what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 1999-12-18

y2k-virus.htm
Posted Dec 18, 1999

Year 2000 Computer Viruses and Hoaxes - List of the approximate number of reports the CERT/CC has received on viruses and hoaxes that reference Y2K. There are also links to anti-virus vendors having Y2K virus and hoax web pages.

tags | web, virus
SHA-256 | 76945e53c71e450c6468224359a90fd3e3fd4372c3e8b036ef211eccd2994420
y2k-cyberthreats.htm
Posted Dec 18, 1999

CERT Expectations During Y2K - "Cyber Infrastructure and Malicious Expectations during the Y2K Transition Period" discusses potential activities associated with Y2K and offers recommendations.

SHA-256 | ae21eabdf7cf09db59fca3e2ba160447a1c6a2ef9b03e26b9ab42e6fde225b6a
Y2K_FAQ.htm
Posted Dec 18, 1999

CERT Y2K FAQ - Includes information to help sites determine whether a failure is Y2K related or an attack.

SHA-256 | 2380768c6451a4cfb53db684471538c198e1fe40f50bc442053724b576f7e573
CS-99-05
Posted Dec 18, 1999

CERT Quarterly Summary #5 - Currently exploited vulnerabilities include am-utils package and RPC vulnerabilities. Also has Y2K/security Information sources.

tags | vulnerability
SHA-256 | 73d076a1d46e60bf08ea93291abe8457424ded6288f087e755102d8e05a0cbc9
Fwctl-0.22.tar.gz
Posted Dec 18, 1999
Authored by Francis Lacoste

Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. It supports multiple interfaces, masquerading and packet accounting. Fwctl doesn't replace a good security engineer, but it can make the job of the security engineer simpler.

Changes: New support for port forwarding, definitions for pptp, ipsec, ip_pkt, icmp_pkt, and udp_pkt services, and minor bugfixes.
tags | tool, firewall
systems | linux
SHA-256 | 374331b057718bb23ee61c904c9b8e9a394d3334af5e3ee44a0b97e5c2b623c2
scanner.zip
Posted Dec 18, 1999
Authored by Rob Keir | Site members.home.com

SuperScan version 2.06 - "This is a powerful connect-based TCP port scanner, pinger and hostname resolver. Multithreaded and asynchronous techniques make this program extremely fast and versatile. Perform ping scans and port scans using any IP range or specify a text file to extract addresses from. Scan any port range from a built in list or any given range. Resolve and reverse-lookup any IP address or range. Modify the port list and port descriptions using the built in editor. Connect to any discovered open port using user-specified "helper" applications and assign a custom helper application to any port. View responses from connected hosts. Save the scan list to a text file. Transmission speed control. User friendly interface."

Changes: list merging and other enhancments.
tags | tcp
SHA-256 | 92c89d8f919b34f4668f0eee16d20d496d09e42b605c4d768c713e934368c296
nav2000.dos.txt
Posted Dec 18, 1999
Authored by Kyle

Remote DoS attack in Symantec's Email protection in NAV2000. The Protection program leaves a pop server running on the local workstation NAV2000 is installed on, which is vulnerable to a buffer overflow in a long user name.

tags | exploit, remote, overflow, local
SHA-256 | aaccfd8e405ec8b7ba562a2709ab7e65d5140e07269bdaa79017d2aff4dbcb5d
ATLAS.ZIP
Posted Dec 18, 1999
Authored by Digital Monkey

Windows / Dos CGI scanner (binary only) which checks for 65 remote vulnerabilities.

tags | remote, cgi, vulnerability
systems | windows
SHA-256 | aedc3208c7a21b9e8a00fc2e2d7fb8b9fb39bfa9c14af7eedb1af8a4bb1e4f98
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close