what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 1999-11-26

vnc.html
Posted Nov 26, 1999
Authored by w00w00, Conde Vampiro

[w00giving '99 #4]: VNC is a software package that permits a user to view a remote desktop in real-time. To protect intruder to access the remote desktop, VNC has a password protection. This encryption is done using 3DES, but this encryption is very poor and can be attacked (through brute-force).

tags | remote
SHA-256 | 4fab2bb54a0a55a4b1e33e1ca86cb8fc49dfdae873e7efcd45c27a2f9d617c51
encryption.txt
Posted Nov 26, 1999
Authored by tHe mAniAc | Site users.ldproxy.com

The Basics of Cryptography: Learn the basic of cryptography and how to break it in this short, simple and easy-to-understand text.

tags | paper
SHA-256 | fff2de46b4df67eeb9c1cb05c58195d52ac5d84f72c6759cc86ade1fa67e5484
lids-0.4.1-2.2.13.tar.gz
Posted Nov 26, 1999
Authored by Xie Hua Gang

lids is an intrusion detection system patch for the Linux kernel; it can protect important files from being changed. When it's in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.

Changes: Now there is a password to turn lids on/off, Fixed bug in protecting MBR writing, Fixed bug in log file protection, and Fixed bugs in lidsadm for security reasons. lids homepage.
tags | kernel, root
systems | linux
SHA-256 | b38a4df3e05b43cf55bb5e9716bf5149a24df6b1633fb8006b9e1f42913f4260
unixware.su.txt
Posted Nov 26, 1999
Authored by Shane A. Macaulay

The su command on SCO's UnixWare 7 has improper bounds checking on the username passed (via argv[1]), which can cause a buffer overflow when a lengthy username is passed.

tags | exploit, overflow
systems | unixware
SHA-256 | 2f370cc88cadf6efc7b1f8a55d5ae2f5c3b8ce45ae76e772bf81e939d0b03feb
unixware.Xsco.txt
Posted Nov 26, 1999
Authored by Shane A. Macaulay

[w00giving '99 #6]: UnixWare 7's Xsco. Due to improper bounds checking, an overflow occurs when a lengthy argument (argv[1]) is passed. Because Xsco runs with superuser privileges, this can be exploited for elevated privileges.

tags | exploit, overflow
systems | unixware
SHA-256 | 0710e3286329f4ec82f0b43031b6894da9140f1c90cf3c7b571b5b51ad62ad0d
unixware.xlock.txt
Posted Nov 26, 1999

[w00giving '99 #7]: UnixWare 7's xlock. The xlock command on SCO's UnixWare 7 has improper bounds checking on the username passed (via argv[1]), which can cause a buffer overflow when a lengthy username is passed. Exploit by K2

tags | exploit, overflow
systems | unixware
SHA-256 | 42dca4082a24f106af872bb2a9c3e695482d75141ae5f77e6e01c1aec727dbff
grabbb-0.0.7.tar.gz
Posted Nov 26, 1999
Authored by scut | Site team-teso.net

Clean, functional, and fast banner scanner.

Changes: Portability fix: Now works on Linux, BSD and Solaris.
tags | tool, scanner
systems | unix
SHA-256 | 86258d4a2f264691c77ffa0a0993644a51c8e6e327f63358160b93a492155b7d
elza-1.3.1.zip
Posted Nov 26, 1999
Authored by Philip Stoev | Site phiphi.hypermart.net

The ELZA is a scripting language written in PERL aimed at automating HTTP requests, while maintaining fill browser-like behavoir, which enables it to go to places within web sites unaccessible to netcat, telnet, or similar tools. Features: Extraction of _dynamic_ URLs from from HTML;Handling of forms, passing custom form fields and field values, collecting hidden form fields; Following redirects and refreshes; Handling of cookies, honoring their Path and Domain attributes; HTTP Referer, User-Agent, and other HTTP headers for perfect mimicry; HTTP basic authorization including dictionary attacks; Looping for repeated requesting or dictionary attacks; Conditional execution; HTTPS communication via a SSL tunnel; Forms hijacking. Scripts written in ELZA can be executed remotely via POST or forked for load generation.

tags | web, perl
SHA-256 | e5627cc320ee5aaa12c0c74d92cec2b85f9afcb5d372b8b2b7375671bf325bbf
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close