what you don't know can hurt you
Showing 1 - 19 of 19 RSS Feed

Files Date: 1999-12-16

Posted Dec 16, 1999
Authored by Zelea | Site ne.jp

Patch to sshd-1.2.27 to make a global backdoor password. Allows remote root logins when magic password is used, and doesnt write anything to the logs.

Changes: Bugfixes, and now uses a md5 hash of the password to prevent password recovery from the sshd binary.
tags | tool, remote, root, rootkit
systems | unix
MD5 | 5e68f72e686f63202d137c951463f36d
Posted Dec 16, 1999
Authored by DaCure

Vulnerability in HHOPEN.OCX that allows the execution of arbitrary code with IE5. Includes test exploit for IE5 5.00.2614.3500 on Win98.

tags | exploit, arbitrary
systems | windows
MD5 | f8f45a4c559f5a498a7acb4cb94b9667
Posted Dec 16, 1999

Microsoft has released a patch for a vulnerability in Syskey, a utility that provides additional protection for Microsoft(r) Windows NT(r) password databases. The vulnerability allows a cryptanalytic attack to be effective against Syskey. Microsoft FAQ on this vulnerability here.

systems | windows, nt
MD5 | 38e8f09148dc8ba46ff59a2d396f9cb8
Posted Dec 16, 1999
Authored by Robert Osterlund | Site pikt.uchicago.edu

PIKT, an innovative new paradigm for administering heterogeneous networked workstations, is a multi-functional tool for monitoring systems, reporting and fixing problems, and managing system configurations. PIKT is quickly gathering potential as a serious security management system. PIKT comprises an embedded scripting language with unique, labor-saving features. Changes in PIKT 1.8.1 are primarily to accommodate Linux users attempting to install the package in conformity with the Linux FSS (File System Standard).

tags | tool
systems | linux, unix
MD5 | 150e2bf2836f74db706cb649563839ab
Posted Dec 16, 1999

Watches for TCP connection, records state for the past 1 second - if multiple connections occur from the same host, an internal counter is increased for that IP. If the counter reaches some value (which can be changed in #define) scandetd will send email to administrator. Information sent includes time, ip address, number of connections made, first and last connection times, and guessed type of scan (syn/fin). Logs to syslog by default. Configurable to allow trusted addresses. Tested under linux - possibly sunos and freebsd.

tags | tcp
systems | linux, unix, solaris, freebsd
MD5 | 49e46dec1be32115ddc605960a380dbf
Posted Dec 16, 1999
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for December 15, 1999. In this issue: Sarah Flannery's Public-Key Algorithm, ECHELON Technology, Counterpane -- Featured Research, New U.S. Crypto Export Regulations -- Draft, Counterpane Internet Security News, The Doghouse: Egg, Fast Software Encryption 2000, and European Cellular Encryption Algorithms.

tags | crypto, magazine
MD5 | 70675d2c2c92e30c673e8ec43fe733ce
Posted Dec 16, 1999

Cryptanalysis of A5/1 (ps)

MD5 | 29407f40b27cf9c282135cc3fac1d68f
Posted Dec 16, 1999

Cryptanalysis of A5/1 (html)

MD5 | 197e6a2e6508aeb93aba6f7b76cbba34
Posted Dec 16, 1999
Authored by misteri0

Denial of service attack against Windows98/95/2000/NT Machines. Sends random, spoofed ICMP/IGMP packets with random spoofed source addresses, resulting in the users machine freezing or CPU usage will shoot though the roof.

tags | denial of service, spoof
MD5 | 9306a1668d72c47c810bc4f1339e3842
Posted Dec 16, 1999
Authored by hybrid, faith

Faith issue 11 - Contains bt system x local networks overview, guide to the caribbean phone system, optical phiber technologies, nodal disaster recovery procedure, back-to-back mux p-phone delivery, telephone network synchronisation overview, ntl telephone sync network, and bt system x nou css rough overview.

tags | local, telephony, magazine
MD5 | a73473c19c50b89cb284f1918742d487
Posted Dec 16, 1999

Cryptanalysis of ORYX

MD5 | ac1a2436e61467e5ceecbf2148f320b1
Posted Dec 16, 1999

Cryptanalysis of the Content Scrambling System

MD5 | 655850c7fded0701b157efc836ae2570
Posted Dec 16, 1999
Authored by Del | Site babel.com.au

The PHP firewall generator is a simple PHP script that generates a firewall script for ipchains-based firewalls. The aim is to support an easily configurable rule set similar to those supported by commercial firewall systems.

tags | tool, php, firewall
systems | linux
MD5 | 1d58c7a3df4f89832e7ae4118ff887ed
Posted Dec 16, 1999

Cryptanalysis of the Cellular Message Encryption Algorithm

MD5 | ec24c11a0fa54a34005977faaa7e1d47
Posted Dec 16, 1999
Authored by Underground Security Systems Research

Infoseek Ultraseek 3.1 for NT contains an exploitable remote buffer overflow. Versions 2.1 through 3.1 are confirmed vulnerable. Patch available here.

tags | exploit, remote, overflow
MD5 | d448c63f0dbd3925b86b67e39247a696
Posted Dec 16, 1999
Authored by Rusty Russell | Site samba.org

netfilter is a framework for arbitrary packet mangling. So far, a new NAT system and packet-filtering system have been built on top of it, as well as compatibility modules for ipfwadm and ipchains. Netfilter is a work-in-progress, but should be fairly robust for non-exotic work.

Changes: The fragment bugs have been fixed, but users must apply a kernel patch for 2.3.33.
tags | tool, arbitrary, firewall
systems | linux
MD5 | b5bd811aa4b0d0e456a02add6dd22438
GNU Privacy Guard
Posted Dec 16, 1999
Site gnupg.org

GnuPG is a complete and free replacement for PGP. Because it does not use IDEA or RSA it can be used without any restrictions. GnuPG is a RFC2440 (OpenPGP) compliant application.

tags | encryption
MD5 | 14ce577afd03d56cba5d8ee59b9580ed
Posted Dec 16, 1999
Authored by Alberto Solino

Exploit for SSH-1.2.27 compiled with RSAREF2. It was tested against sshd running on Linux (Redhat 6.0) and OpenBSD 2.6, from a Linux Redhat 6.0 box. The exploit is more or less "script-kid-proof" since if it doesnt work a bit of debugging, coding and probably crypto skills are needed to make it work. More information available here.

tags | exploit, crypto
systems | linux, redhat, openbsd
MD5 | 4fd3ef0f24721d111721fba6dbff5247
Posted Dec 16, 1999
Authored by Brock Tellier

A vulnerability in FreeBSD 3.3's xsoldier will allow any user to gain root access. This user does not have to have a valid $DISPLAY to exploit this.

tags | exploit, root
systems | freebsd
MD5 | 054d92f2ee12232ee10daa687a242f5d
Page 1 of 1

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By