.53. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | eb28c962092e6bd51f8007307c3f5c76574be51c089045ae310b53aabc7a0f79
ddcg153.zip
Posted Oct 7, 1999

Donald Dick: Client (GUI) v1.53. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | b505df1e99a535c0a158e201eb3879265f66b2c903d8bfa3191b4704387d8925
Hybrid_network_cable_modems.txt
Posted Oct 7, 1999

Remote attackers can anonymously reconfigure any Hybrid Network's cable modem running HSMP.

tags | exploit, remote
SHA-256 | fba4ceed238aa38474d25bcca294b76bebb7bd9fcfa00c44645e0dc301832253
patch-2.2.12.gz
Posted Oct 7, 1999

Patch for rsbac-2.2.12-v1.0.9.tar.gz

systems | unix
SHA-256 | e230c2a52b4633f8b109175032d84d8925c45803ccff71462e1fa99053057d02
rsbac-2.2.12-v1.0.9.tar.gz
Posted Oct 7, 1999

Rule Set Based Access Control (RSBAC) is based on the Generalized Framework for Access Control (GFAC) by Abrams and LaPadula and provides a flexible system of access control based on several modules. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions. Decisions are based on the type of access (request type), the access target and on the values of attributes attached to the subject calling and to the target to be accessed. Additional independent attributes can be used by individual modules, e.g. the privacy module (PM). All attributes are stored in fully protected directories, one on each mounted device. Thus changes to attributes require special system calls provided. As all types of access decisions are based on general decision requests, many different security policies can be implemented as a decision module. A general goal of RSBAC has been to some day reach (obsolete) Orange Book (TCSEC) B1 level. See also patch-2.2.12.gz.

systems | unix
SHA-256 | 09c33cf223972b4be79f592a45f18f242dfd40c155fac218ed7e1be314182e7f
acl-0.5.4-4.tar.gz
Posted Oct 7, 1999

Linux, in the tradition of UNIX-like operating systems, implements file system permissions using a rather coarse scheme. While this is sufficient for a surprisingly large set of applications, it is too inflexible for many advanced scenarios. For that reason, all the major commercial UNIX operating systems have extended this simple scheme in one way or the other. For Linux, such extensions are not stable enough yet. Standard distributions do not include ACLs so far.

systems | linux, unix
SHA-256 | c109f482790bea6fabc3915dcad8128d22aa967f47ef85004d19476c2e7f1ecd
cocain.c
Posted Oct 7, 1999
Authored by Pmsac

Module to hide processes and files.

systems | linux
SHA-256 | 1dacfe7599201c72d4a5e36edbdc7611d0047682d8b6c3f2b694862f4e8fb406
krnhide.c
Posted Oct 7, 1999
Authored by Kossak | Site rnl.ist.utl.pt

Generic module hidder, for linux 2.2.x kernels. Hides the last module installed.

tags | kernel
systems | linux
SHA-256 | 6a208911f56caefd20bec7fdb917d6c6e42897a877c76fb78c4b54558227d418
megas.c
Posted Oct 7, 1999
Authored by Pmsac

Module to retrieve privilege to processes.

systems | linux
SHA-256 | 3c1a53d2029af8aaf19ab04983497d4575d25c39406d48c1321172829309cb20
iplimit-0.9.tar.gz
Posted Oct 7, 1999

IPLimit is a security tool to prevent some denial of services on common internet daemons. It will dynamically reject connections from hosts thatalready connected too many times on the same service or the same server. And only these strobe makers will be rejected, not trusted people. IPLimit is fully configurable : you can, for instance, allow 40 connections per second for SMTP, and only 1 per minute for Telnet. It needs the TCPREMOTEIP and TCPLOCALPORT environment variables, so that IPLimit has to be used with a super-server like G2S or TCPServer. You can also use any other inetd variant if you have the tcp-env program (from Qmail). IPLimit was tested on Linux but should work on any other Unix implementation with or without minor changes.

tags | tool, denial of service, tcp, intrusion detection
systems | linux, unix
SHA-256 | 9b0eb17b70cae3acbd2924d8bb3df048ceccc94275bad8e5a541747e0235eb3d
inews.c
Posted Oct 7, 1999
Authored by bawd

Buffer overflow in inews gives egid inews.

tags | exploit, overflow
SHA-256 | 8bb19288490f427718791b2b774d580f8803ac2c4b7666e7abecaba1956b4039
anonymous-unix-0.9.tar.gz
Posted Oct 7, 1999
Authored by van Hauser, thc | Site thc.org

"Anonymizing UNIX Tools v0.9" - Tools for securing your UNIX systems(s), keeping your data and actions as private as possible, as described in Anonymizing UNIX Systems v0.9 Whitepaper.

systems | unix
SHA-256 | 9a9cb9fff4b40791ac3df85ebeab0f860cc0aa06678868412878fda29e08ace9
rwwwshell-1.6.perl
Posted Oct 7, 1999
Authored by van Hauser, thc | Site thc.org

Reverse-WWW-Tunnel-Backdoor version 1.6 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.

Changes: Included www-proxy authentication.
systems | linux, solaris, openbsd, aix
SHA-256 | 2dc02b8a40272350f1c66e2ee87bc8661f905a84b84f532a3a2dc4cd1167027c
ex_canuum.c
Posted Oct 7, 1999
Authored by Unyun | Site shadowpenguin.backsection.net

I found the security vulnerability in canumm Japanese Kana-Kanji FEP. This program is installed on Turbolinux series with default. /usr/jp/canna/bin/canuum is a suid program. It overflows if the long argment is specified with many kind of options such as -k, -c, -n. I coded an exploit for the Linux, the local user can obtain a root privilege.

tags | exploit, overflow, local, root
systems | linux
SHA-256 | 541df7e6ab602ad5a839835c476c08199b3ad305b9c2ab1b0611a680b6196c18
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close