exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 1999-10-22

ex_imagemap.c
Posted Oct 22, 1999
Authored by Unyun

imagemap CGI which is distributed with OmniHTTPd 1.01 and Pro2.04 has a buffer overflow bug, I coded an exploit which can execute any command on the victim host. The Shadow Penguin Security.

tags | exploit, overflow, cgi
SHA-256 | 934905f1f9f1cb9de1cc562db508da34d8ccefe4d46bd6355fecc4455384cec2
tailbeep-0.3.tar.gz
Posted Oct 22, 1999
Authored by Tommy. | Site soomka.com

Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)

Changes: Speech (through speechd) and a debug option.
tags | tool, intrusion detection
systems | unix
SHA-256 | 44c568b15d10d6153f5b49137e01ff1d3ba63549b16e672d0a3990bf420a5186
ethereal-0.7.6.tar.gz
Posted Oct 22, 1999
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: New protocol decoders include BPDU, SNA, RIPng, PIM, Yahoo Messenger and Pager Protocol, NTP, BGP, AFS and RX, and VLAN (802.1q). Many more protocols now have fields that are filterable via Ethereal's display filter engine, the syntax for filtering on byte strings has been extended, protocol decoders that have been updated include IPv6, SMB, OSPF, POP, NBNS, and DNS, the TCP Follow window can now convert from EBCDIC, Ethereal can now read HP-UX's nettl trace-file format and some bugs were fixed as well.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | e223e4d6dedfe7e08e074834e8a728a44ba1f8ad4dcc95e5c893a7a1988e832f
EasyTcpIp-lib-0.2.tar.gz
Posted Oct 22, 1999
Authored by Marcelo Gornstein

Easy TcpIp Library is useful to add basic TCP/IP support to your applications by simply linking it in.

tags | paper, tcp
SHA-256 | c49cd25eebd1db8f427ebdbdf7fcec255bce3bcdea3f7f433d77f240fa31ee01
ms99-045
Posted Oct 22, 1999

Microsoft has released a new version of the Microsoft(r) virtual machine (Microsoft VM) that eliminates a security vulnerability that could allow a Java applet to take unauthorized actions on the computer of a web site visitor. Although no standard Java compiler can generate such an applet, a Java applet constructed by hand with a Java bytecode assembler could bypass the sandbox and take virtually any action on the computer that the user would be capable of taking.

tags | java, web
SHA-256 | 8c02eaa1084336b7cffb85cbeeee6bbe73094d24374f1495e1fc5018b391ad3f
winsd.101899.txt
Posted Oct 22, 1999
Authored by winsd

[ Windows Security Digest ] 1999 - October 18. Excel Symbolic Links, JavaScript Redirect, Anatomy of an Intrusion, Getting the Drop on Network Intruders, State of Security 2000, So You Want to Be a Cryptographer, C2 Compliance Check. www.ntsecurity.net

tags | javascript, magazine
systems | windows
SHA-256 | b52d9e47f72f9bd6daa0001926b02ea197343a60b323bde7dd34592350f20bdf
acct0.91.tar.gz
Posted Oct 22, 1999
Authored by S. Krahmer | Site cs.uni-potsdam.de

Linux accounting-tool for 2.2.x.

systems | linux
SHA-256 | 9fea4c4d1397cf298dd5a4cfdd58e5ccac4e42e2a9f5fa8af2913c2db86a3676
omega.txt
Posted Oct 22, 1999
Authored by Lamagra

Tutorial on a new way of exploiting buffer overflows (ret-into-libc).

tags | paper, overflow
systems | unix
SHA-256 | 71f6c76b0584c12d0217a57f3052e0e21eedfa5cd3d63661e5ed666690b0ac17
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close