exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 1999-11-09

nfsd.linux.txt
Posted Nov 9, 1999
Authored by Mariusz Marcinkiewicz

Linux rpc.nfsd has real_path bug. Vulnerable are RedHat 5.2 and Debian 2.1, local only in most cases.

tags | exploit, local
systems | linux, redhat, debian
SHA-256 | 1853738a3818451ec52cfb97c1b54df616bd2086214f56b0e53130f0dd0433fa
rhsa.1999-052-01.initscripts
Posted Nov 9, 1999

One security bug and several functionality bugs have been fixed in a new release of initscripts. A /tmp race existed in /etc/profile.d/lang.csh. Users who had csh/tcsh as their login shell could be vulnerable to having arbitrary shell code run by their shell on login.

tags | arbitrary, shell
systems | linux, redhat
SHA-256 | 971038611775d944acbfec933a168df6999aa96a656cdd69a92bc3e238cb7df3
Titan,v3.2.2.tar.gz
Posted Nov 9, 1999
Site fish.com

Titan is a collection of programs, each of which either fixes or tightens one or more potential security problems with a particular aspect in the setup or configuration of a Unix system. At the moment it only works on sunos, solaris, and linux.

Changes: Bug fixes, linux port.
tags | tool, scanner
systems | linux, unix, solaris
SHA-256 | e4fb2ef832dbc20ba3d2ed46a2a4b488be00edc0bbf550a2506ca5e95f50bdb0
spynet206.exe
Posted Nov 9, 1999
Authored by Laurentiu Nicula | Site spynet.home.ro

SpyNet v2.06 is a sniffer for Win 95 / Win 98 which can recompose the original TCP sessions from the composing packets. Reconstructs telnet sessions, e-mail messages, POP3 logins, etc. Also has the ability to fake cookies it sniffs. Screenshot here.

tags | tool, sniffer, tcp
SHA-256 | b8afe933da5a07be5d41b776757490eed64568a136b8a8ca198b85bf76d5ca21
spynet300.exe
Posted Nov 9, 1999
Authored by Laurentiu Nicula | Site spynet.home.ro

SpyNet v3.00 works! Spynet is a sniffer for Win 95 / Win 98 which can recompose the original TCP sessions from the composing packets. Reconstructs telnet sessions, e-mail messages, POP3 logins, etc. Also has the ability to fake cookies it sniffs.

Changes: The sniffer portion is NT compatible now! Faking of cookies feature has been added. Screenshot here.
tags | tool, sniffer, tcp
SHA-256 | f39d006352cf62f7e75d78937fbc9a1d255dbefd95b7783ee67cb24595cd8992
brokerftp.txt
Posted Nov 9, 1999
Authored by Underground Security Systems Research

Remote DoS Attack in TransSoft's Broker Ftp Server v3.5 Vulnerability.

tags | exploit, remote
SHA-256 | bc5c8241925213abf26be436ed1ae35a1c5d72b7971cd1c8a013c92b000c3e87
log-proxy.pl
Posted Nov 9, 1999
Authored by Evan Langlois | Site geocities.com

The log-proxy server is a perl script which can be used as a direct fixed-destination proxy, or as an http proxy. It sends all the data being sent or recieved in both hex and ascii to stdout so it can be easily logged to a file. log-proxy also has built-in support for colored output.

tags | tool, web, perl
systems | unix
SHA-256 | 19f629897cec5992d03c770d5837651bc22708120896dbc3826b12ddeb4b2c5c
kmap-0.6.1.tar.gz
Posted Nov 9, 1999
Authored by Ian Zepp | Site islc.net

Kmap is a QT/KDE front-end to nmap, a popular and powerful console portscanner. Kmap allows quick and easy access to all of nmap's features, with much less hassle. Kmap also sorts the output from nmap into usable sections, so you easily extract the information you want.

Changes: The code base has been reworked to make it smaller and more modular, it now includes support for all options up to and including nmap-2.3BETA6, all the options to have been moved a fourth main tab, and full support for decoys, RPC scans, and aggressive->paranoid scanning have been added.
tags | tool, nmap
systems | unix
SHA-256 | 518612e75e6fcb548a930bdf9334fa090d580b8022af122e62039de8514584cd
logwatch-0.1.tgz
Posted Nov 9, 1999
Authored by Jeremy Weatherford | Site sourceforge.net

Logwatch provides a client/server architecture for viewing logfiles on multiple machines on a network. With a single daemon process running on each participating computer, logfiles can be tailed from any authorized machine. Multiple logfiles on multiple machines can be followed with a single client process by specifying the machines and files to follow.

tags | tool, intrusion detection
systems | unix
SHA-256 | 39583b7bcfa05e6bac8964d2e2ed38b98707b722312bb43babd2ca27f6bad959
xipdump-1.5.0.tgz
Posted Nov 9, 1999
Authored by Vianney Rancurel

Xipdump is a protocol analyzer and tester. It's a kind of graphical tcpdump(8) with possibility of changing packet values and resending them. It could be also defigned by the term "human IP stack". Graphical representation of a packet is intended to have a complete, customizable view at a glance.

tags | tool, sniffer, protocol
SHA-256 | 41c806a52552d9c0ca69b883cbd2da9b5a5b590f91db225aa396512708fa2d7d
iplog-2.0-1107.tar.gz
Posted Nov 9, 1999
Authored by Odin

iplog is a TCP/IP traffic logger. Currently, it is capable of logging TCP, UDP and ICMP traffic. iplog 2.0 is a complete re-write of iplog 1.x, resulting in greater portability and better performance. iplog 2.0 contains all the features of iplog 1.x as well as several new ones. Major new features include a packet filter and detection of more scans and attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.

tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 799cb9b23700ed9f554e9b074a6a3f5303e52dfd0e44843efd5515fc4c20367f
firesoft.tar.gz
Posted Nov 9, 1999
Authored by Angelos Karageorgiou

firesoft is a collection of Perl scripts for viewing snort-generated logs and ipchains logs. The package includes a bar chart creator from ipchains logs, to quickly view who has been scanning you the most.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 4fb6ac3726d2ee46e1eed632e9031387e99c60694386b203fba668c5142b6c47
cobalt.cgiwrap.txt
Posted Nov 9, 1999
Authored by Chris Adams

There is a problem (actually several) with the "cgiwrap" program on Cobalt RaQ2 servers. This can be used to break other sites on a RaQ2 in several ways.

tags | exploit
SHA-256 | 8105413f2c7ca65abc0278ea5141490cab31082aacbbd3cad6b8e1ff4e4a5ffb
NTHunterV2_0.zip
Posted Nov 9, 1999
Authored by Jason Misoskian | Site xcoders.com

NTHunter is a program that contains several d.o.s. attacks against NT servers. There are lots of variations of this program. But I wrote it, cause it includes real OOB attack to 135 port & "coke". Some programs do not send oob-attack to 135, just try to flood this port.

tags | denial of service
SHA-256 | 285395bc48ca16387b690f5612bfa480f31a6208624cdaf64ae326bafb0ae3a1
targa3.c
Posted Nov 9, 1999
Authored by Mixter | Site members.tripod.com

targa3 is a DoS exploit that sends random IP packets with parameters known to cause crashes on various machines, and can be used to determine if a systems IP stack is really stable and crash-proof under unexpected conditions.

tags | denial of service
SHA-256 | 6253f5fba61013437021a6884ee572f1df8670c179847720a71bf3779779e140
godmessage.zip
Posted Nov 9, 1999
Authored by Osioniusx

Exploit of the Microsoft script lib bug and reg wiz control buffer overflow allow very evil code to be executed when this html is viewed. A very large number of systems are at risk. Archive password is set to p4ssw0rd. Use at your own risk.

tags | overflow, trojan
SHA-256 | 2c6c2d017075957476ae82d4d32b9259c7126bdee155230e91a6e7eafd564dc2
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close