exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 1999-12-24

phpfwgen-0.4.tar.gz
Posted Dec 24, 1999
Authored by Del | Site babel.com.au

The PHP firewall generator is a simple PHP script that generates a firewall script for ipchains-based firewalls. The aim is to support an easily configurable rule set similar to those supported by commercial firewall systems.

Changes: Fixes for some unusual network configurations, various installation tidy-ups and cosmetic changes, and there is now an on-line demo as well as an RPM.
tags | tool, php, firewall
systems | linux
SHA-256 | ece77bb4fb70540f3b5523c31e043acb44ebab9649e4ba81d0140573276fce46
lcap-0.0.3.tar.bz2
Posted Dec 24, 1999
Authored by spoon | Site pweb.netcom.com

LCAP allows a system administrator to remove specific capabilities from the kernel in order to make the system more secure. LCAP modifies the value in the sysctl file /proc/sys/kernel/cap-bound. "Capabilities" are a form of kernel-based access control. Linux kernel versions 2.2.11 and greater include the idea of a "capability bounding set," a list of capabilities that can be held by any process on the system. If a capability is removed from the bounding set, the capability may not be used by any process on the system (even processes owned by root).

Changes: A fix for a bug with the -z option.
tags | kernel, root
systems | linux
SHA-256 | b066ce6905b68d33a38991f315c367f4be20a5c66e48f00b3445f901ae86f912
nessus-0.99.2.tar.gz
Posted Dec 24, 1999
Authored by The Nessus Project

Nessus is a free, open-sourced and up-to-date remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface and currently performs over 270 remote security checks.

Changes: Fixed a problem in the cipher layer which would prevent nessusd from testing big networks, memory consumption reduced by 50%, Nmap can be used as a plugin configuration files in ${prefix}/etc/nessus, and of course, all the newest security checks.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
SHA-256 | 7a59ffad0892001d699924038bdcd641cc6295a9a77c9abcaefc98e1b9b5dcae
winfingerprint-221.zip
Posted Dec 24, 1999
Authored by Vacuum | Site technotronic.com

Winfingerprint 22: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQLSERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, E numerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes.

Changes: minor bug fixed in the options parsing that would cause winfingerprint to crash if you did not specify -m or -t.
tags | remote, registry
systems | windows
SHA-256 | 4fd495f1352033cfefc46e5905f5cbbd9393c6618e0b51c042bfe9894a86ed3e
netfilter-0.1.14.tar.bz2
Posted Dec 24, 1999
Authored by Rusty Russell | Site samba.org

netfilter is a framework for arbitrary packet mangling. So far, a new NAT system and packet-filtering system have been built on top of it, as well as compatibility modules for ipfwadm and ipchains. Netfilter is a work-in-progress, but should be fairly robust for non-exotic work.

Changes: A local traffic oops fix, and a RH6.0 compile fix.
tags | tool, arbitrary, firewall
systems | linux
SHA-256 | e18e94c802022762ae69f35a16b1a84e2582afd831cafdd728c8817546614f2f
ms99-058
Posted Dec 24, 1999

Microsoft has released a patch for a vulnerability in Microsoft IIS and other products that run atop it. The vulnerability allows a visiting user to see the source code to .ASP and other files. Microsoft FAQ on this issue here.

tags | asp
SHA-256 | 8e8876550b63711876423c2bdef075b681742039e119e0b7128fc0eec0d6bdba
ms99-061
Posted Dec 24, 1999

Microsoft has released a patch for a vulnerability in Microsoft IIS and products that run atop it. The vulnerability allows files on a web server to be specified using an alternate representation, in order to bypass access controls of some third-party applications. Microsoft FAQ on this issue here.

tags | web
SHA-256 | 3e018303c480a9aebdbc441ccc8f65b9aa1f3e14e56e73cce3ebe8761c763a96
i2odialogd.txt
Posted Dec 24, 1999
Authored by Brock Tellier

Anyone can gain remote root access to a UnixWare 7.1 system by exploiting a vulnerability in the i2odialogd daemon. This daemon is installed and running by default.

tags | exploit, remote, root
systems | unixware
SHA-256 | 036bfe31c03c92e9bc94b4a442b735a8cb7fd6fd7607cdb68240709bed19aff3
adkill-howto.htm
Posted Dec 24, 1999
Authored by SmoG | Site smog.cjb.net

How to remove ads from free webpage providers - Version 1.1.

tags | javascript
SHA-256 | c41ffc76e9e0f26b6adf4777d4259602b917ce70a899ce3599a318212d1b5f4b
003_wp.txt
Posted Dec 24, 1999
Authored by Suid | Site suid.kg

Example attack transcript against glftpd. This attack was performed against a default install with a single user account added.

SHA-256 | 70d7d889b43a2d66d151613a1294339e52ec80d676fc66dba686150ebe3bc64f
003.txt
Posted Dec 24, 1999
Authored by Suid | Site suid.kg

SUID Advisory #3 - multiple vulnerabilities with glftpd 1.17.2 and below. glFtpD has several problems which can lead to a remote attacker attaining root on your machine.

tags | remote, root, vulnerability
SHA-256 | a272432d911a54e3fb99833860deb64b564e9d6e701995805392d9edc3b36531
001_addendum.txt
Posted Dec 24, 1999
Authored by Suid | Site suid.kg

SUID Advisory #1 Addendum - Insecure FTP server conventions can lead to remote binary execution on a remote ftp server. Anonymous users or users with valid ftp access only accounts may also execute arbitrary code. Exploit information included.

tags | remote, arbitrary
SHA-256 | 6085619944c5f878275760fe08277ed6862efad582615db209b144b5776e9d0b
002.txt
Posted Dec 24, 1999
Authored by Suid | Site suid.kg

SUID Advisory #2 - Exploit for ascend router bugs as per NAI advisory.

SHA-256 | 8205e35efb8995ce9612e8285e123dadb6501023b4f5997f06706dd7fd8610a9
nt.security.update.122399.txt
Posted Dec 24, 1999
Authored by winsd

Windows NT Security Update - December 23, 1999. New vulnerabilities - Yet another problem with Internet Explorer 5.x and cross frame navigation, Overflow in ZBServer v1.5, Outlook 5, as well as Internet Explorer 4.5 on Macintosh platform, Microsoft reported that Internet Information Server (IIS) is prone to reveal source code under certain conditions, Norton Antivirus 2000 was reported to contain a serious buffer overflow condition, and SQL server crash. NTsecurity homepage here.

tags | overflow, vulnerability, magazine
systems | windows
SHA-256 | 3cd5748f0b9ba31bc84172eefeb5e50a760038cf0c7b703ff617c3285bc947a1
iptun-ssl.txt
Posted Dec 24, 1999
Authored by Coaxial Karma

Step by Step instructions for tunnelling IP through an SSL Proxy using two linux boxes, pppd, ipfwadm, and ppptcp-ssl.

tags | paper
systems | linux, unix
SHA-256 | 0dea7e4d8de7848934326ba14c32424742eca07f1b208d21ec80e262ffbdfb8c
zbs15exp.zip
Posted Dec 24, 1999
Authored by Underground Security Systems Research

Remote exploit for ZBServer 1.5 Pro Edition for Win98/NT. Source code. Binary available here.

tags | exploit, remote
systems | windows
SHA-256 | 489d37d2f616fef257eb8ab311b5b7e0d2340595d8b205e9c99b197623dfd15e
zbserver-1.5.txt
Posted Dec 24, 1999
Authored by Underground Security Systems Research

[w00giving #11] An exploitable buffer overflow was found in ZBServer 1.5 Pro Edition for Win98/NT. The code that handles GET commands has an unchecked buffer that will allow arbitrary code to be executed if it is overflowed. Source / Binary for the exploit available here.

tags | exploit, overflow, arbitrary
systems | windows
SHA-256 | 9e69d604d05c1a2a2c6a723f824527044474acdd573ca473666c6abe690f87a8
whisker-1.3.0a.tar.gz
Posted Dec 24, 1999
Authored by rain forest puppy

whisker is what I've dubbed a 'next generation' CGI scanner. It is Scriptable. It's a programming-ish language that is tailored to do lots of flexible web scanning. Very stealthy. I've implemented anti-IDS checks into the scan. Includes over 200 checks. Lots of options. Reads in nmap output, files full of domains, or single host. Virtual host support. Proxy support.

Changes: 8 new anti-IDS tactics, scan SSL, alternate file formats, distributed scanning, 200 vulnerabilities, 100 servers, multi-threaded front end, and distributed proxy fixes.
tags | web, cgi
systems | unix
SHA-256 | aa01b002879dbb047ab54823efeedd8d3e423630310048e3b7a238055f3e9ab6
ms99-046
Posted Dec 24, 1999

Re-release of Microsoft Security Bulletin MS99-046 - In November, we withdrew a previously released patch that improved the randomness of TCP initial sequence numbers in Windows NT 4.0. The patch was withdrawn because it contained the same regression error that was present in Windows NT 4.0 SP6. We have eliminated the regression error and re-released the patch. Microsoft FAQ on this issue available here.

tags | tcp
systems | windows
SHA-256 | 3348e8337e221d3e310f486dded733222eff60573e693021804173357d5202dc
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close