exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 1999-10-21

Posted Oct 21, 1999

Three vulnerabilities have been identified in WU-FTPD and other ftp daemons based on the WU-FTPD source code.

tags | vulnerability
systems | linux, redhat
SHA-256 | 314cdbabefb2fd1a366c6c7a8928005c0869880293006ac05ea1331cf7ba7078
Posted Oct 21, 1999
Authored by Phil Jones | Site firepool.com

weedlog is a packet logger designed to help in debuging network connections on non-router systems. It currently supports the ICMP, TCP, and UDP protocols, but is still early in development. weedlog supports sending output to stdout, a file, or to syslog.

tags | tool, udp, sniffer, tcp, protocol
SHA-256 | 4af20a3f32c977be013ef49b7281dfa1d164849226ad1734d8406b36d7697291
Posted Oct 21, 1999
Authored by Sergey V. Kolychev

Net::RawIP is a Perl extension for easy manipulation of raw IP packets with an interface to libpcap. This package provides a class object which can be used for creating, manipulating and sending raw IP packets and optional manipulation of ethernet headers.

Changes: Bugfixes, non-integer sleep delays.
tags | tool, perl, sniffer
SHA-256 | e0bbe7a9d1a230489cc894a9cab1bfb990f2cf34c00443fe2c8e43dbd4ac02d1
Posted Oct 21, 1999
Authored by Vipul Ved Prakash | Site vipul.net

Ricochet is an automated agent for tracing and reporting internet junk mail (a.k.a Spam). Ricochet analyses the headers of a spam to identity the machines used for its injection, looks up the email addresses of the machine owners and mails out a complaint to them. Ricochet uses various network information resources like nameserver records, MX records and Whois databases worldwide to collect and verify this information.

systems | unix
SHA-256 | 2477d1f734ac9aefe76f35d11e2f03d1e18a6ddde71f2e20b39a218b2f5e53a9
Posted Oct 21, 1999
Authored by Kurt Seifried | Site securityportal.com

Linux Administrator's Security Guide - Newest snapshot. Updated October 21st 1999, 15:24 EST. The LASG has been updated some more, and the license has changed. The LASG is now OpenContent, I am doing this in the hopes it will encourage the community to contribute.

systems | linux
SHA-256 | 364bf63df4d0edb9f33de00dc7b3b625f0a0db164b25d8971319353e4d1a075d
Posted Oct 21, 1999

The version of screen that shipped with Red Hat Linux 6.1 defaulted to not using Unix98 ptys. Since screen is not setuid root, this means that it leaves the ptys with insecure permissions. The updated packages restore the Unix98 pty support. Red Hat 6.1 security advisories

tags | root
systems | linux, redhat
SHA-256 | f33ebb3f1b35ebf58232d75ce2af6c8a8396a3cdf5da9ead2d3659feb29b75cd
Posted Oct 21, 1999
Authored by Chad Renfro | Site renfro.homepage.com

Rpc_Gotcha is a network based intrusion detection tool for detecting rpc based scans and attacks (buffer overflows). The program will passively sit on the network perimeter and process packets while analyzing the rpc message data payload looking for signs of a possible attack. Rpc_Gotcha will log all rpc calls made to the network and display payload data for possible attacks. Changes : This version has some major bug fixes , memory leaks and signature issues. It will also read tcpdump capture files in a batch mode.

tags | tool, overflow, intrusion detection, memory leak
systems | unix
SHA-256 | 47e916295ba31b13f5d2c3e1ee1298ccbaa67084f08de4d1c4ed07f5a57002d2
Posted Oct 21, 1999
Authored by Taeho Oh, Postech Laboratory for Unix Security, Postech Linux User Group

Paper on writing advanced buffer overflow exploits. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nice features. For example, passing through filtering, opening a socket, breaking chroot, and so on. This paper will attempt to explain the advanced buffer overflow exploit skill under intel x86 linux.

tags | paper, overflow, shell, x86
systems | linux, unix
SHA-256 | 2e4ea3806ea648290a4bc015d162ee5889ff5d38e9961098e03e606b4897fb15
Posted Oct 21, 1999

Generic shellcode for i386. Supports FreeBSD, netBSD, openBSD, and linux. CyberPsychotic

tags | shellcode
systems | linux, netbsd, unix, freebsd, openbsd
SHA-256 | 221de581651c3ee9ebc9f9eb960abe2560e3e4d9fbc246668595b818a6544346
Posted Oct 21, 1999
Authored by JD Glaser | Site ntobjectives.com

NT OBJECTives, Inc. Presents - Seek and Destroy Network Tools. NTO Tools includes four new tools: Lservers[tm], NTOLog[tm] and NPList[tm] and NTODrv[tm]. NTOLog[tm] is a Powerful, network wide backup/clear utility for NT logs.i LServers[tm] is a NetBIOS name dumper. NPList[tm] is a NT network process dumper. NTODrv[tm] is a NT network driver/service dumper. Download NTO Seek/Destroy Tools[tm].

SHA-256 | ed8828e22d4b2702b5da0a6830008e334e58b0e5d79651ef004727657c22c2e0
Posted Oct 21, 1999
Authored by Underground Security Systems Research

Decrypt MSN passwords from the registry.

tags | registry
SHA-256 | 39d31c20ce35636f487d14d1a9689cd6c76ec2a764f117a267a0289c392355c2
Posted Oct 21, 1999
Authored by Vacuum | Site technotronic.com

Winfingerprint 219: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQL SERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, Enumerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes. New features: contains new GUI frontend and some bugfixes.

tags | remote, registry
systems | windows
SHA-256 | 637342d7cba4ea483d9ce52a271eaab3a898997dc8dcb6ab3c71f4dbe833f86f
Posted Oct 21, 1999
Authored by Vacuum, rhino9 | Site technotronic.com

Versioner 0.3: Source code. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.

SHA-256 | 28bbb22f26396a6e8197e439794bb2e3e2a85e69452559a6606698ebb15ffda9
Posted Oct 21, 1999
Authored by CyberPsychotic

Simplified Restricted Shell 0.1.3. Major purpose of this shell is to maintain 'not permitted explictly then not allowed' policy on machines which provide shell access to users, which can not be trusted, while trying to keep KISS rule. Of course you should carefully check up and configure applications, which you allow your users to run, otherwise it still would be trivial to break your policy with badly configured pine or lynx for example. Some day this will be a full-fledged user tracking system.

tags | shell
systems | unix
SHA-256 | 1a0fdbb6fcfad3e948679681898566a7394e700dce9b2bc9d7f59344b50373d8
Page 1 of 1

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By