what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-01-06

nt.security.update.010500.txt
Posted Jan 6, 2000
Authored by winsd

Windows NT Security Update - Janurary 5, 2000. Contains information on AnalogX Server Overflow, PC-Cillin DoS, CamShot Buffer Overflow, and CSM Mail Server DoS. NTsecurity homepage here.

tags | overflow, magazine
systems | windows
SHA-256 | d9aca7fab99579941c1ad908881263a01b9840872fabad115bec70b1e9d6840c
SUN MICROSYSTEMS SECURITY BULLETIN: #00193
Posted Jan 6, 2000

Patch advisory for Sun Microsystems. Please read for details.

SHA-256 | a7817237bd73f2b7077f5d33c71d65950bd1eb651005ae4a54d805f4c241fa41
netzero.c
Posted Jan 6, 2000
Site tribune.intranova.net

NetZero Password Generator - Generates a NetZero username/password pair suitable for use in PPP/Dial-Up Networking.

SHA-256 | a46fa70cc060c87d712528748f1066df5927593e3eef4131791e98f184c01b7e
kbdv2.c
Posted Jan 6, 2000
Authored by Spaceork

Kdb is a nice little backdoor that allows root access by modifing the SYS_stat and SYS_getuid system calls.

Changes: Works on 2.2 kernels.
tags | tool, root, rootkit
systems | unix
SHA-256 | 75bf99652d25caf83a0945b628a334c97577ac6b2b81e8b7140f072095ee8c0f
secfingerd-0.96.tar.gz
Posted Jan 6, 2000
Authored by Andrew Kay | Site kayfamily.demon.co.uk

Secfingerd is a replacement for the standard finger daemon that comes with most UN*Xes. It allows each user to control whether-or-not they want to be fingered and if they do, what information about them is displayed as well as the formatting used. Secfingerd does not support empty and indirect queries. User's can stop themselves from being fingered by creating a ".nofinger" file in their home directory.

tags | tool
systems | unix
SHA-256 | c8bdf22cc2e3f558f10d33af0784f397d9cd826aa06a74c1bcde2e90ff780a08
sickenscan.tar
Posted Jan 6, 2000
Authored by David Dittrich, Marcus Ranum

"gag" is a program to remotely scan for "stacheldraht" agents, which are part of an active "stacheldraht" network. It will not detect trinoo, the original Tribe Flood Network (TFN), or TFN2K agents. Tested on linux/solaris/AIX/BSD.

tags | denial of service
systems | linux, solaris, bsd, aix
SHA-256 | e5c6d78b9d6ac27ed84bc86b8f0e2a5db68ea378ec8fb8c63b06436eae38fe13
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close