exploit the possibilities
Showing 1 - 14 of 14 RSS Feed

Files Date: 1999-12-28

Posted Dec 28, 1999
Authored by Rohit Singh | Site rexgrep.tripod.com

Fork Bomb Defuser is an easily loadable kernel module for Linux which detects, logs, and disables "fork bombs". It allows you to configure max_forks_per_second and max_tasks_per_user parameters at module load time. Any possible fork bomb that attempts to spawn a huge number of processes simultaneously is detected in real time, and the fork bomb is disabled.

Changes: A major bug which was causing the module to malfunction has been removed. Rather than being rescheduled, the offending processes are killed whenever the MAX_FORKS_PER_SECOND or MAX_TASKS_PER_USER parameters are exceeded. This change will solve the problem in the previous version.
tags | kernel
systems | linux
MD5 | 29aacdaef35afbdb93bff75b6e7b3f70
Posted Dec 28, 1999
Authored by Brian Wellington | Site xbill.org

Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process.

Changes: New aliases (dir, mget, mput), open flags which now work with multiple opens, a -p option to pass the port to ssh, and a fix so that transferring filenames with spaces should work now.
tags | remote, shell, root, encryption, protocol
MD5 | 8070983234f1a872b969f8eebe24b84d
Posted Dec 28, 1999
Authored by Phrozen3

Secure Sunos shell script. Disables a few commonly exploited holes.

tags | shell, patch
systems | unix, solaris
MD5 | f4ec0bd154fbbbf50b9727e2a1fa3ef6
Posted Dec 28, 1999
Authored by Christian Schulte | Site swrtec.de

Aps is a small tool for analyzing network traffic. It prints out a great deal of information about the relevant protocols including TCP, UDP, and ICMP. It allows you to filter IP addresses, hardware addresses, ports, and specific protocols.

Changes: Fixes for a filtering bug for hardware layer and a bug in parameter-parsing, and new port-filtering.
tags | tool, udp, sniffer, tcp, protocol
MD5 | 8a382764349adc3024def56646ea0c6e
Posted Dec 28, 1999
Authored by Wizdumb, fk

Every single file available on buffer overflow mentions that strcpy(), etc, but for some reason no one has noticed that 'cin >>' is also a problem. cin is an extremely commonly used function in C++ code, and it ought to be more widely known that the favoured use of it is insecure. Ditto for improper use of an ifstream.

tags | overflow, magazine
MD5 | b9f09e2d2c2843651733abc21aa18851
Posted Dec 28, 1999
Authored by Wizdumb, fk

Forbidden Knowledge issue 8 - Interesting Wardialling Results, HTTP Basic Authentication explained, Dialout/PPP on Shiva LANRovers, PHEAR Advisory Re: Divine forces, Buffer Overflow Explained, Introduction to Assembly Programming, and Fun with "Trojan" Wingates.

tags | web, overflow, trojan, magazine
MD5 | a6c2cdd1bda5ba03ce3bc2683411a830
Posted Dec 28, 1999
Authored by Nelson Brito

The Real Log Clean for Linux OS - Cleans logs under linux and tests the attributes in Ext2fs.

tags | system logging
systems | linux, unix
MD5 | dbd6606e2994ca3e4d84c89d8cee0ab9
Posted Dec 28, 1999
Authored by Mixter

Nsat is a fast bulk security scanner designed for long-range scans written in C++ which scans and audits about 60 different services and 170 cgis with different scan intensity. Updates in this version include detection of sendmail 8.9 remote exploitability, more CGI scripts that can be used in MDAC IIS attack, improved rpc service and -backdoor scanning, all latest solaris RPC vulnerabilities added, and detection of trinoo distributed DoS masters with default ports.

tags | tool, remote, cgi, scanner, vulnerability
systems | unix, solaris
MD5 | e0e7d20e0ad494af311058b36dd20698
Posted Dec 28, 1999
Authored by Underground Security Systems Research

Local / Remote Remote DoS Attack in Rover POP3 Server V1.1 NT From aVirt. Source / Binary for exploit here.

tags | exploit, remote, local
MD5 | 38e52c5c3607f0cd918cfd6604e7b858
Posted Dec 28, 1999
Authored by Sam Kline | Site wwdsi.com

SAINT (based upon SATAN) is a free network security scanner which runs on UNIX platforms. This release includes all of the new checks found in SAINT 1.4.1 beta 1, with additional checks for sadmind, Trinoo, DRAT backdoor, SSH, and QPOP vulnerabilities. This release also fixes a number of bugs that were present in earlier versions.

tags | tool, scanner, vulnerability
systems | unix
MD5 | 3b86fb134a24ccb19c04e0b89704befe
Posted Dec 28, 1999
Authored by Brock Tellier

A vulnerability in IBM's Network Station Manager will allow any local user to gain root privileges.

tags | exploit, local, root
MD5 | bf4c29643b28eef63979f695dcd4d707
Posted Dec 28, 1999
Authored by Brock Tellier

A vulnerability in "/usr/local/bin/pis" on SCO UnixWare will allow any user to create arbitrary files with group "sys" privileges. A full root compromise is then trivial.

tags | exploit, arbitrary, local, root
systems | unixware
MD5 | e041e1e1fc5536685b28d5c0674b30c9
Posted Dec 28, 1999
Authored by Vetesgirl | Site self-evident.com

VeteScan is a bulk vunerability scanner containing programs to scan Windows NT and UNIX systems for the latest trojans/remote exploits, a scanner for the vulnerabilities of single hosts (with or without host checking), a tool for scanning multiple hosts, a scanner for class A/B/C networks, and fixes for various vulnerablities.

Changes: Fixes for a few errors, scans for glFtpD, LinuxConf, and ssh, a new admbind exploit and patch, and new scans for amd z0ne, cmsd z0ne, mountd z0ne, and sadmin z0ne.
tags | tool, remote, scanner, trojan, vulnerability
systems | windows, unix, nt
MD5 | 25c2e484c721f631f9b36f45634f4d88
Posted Dec 28, 1999
Authored by Vetesgirl | Site self-evident.com

The Vetestcl package contains various TCL scripts with the same functionality found in the VeteScan package. You can load the scripts within an Eggdrop bot to make sure none of your channel operators or hosts running IRC bots suffers from security vulnerabilities present in the operating system or user space applications.

Changes: Bugfixes, a modified nmap.tcl, new binds (!rpc !bind) for rpc.tlc and bind.tcl, faster scanning, and more accuracy.
tags | tool, scanner, vulnerability
systems | unix
MD5 | 7c8dddb187fae79c55cebfc97c0bf5a5
Page 1 of 1

File Archive:

June 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    10 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    15 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By