what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 1999-10-21

rhsa.1999-043-01.wu-ftpd
Posted Oct 21, 1999

Three vulnerabilities have been identified in WU-FTPD and other ftp daemons based on the WU-FTPD source code.

tags | vulnerability
systems | linux, redhat
SHA-256 | 314cdbabefb2fd1a366c6c7a8928005c0869880293006ac05ea1331cf7ba7078
weedlog-1.0.0-pre1.tar.gz
Posted Oct 21, 1999
Authored by Phil Jones | Site firepool.com

weedlog is a packet logger designed to help in debuging network connections on non-router systems. It currently supports the ICMP, TCP, and UDP protocols, but is still early in development. weedlog supports sending output to stdout, a file, or to syslog.

tags | tool, udp, sniffer, tcp, protocol
SHA-256 | 4af20a3f32c977be013ef49b7281dfa1d164849226ad1734d8406b36d7697291
Net-RawIP-0.09.tar.gz
Posted Oct 21, 1999
Authored by Sergey V. Kolychev

Net::RawIP is a Perl extension for easy manipulation of raw IP packets with an interface to libpcap. This package provides a class object which can be used for creating, manipulating and sending raw IP packets and optional manipulation of ethernet headers.

Changes: Bugfixes, non-integer sleep delays.
tags | tool, perl, sniffer
SHA-256 | e0bbe7a9d1a230489cc894a9cab1bfb990f2cf34c00443fe2c8e43dbd4ac02d1
ricochet-0.92.tar.gz
Posted Oct 21, 1999
Authored by Vipul Ved Prakash | Site vipul.net

Ricochet is an automated agent for tracing and reporting internet junk mail (a.k.a Spam). Ricochet analyses the headers of a spam to identity the machines used for its injection, looks up the email addresses of the machine owners and mails out a complaint to them. Ricochet uses various network information resources like nameserver records, MX records and Whois databases worldwide to collect and verify this information.

systems | unix
SHA-256 | 2477d1f734ac9aefe76f35d11e2f03d1e18a6ddde71f2e20b39a218b2f5e53a9
lasg-snapshot.tar.gz
Posted Oct 21, 1999
Authored by Kurt Seifried | Site securityportal.com

Linux Administrator's Security Guide - Newest snapshot. Updated October 21st 1999, 15:24 EST. The LASG has been updated some more, and the license has changed. The LASG is now OpenContent, I am doing this in the hopes it will encourage the community to contribute.

systems | linux
SHA-256 | 364bf63df4d0edb9f33de00dc7b3b625f0a0db164b25d8971319353e4d1a075d
rhsa.1999-042-01.screen
Posted Oct 21, 1999

The version of screen that shipped with Red Hat Linux 6.1 defaulted to not using Unix98 ptys. Since screen is not setuid root, this means that it leaves the ptys with insecure permissions. The updated packages restore the Unix98 pty support. Red Hat 6.1 security advisories

tags | root
systems | linux, redhat
SHA-256 | f33ebb3f1b35ebf58232d75ce2af6c8a8396a3cdf5da9ead2d3659feb29b75cd
rpc_gotcha_beta1.1.tar.gz
Posted Oct 21, 1999
Authored by Chad Renfro | Site renfro.homepage.com

Rpc_Gotcha is a network based intrusion detection tool for detecting rpc based scans and attacks (buffer overflows). The program will passively sit on the network perimeter and process packets while analyzing the rpc message data payload looking for signs of a possible attack. Rpc_Gotcha will log all rpc calls made to the network and display payload data for possible attacks. Changes : This version has some major bug fixes , memory leaks and signature issues. It will also read tcpdump capture files in a batch mode.

tags | tool, overflow, intrusion detection, memory leak
systems | unix
SHA-256 | 47e916295ba31b13f5d2c3e1ee1298ccbaa67084f08de4d1c4ed07f5a57002d2
adv.overflow.paper.txt
Posted Oct 21, 1999
Authored by Taeho Oh, Postech Laboratory for Unix Security, Postech Linux User Group

Paper on writing advanced buffer overflow exploits. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nice features. For example, passing through filtering, opening a socket, breaking chroot, and so on. This paper will attempt to explain the advanced buffer overflow exploit skill under intel x86 linux.

tags | paper, overflow, shell, x86
systems | linux, unix
SHA-256 | 2e4ea3806ea648290a4bc015d162ee5889ff5d38e9961098e03e606b4897fb15
generic_shell.tar.gz
Posted Oct 21, 1999

Generic shellcode for i386. Supports FreeBSD, netBSD, openBSD, and linux. CyberPsychotic

tags | shellcode
systems | linux, netbsd, unix, freebsd, openbsd
SHA-256 | 221de581651c3ee9ebc9f9eb960abe2560e3e4d9fbc246668595b818a6544346
ntotoolsSD.zip
Posted Oct 21, 1999
Authored by JD Glaser | Site ntobjectives.com

NT OBJECTives, Inc. Presents - Seek and Destroy Network Tools. NTO Tools includes four new tools: Lservers[tm], NTOLog[tm] and NPList[tm] and NTODrv[tm]. NTOLog[tm] is a Powerful, network wide backup/clear utility for NT logs.i LServers[tm] is a NetBIOS name dumper. NPList[tm] is a NT network process dumper. NTODrv[tm] is a NT network driver/service dumper. Download NTO Seek/Destroy Tools[tm].

SHA-256 | ed8828e22d4b2702b5da0a6830008e334e58b0e5d79651ef004727657c22c2e0
MSDecripter.exe
Posted Oct 21, 1999
Authored by Underground Security Systems Research

Decrypt MSN passwords from the registry.

tags | registry
SHA-256 | 39d31c20ce35636f487d14d1a9689cd6c76ec2a764f117a267a0289c392355c2
winfingerprint-219.zip
Posted Oct 21, 1999
Authored by Vacuum | Site technotronic.com

Winfingerprint 219: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQL SERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, Enumerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes. New features: contains new GUI frontend and some bugfixes.

tags | remote, registry
systems | windows
SHA-256 | 637342d7cba4ea483d9ce52a271eaab3a898997dc8dcb6ab3c71f4dbe833f86f
versioner-03.cpp
Posted Oct 21, 1999
Authored by Vacuum, rhino9 | Site technotronic.com

Versioner 0.3: Source code. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.

SHA-256 | 28bbb22f26396a6e8197e439794bb2e3e2a85e69452559a6606698ebb15ffda9
srsh-0.1.3.tar.gz
Posted Oct 21, 1999
Authored by CyberPsychotic

Simplified Restricted Shell 0.1.3. Major purpose of this shell is to maintain 'not permitted explictly then not allowed' policy on machines which provide shell access to users, which can not be trusted, while trying to keep KISS rule. Of course you should carefully check up and configure applications, which you allow your users to run, otherwise it still would be trivial to break your policy with badly configured pine or lynx for example. Some day this will be a full-fledged user tracking system.

tags | shell
systems | unix
SHA-256 | 1a0fdbb6fcfad3e948679681898566a7394e700dce9b2bc9d7f59344b50373d8
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close