what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 1999-12-10

unixware7.fundamental.txt
Posted Dec 10, 1999
Authored by Brock Tellier

A fundamental flaw in SCO UnixWare's security model will allow any user to gain root, read system files, etc. Any process that gets extra privledges from /etc/security/tcb/privs is vulnerable. Exploit included.

tags | exploit, root
systems | unixware
SHA-256 | e43f1d71568f42ead69639f27b46f790fcc45e7e0ab1b76a9ed368206e498a62
veganizer-0.04.tar.gz
Posted Dec 10, 1999
Authored by Francisco Roque | Site blackant.net

The Veganizer is a spam counter-attack. It searches the headers of a specified message for all associated IPs and Domains, then sends mail to pre-specified addresses at those servers (abuse@, postmaster@) as well as addresses found by a whois query on the IPs/Domains. The mail sent will also include the original message with full headers.

Changes: A changed whois lookup scheme that accounts for additional registrars, a changed IP whois lookup scheme that accounts for APNIC, ARIN, and RIPE, and a .veganizerrc resource file for user-changeable variables which includes what was formerly in spamtemplate.txt.
systems | unix
SHA-256 | 12be230243de38b36ce6a056597ca7dd9489a919c87f72354aa4d61dabbcadd6
punk.c
Posted Dec 10, 1999
Authored by Jethro

Syn Flooder source code with spoofed source address, much like slice2.

tags | denial of service, spoof
SHA-256 | d6a6d7a82f7dc0864f7c24e7e1f513ad891e93fbe7a64c44801e8f3eb4f44778
messala-1.5-BETA.tar.gz
Posted Dec 10, 1999
Authored by misteri0

Vulnerability scanner which scans for 97 CGI Vulns, 7 FTP Vulns, All known QPOP vulns, 7 Named vulns + prints out which ver the host is running on, 9 IMAP vulns, 16 mail vulns (sendmail, etc..), Checks if host suffers from tcp chorusing, Checks for vuln kernel, and 16 RPC vulns.

tags | tool, kernel, cgi, scanner, tcp, imap
systems | unix
SHA-256 | 07ae0beafbd5b92a6d9676fff6a92186f56097f1dd7a29aa57d5426ba71ca0ad
suicide.sh
Posted Dec 10, 1999
Authored by Sectorx

WindowMaker 0.60.0 DoS attack - Windowmaker commits a suicide when trying to open a window with a very long name.

tags | denial of service
SHA-256 | 31f95956e2bcf591a588c524cb8faebc30fca063c78b47e4ff10b3df47893d36
fw_module.tgz
Posted Dec 10, 1999
Authored by Galt

fw_module is a Linux 2.0.x kernel module which allows you add extra code for checking of packets.

tags | tool, kernel, firewall
systems | linux
SHA-256 | 75896006039a31853829e4c16e03b3bea781072a9aa70ceb78e0bc1f0dbd212b
autofdscan.c
Posted Dec 10, 1999
Authored by Bernard Junk

rpc.AutoFS tiny Scanner.

tags | tool, scanner
systems | unix
SHA-256 | 6543e8fd68585ef33ff411466c95a93e90f2b75b3949e021d1dbf492faa5bebc
lids-0.6-2.2.13.tar.gz
Posted Dec 10, 1999
Authored by Xie Hua Gang | Site soaring-bird.com.cn

Linux IDS Patch - Version 0.6 - Dec 9, 1999. Lids is an intrusion detection system in the Linux kernel. This patch (Version 0.6) is for the Linux kernel 2.2.13. LIDS 0.6 has a brand new design. When LIDS is in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.

Changes: IP firewalling rules protection, ptrace syscall lock, Allow some specified processes to access /dev/mem, Modules protection, Mounted filesystem protection, Hide sensitive processes, Running processed protection, More safty & detailed logging.
tags | kernel, root
systems | linux
SHA-256 | 388ed9342b0ac8d59cd7bebbb538fb0e595b1d6dbf9cc8cb7b20d391cb75f651
sifi-0.1.5.tar.gz
Posted Dec 10, 1999
Authored by Marcello Scacchetti | Site sinusfirewall.org

The SINUS firewall is a free and easy way to protect your network from the daily threats of the Internet. Features filtering of all header fields in the IP,TCP,UDP,ICMP,IGMP packets, intelligent RIP and FTP support, easy to understand, text-based configuration, graphical management interface for configuration of several firewalls, dynamic rules, including counters and time-outs, extensive logging, alerting, and counter intelligence, and prevention of packet and address spoofing. Works with the linux 2.2.x kernels.

tags | tool, kernel, udp, spoof, tcp, firewall
systems | linux, unix
SHA-256 | da752f3bc0a279a3a34ff8dba4fe7133d939c81b8f5246a4299918da9f05ea47
notifyme-1.1.tar.gz
Posted Dec 10, 1999

If you're tired fingering your local server to see if your friend is logged on this program is for you. It will stay in background waiting for the specific users to come. If the user arrive you'll see a small message in the upper right corner of the screen.

tags | local
systems | unix
SHA-256 | e4c2a89994828644087cd0951f7e8b1b615e1157c1885b4c7aced9575f3d976d
whowatch-1.3.tar.gz
Posted Dec 10, 1999

Whowatch is a ncurses who-like utility that displays information about the users currently logged on to the machine, in real-time. Besides standard information (login name, tty, host, user's process), the type of the connection (ie. telnet or ssh) is shown. You can toggle display between users' command or idle time. You can also view processes tree and send INT and KILL signals.

tags | tool, intrusion detection
systems | unix
SHA-256 | c0305ae9774f9652325025084821d5835882589cf2b3ebf3c0143089435bfc71
yawho.c
Posted Dec 10, 1999

Simple program similar to 'w'. Written because sometimes it is good to know which users uses ssh and which uses telnet.

systems | unix
SHA-256 | 2369995c34dce77bfc6292a0762cb66636703386ff47f91e19eb0c82c42e52f1
logit-1.6.tar.gz
Posted Dec 10, 1999
Site cs.uni-potsdam.de

logit is a drop-in replacement for syslog - claims 100% klogd/syslogd compatibility. Supports md5 crypto for data sent over the network to the loghost, limits access to community log files to a group, and other functionality.

tags | cryptography, system logging
systems | unix
SHA-256 | c9edc534a939ea0a5808d41b09f0b93895fa2a1bb493f764377b29ae17ae1cf1
qpop-linux
Posted Dec 10, 1999
Authored by synnergy, Headflux | Site synnergy.net

Remote buffer overflow exploit in perl for QPOP 3.0b<=20 running on Linux.

tags | remote, overflow, perl
systems | linux
SHA-256 | eb0c60576a529c4ae0797845177279d282a6760eaa5b490fa76e10749e16f68e
syn.jpg
Posted Dec 10, 1999
Authored by synnergy

Synnergy Logo

SHA-256 | 7f4dc86b1699f79f287979fb5965ebcbcb44700c6c727c0f27567bfc66c6dbf6
ms99-050
Posted Dec 10, 1999

Microsoft has released a patch for IE 4.01, 5, and 5.01 that allows a malicious web site operator to view a file on the computer of the visiting user, assuming he knew the path. Microsoft FAQ available here.

tags | web
SHA-256 | 8eacdeca0e0f75ad3bd833ea35d1e245a359624cd682b6031cf7f999549eb8e3
ms99-055
Posted Dec 10, 1999

Patch Available for "Malformed Resource Enumeration Argument" Vulnerability in Windows NT. When a malformed argument is supplied to a resource enumeration request, the Windows NT Service Control Manager can fail. The primary effect of the failure is to cause named pipes to fail, which prevents many other system services from operating. This can be exploit remotely through NetBios. Microsoft acknowledges Rain Forest Puppy for bringing this issue to our attention. Microsoft FAQ on this issue available here.

systems | windows
SHA-256 | d7fbeec3506c840e47d9da85bf4d561fada95e8cdf22e37c316360cbabde4fde
iis4.path.txt
Posted Dec 10, 1999
Site security.nnov.ru

IIS4 reveals full path name because it does not check for the existance of a local file before calling CGI.

tags | exploit, local, cgi
SHA-256 | 83151e7aab34f0807ad2152c87df75da00c744aeea468d27a95bca1c092ca040
solaris.snoop.c
Posted Dec 10, 1999
Authored by Shane A. Macaulay

[w00giving #8] Here's a new version of my snoop exploit, it seems that it will work on the new patched version of snoop aswell, and actually, the target host dose NOT have to be running with -v. Snoop is a program similar to tcpdump that allows one to watch network traffic. There is a buffer overflow in the snoop program that occurs when a domain name greater than 1024 bytes is logged, because it will overwrite a buffer in print_domain_name. This vulnerability allows remote access to the system with the privileges of the user who ran snoop (usually root, because it requires read privileges on special devices). Remote Solaris 2.7 x86 snoop exploit included.

tags | exploit, remote, overflow, x86, root
systems | solaris
SHA-256 | 99717fd62e6c6114deeea939793ba768fffa61af82db1312bc92a5d2d6438cf0
Bastille-0.95.tar
Posted Dec 10, 1999
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible and educational Security Hardening Program for Red Hat Linux. Virtually every task it performs is optional, providing immense flexibility. It also educates the user regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: A fix for the ssh link to download a newer ssh version, additional logging files, explanation cleanups, and preparations for a 1.0 release.
systems | linux, redhat
SHA-256 | d8003ab1fe42cfb69e6615f60e92413a60c2d6906044064fca30b5bc71f1b844
ex_vdolive.c
Posted Dec 10, 1999
Authored by Unyun | Site shadowpenguin.backsection.net

Remote exploit for VDO Live Player 3.02 for Windows95/98/NT. If VDO Live Player is installed on the system and the browser is configured default, .vdo file is downloaded and executed without confirmation. So, if the clients visit the webpage which is written the automatic download code of vdo file (such as META tag) that contains the attack code, the client machine will be cracked by the instructions which are written in vdo file.

tags | exploit, remote
SHA-256 | f15115d6af33eda19fe9ada84b2ba454b0f0ec8435fd4fa8e073faaf327c2680
firewall-pr0n.htm
Posted Dec 10, 1999
Authored by Robert Graham

FAQ: Firewall Admins Guide to Porn version 1.0.1 (Jan 15, 2000). One of the more frequent problem security administrators will face is porn. It is a popular Internet application, and even when restrictions are put into place, users find ways of getting around them. At the same time, users tend to be clueless as to the knowledge firewall admins have of their surfing habits. Every administrator of a large company that I know of has had to confront this issue, but not much is discussed about the topic in the literature. This document is intended as a guide for firewall admins in this area.

tags | paper
SHA-256 | c7e8e4ee97eecd6b0034d5f1d436c7d88a12892ca8b83350f168f72896e95e5c
rules.html
Posted Dec 10, 1999
Authored by Lance Spitzner | Site enteract.com

Building Your Firewall Rulebase - One of the largest risks with a firewall is a misconfigured rulebase. The most expenseive firewall in the world does not help you if you have a rule misconfigured. "Building Your Firewall Rulebase" helps to address this problem. The paper focuses on the concepts of how to build a secure rulebase. It goes step by step through the design process, explaining each rule and it signifigance. The paper is focused for beginner/intermediate firewall admins, but even the gurus can hopefully learn a trick or two (I know I did).

tags | paper
SHA-256 | 9dde1b219909aac384fb5e8cfec30116ca44bb073137d65a24699e4dc861a70e
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close