what you don't know can hurt you
Showing 1 - 7 of 7 RSS Feed

Files Date: 1999-12-30

ms99-061.info.txt
Posted Dec 30, 1999
Authored by rain forest puppy

More information on the vulnerability described in ms99-061, a problem in IIS that causes it to parse invalid escape sequences, allowing a carefully made string to bypass IDS systems, ISAPI filters, and extension handlers. Includes a perl script to test for vulnerability.

tags | perl
MD5 | 0af787a2fcf7d7bcecc7e44df69fa355
unixware.rtpm.txt
Posted Dec 30, 1999

Unixware 7 Vulnerability - Any local users can exploit a bug in rtpm to gain "sys" privileges.

tags | exploit, local
systems | unixware
MD5 | dc5157ba332062731fdd37db19b42be8
wipe-0.16.tar.gz
Posted Dec 30, 1999
Authored by Berke Durak | Site gsu.linux.org.tr

Recovery of supposedly erased data from magnetic media is easier than what many people would like to believe. A technique called Magnetic Force Microscopy (MFM) allows any moderately funded opponent recover the last two or three layers of data written to disk. Wipe repeadetly overwrites special patterns to the files to be destroyed, using the fsync() call and/or the O_SYNC bit to force disk access.

Changes: Use of /dev/urandom to seed libc's random() additive feedback pseudo-random generator; a new 32-bit seed is fetched for every 1024 bytes.
systems | unix
MD5 | 03801d2c129176cc8c8ff4e750c80805
reltunnel.tar.gz
Posted Dec 30, 1999
Site detached.net

reltunnel - Offers a reliable data channel over unreliable protocols.

tags | encryption, protocol
MD5 | db713577d622abe5e061982b86ed7c4e
icmptunnel013.tar.gz
Posted Dec 30, 1999
Site detached.net

icmptunnel encapsulates data in ICMP frames. The usual mode of operation is tcp/ip forwarding, one icmptunnel will be set up on a blocked machine (behind a firewall) listening on TCP/IP port X. The other icmptunnel will be set up on a nonblocked machine (somewhere on the internet) connected to a local service (such as port 23, telnet). Data received on the blocked machine's tcp/ip socket will be encapsulated in an ICMP packet of users choice (ICMP_ECHO, ICMP_ECHOREPLY, ICMP_TIMESTAMP, etc..) and sent to the nonblocked machine. This machine will identify the packet as encapsulated data, decapsulate the data and forward it on to its tcp/ip socket connected to the telnet daemon. The telnet daemon responds with some data, icmptunnel on the nonblocked machine encapses the packet and sends it back to the blocked machine (ICMP type still user definable).

tags | local, encryption, tcp
MD5 | 42309dc861af6796a0ee4d06984ebcb7
lingate-0.0.4-src.tar.gz
Posted Dec 30, 1999
Site lingate.cjb.net

LinGate is a powerful network gateway software. It provides security to your networks, allowing access to external world in safe and secure manner. LinGate has access control mechanism to restrict access to its services. It can even perform different services for requests from different IPs on the same LinGate port. Once setup, LinGate requires no operators, and can be configured remotely using KLinGate interface which will be designed for KDE and jLinGate which will be designed for the Java platform.

tags | tool, java, firewall
systems | unix
MD5 | b82ae4a15df5a69710d62b56e9085e07
firewalk-0.99.1.tar.gz
Posted Dec 30, 1999
Site packetfactory.net

Firewalking is a technique developed by Mike Schiffman and David Goldsmith that employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networks. Firewalk the tool employs the technique to determine the filter rules in place on a packet forwarding device. The newest version of the tool, firewalk/GTK introduces the option of using a graphical interface and a few bug fixes.

tags | tool, scanner
systems | unix
MD5 | e222016631ddfd01cba80cab5cd33fc3
Page 1 of 1
Back1Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    11 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close