exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 1999-10-26

fwmail-1.1.tgz
Posted Oct 26, 1999
Authored by Mixter | Site members.tripod.com

fwmail is a small secure daemon for inetd that forwards incoming smtp traffic to another sendmail server, acting as a gateway, and optionally anonymizing the senders origin. Version 1.1.

systems | unix
SHA-256 | aa50ed680dff4ba963354310ae65f519721901b409409b2ad2f3d944d5b6794b
nsat-1.08.tgz
Posted Oct 26, 1999
Authored by Mixter | Site members.tripod.com

nsat is a bulk security scanner designed for recoverable long-time scans, optimized for speed and stability, that scans and audits about 60 different services and 170 cgis. Version 1.08.

tags | tool, cgi, scanner
systems | unix
SHA-256 | eb55372260ad6fd90f349dab6565c49e8a639a33693e0a0fdcfed17433e4eeeb
suse.ypserv.txt
Posted Oct 26, 1999

Several vulnerabilities exist: ypserv prior 1.3.9 allows an administrator in the NIS domain to inject password tables; rpc.yppasswd prior 1.3.6.92 has got a buffer overflow in the md5 hash generation [SuSE linux is unaffected by this, other linux falvors are]; rpc.yppasswdd prior 1.3.9 allows users to change GECO and login shell values of other users. Affected are all linux distributions using the ypserv package. Website for patches here.

tags | overflow, shell, vulnerability
systems | linux, suse
SHA-256 | 760ce3bd92792f507a4556e1a3b80e429915e2e35a020f7efc814d176a4281a6
vetescan10-26-1999.tar.gz
Posted Oct 26, 1999
Authored by Vetesgirl | Site self-evident.com

UNIX/Win remote vulnerability exploit scanner with Fixes for Vulnerabilities. based on ben-z fts-rvscan scanner. Includes: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner) VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass/get (a b c scanner and getter), AMD/get (mass a b c scanner and getter), MOUNTD/get ( mass a b c scanners/getter), many exploits, Fixes, and utils included.

Changes: Took all the rpcinfo processes out and it only runs rpcinfo once which makes it go faster. Added a few more vuln checks (keeping up to date with Remote vulns that have came out on bugtraq, securiteam, packetstorm, and security bugware. Updated all the mass scanners (amd,cmsd,mountd).
tags | tool, remote, scanner, trojan, vulnerability
systems | unix
SHA-256 | 99c3a3de5a307efc0d5dde9ebe1a45fbeaa0ec8158ead50ee84d677dbbe243e0
Trojans.txt
Posted Oct 26, 1999
Authored by Int 13h | Site TLSecurity.net

A list of the TCP ports which trojans use. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, tcp
SHA-256 | 798103e287d7346856c86294b48fe70090244b2a4c81c8f143677b3b4393bd76
dosfw-0.1.tar.bz2
Posted Oct 26, 1999
Authored by Martin Hinner | Site penguin.cz

DOSfw is a simple Linux netfilter firewall module which drops denial-of-service attack packets. The current version supports only two attacks and TCP Fingerprint scan, but you may expect other attacks in the (hopefully near) future.

tags | tcp
systems | linux
SHA-256 | 3e3130198ff8e4d64cc597ae528140fb041f6deea4eaa8dacc470c7fec948060
fwt126.tar.gz
Posted Oct 26, 1999
Authored by Ronnie Sahlberg | Site home.swipnet.se

FWT is a web based administration package for remote configuration and administration of the firewalling and (some) networking aspects of the Linux operating system. The tool is easy to use and can configure most useful parts of ipchains (including masquerading), policy routing, ethernet alias interfaces and redirection of TCP traffic through a masquerading firewall.

tags | remote, web, tcp
systems | linux
SHA-256 | 6fb3676c874f25ef731ce868c549790434192d7c15b75373d3bfc1240a703c97
logcolorise-1.0.7.tar.gz
Posted Oct 26, 1999
Authored by Mike Babcock

Logcolorise is a PERL script to make your syslog generated log files much more legible by colourising them (context highlighting based on keywords).

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | c63321d7d299bfb4acc2b06a4c5e8179a58c46288c934847e20ecb25751c7ee1
tailbeep-0.41.tar.gz
Posted Oct 26, 1999
Authored by Tommy. | Site soomka.com

Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)

Changes: The Ability to specify a message to speak instead of the line in the watched file (using -p), the old -p has been moved to -P to speak the line in the file, and the -V (version) and -S (sleep time) options have been added.
tags | tool, intrusion detection
systems | unix
SHA-256 | 0011bf9bb3235b1f12a7a203cf243e8db9ffb91b311a8147d9873a667d78fb33
LOGINW32.zip
Posted Oct 26, 1999
Authored by Eliptic Curve

A simple GUI trojan that when added to the autostart *see regedit* registry will log the passwords of the Novell NetWare School Vista user to c:\windows\samples .txt. Loginw31.exe is an exact duplicate of the login while Login31(2).exe is a system confirmation tricking the user to re-enter their password.

tags | trojan, registry
systems | windows
SHA-256 | 58d1a61a0dad0a8bd9fdf8856cb55f06ea965f5b92b98a29653c46aae61937c7
pr0tscan-release-1.tar.gz
Posted Oct 26, 1999
Authored by misteri0

pr0tscan was based on vetescan, but added more vulns and tried to make it run more smoother. Winscan, (scans win/nt systems for latest trojans/remote exploits). The docs include fixes for the vulnerabilities it finds.

tags | tool, remote, scanner, trojan, vulnerability
systems | unix
SHA-256 | 492897184ae35990598618bea3d466e9283d566f80648c61ea9254760a094c18
logController-0.4.tar.gz
Posted Oct 26, 1999
Authored by Trankill

logController allows you to control the size of some files that tend to become too large (logfiles). A config file allows you to define which files to monitor and the sizes not to exceed. If one or more files exceed the limit size, they are automatically truncated to a new user-defined size and the area truncated can be erased, or compressed and stored.

systems | unix
SHA-256 | 13b9e31af419c0a7b8b3fd18a2724a16c5b2e33b81f142a08655ea85d257030f
spike.sh5.zip
Posted Oct 26, 1999
Authored by Spikeman

Spikeman's DoS Attack Tool - Revision 5. 31 denial of service attacks at once.

tags | denial of service
SHA-256 | 9f930571591e3d0822220c2d809879ca668143471a6765e5e25f7583bd14d138
linux.forged.packets.txt
Posted Oct 26, 1999
Authored by Marc Schaefer

Forged packets can be send out from a Linux system, for example for NFS attacks or any other protocol relying on addresses for authentification, even when protected from the outside interfaces by firewalling rules. Most of the time, existing firewalling rules are bypassed. This requires at least a shell account on the system.

tags | exploit, shell, protocol
systems | linux
SHA-256 | 8d159590c7c839774eb2f8a7c4dddf0737f16a6cf7e3d10393036232f45f5469
walker.c
Posted Oct 26, 1999
Authored by m0f0

Walker - Compuserve 3.0 Password Decrypter. It decrypts Compuserve 3.0 ini files (cis.ini) that stores account passwords.

SHA-256 | 165027448c137a47f5149973229d79d31f0b0a137efbc4f0c01f848456b74fa8
remote.html
Posted Oct 26, 1999
Authored by pho

Pho's alternate remote OS detection techinques page has been updated. Includes information on ICMP techniques, ARP techniques, IP techniques, and UDP techniques.

tags | paper, remote, udp
SHA-256 | 8ad58add858120309dfa20fecd05c30e086888dd27674d03eb1a7771daeb0615
webfolders.txt
Posted Oct 26, 1999
Authored by Sozni

If you have installed Microsoft Office 2000 or keep current on your Windows Updates, you may have noticed a new WebFolders namespace in Windows Explorer. The fun part is that WebFolders have some significant weaknesses (inherited from FrontPage) and are such a new concept that it turns out they make a great entry point into a remote server.

tags | exploit, remote
systems | windows
SHA-256 | 01adda0b5af462be99d4d8071315e8516891937780a27b461c6b4e7ab4d80727
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close