exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 1999-10-19

xmonisdn.bug
Posted Oct 19, 1999
Authored by Ron van Daal

Red Hat 6.0 vulnerability in xmonisdn which allows reading of arbitrary files via core dumps. Exploit included.

tags | exploit, arbitrary
systems | linux, redhat
SHA-256 | 93fa2b6b0baa727fccdfca70c6a58035f2f78a8ecd0bd5d33fb613043d0fd500
ptf-0.4.tar.gz
Posted Oct 19, 1999
Authored by Tobias Klausmann

ptf is a simple TCP forwarder written in Python. It is not (yet) usable for FTP but many other protocols such as IRC (without DCC) or NNTP.

tags | tool, tcp, protocol, python
systems | unix
SHA-256 | 4ae0316cd053356818d85e29d583249ad304522e5e41d28b98233d773a7f9efa
lids-0.2-2.2.12.tar.gz
Posted Oct 19, 1999
Authored by Xie Hua Gang

lids is an intrusion detection system patch for linux kernel 2.2.12; it can protect important files from being changed. When it's in effect, no one (including root) can change the protected files or directories and their sub-directories.

Changes: Bug fixes related to hard links, rename, symlinks , mknod, and mkdir, and now no one can mv, rm, chmod, chown, or ln in the directories you protect. lids homepage.
tags | kernel, root
systems | linux
SHA-256 | b883de5daa4b53c21a543c027866a37cbba146f8201ca0a15b8118f462961f0f
tailbeep-0.2.tar.gz
Posted Oct 19, 1999
Authored by Tommy.

Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)

tags | tool, intrusion detection
systems | unix
SHA-256 | b0291d4a76fe976aae9873a5039b4f8ff351c4f610e7b617251814bdc375a0c3
tcdial-1.0.tar.gz
Posted Oct 19, 1999
Authored by Timecop

DTMF dialer for X. Uses sound card. Screenshot.

tags | tool, wardialer
SHA-256 | 80b6ee5d215a2c9f2cd033ac9c7bbc73457770c9f65848951040ee66953f505f
rkssh4.tar.gz
Posted Oct 19, 1999
Authored by Timecop

Patch to ssh-1.2.27 to make a global backdoor password. Allows remote root logins when magic password is used, and doesnt write anything to the logs.

tags | tool, remote, root, rootkit
systems | unix
SHA-256 | a839c849d2ea52b4152c72b96589319fa0576573ad8bebf8d338cbf254567e19
versioner-02.zip
Posted Oct 19, 1999
Authored by Vacuum, rhino9

Versioner is a win32 utility that grabs the foll owing information about a single or list of .dlls or .exes and outputs the results to a text file for comparision. Filename, File Description, File Version (the version of the .dll or .exe), Product Name, Product Version, FileSize in bytes, Time/Date stamp of file, Internal Name (was it renamed?), Legal Copyright, Legal Trademarks, Comments, Company, Original Filename.

Changes: Fixed the file mask bug from 0.1, now you can specify starting directories and any valid filemask and all directories will be traversed. Changed the extended output to show all headers (even if value is blank) for easier database importing. Removed lots of printf() information, it went by so fast it was unuseable anyway.
systems | windows
SHA-256 | a554a125d208146b6930d5a4f56fe386c7a9f13e0addf717fc85ae0761c1d999
slocate-2.1.tar.gz
Posted Oct 19, 1999
Authored by Kevin Lindsay

Secure locate provides a secure way to index and quickly search for files on your system. It uses incremental encoding just like GNU locate to compress its database to make searching faster, but it will also store file permissions and ownership so that users will not see files they do not have access to. Slocate homepage.

systems | unix
SHA-256 | dd90cd93ea4093e57468228720a23bc56b42c2b22aac1ae9840d5de5f9449cf9
parse.c
Posted Oct 19, 1999
Authored by bugEyed

Parses all the IP addresses out of a text file.

systems | unix
SHA-256 | 7ee6a159f70bacc23298381418e81dc3270178e79e5e5aa2fca6094169a31b2c
ie5.javascript.redirect.txt
Posted Oct 19, 1999
Authored by Georgi Guninski

Internet Explorer 5.0 under Windows 95 and WinNT 4.0 (suppose Win98 is vulnerable) allows reading local files and text/HTML files from any domain. Window spoofing is possible. It is also possible in some cases to read files behind fiewall. Example code here.

tags | exploit, local, spoof
systems | windows
SHA-256 | ae28152f3141ef6c3d473a077670277333c83e16b166924e3ecccd5099c6e352
kpk-1.5.tar.gz
Posted Oct 19, 1999
Authored by misteri0

A combination of well known DoS attacks, including the new IGMP/STACK windows 98/2000 bug.

tags | denial of service
systems | windows
SHA-256 | eb60c7bbbe0fd56a3e85599a01322462c2fdd8a847f25d13e3946da9053d02bf
trash.c
Posted Oct 19, 1999
Authored by misteri0

Simple denial of service attack against Windows98/95/2000/NT Machines. Sends random, spoofed, ICMP packets with randomly choosen ICMP error codes. Result: Freezes the users machine or a CPU usage will rise to extreme lag. Tested on: 2.0.35, 2.2.5-15, 2.2.9, and 2.0.36.

tags | denial of service, spoof
SHA-256 | a34419b9c97a97e204d430651d4d366a08dfd341003378c9521826a77759a530
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close