what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-01-08

bsdscan-0.4.tar.gz
Posted Jan 8, 2000
Authored by Fflewddur

BsdScan is a light-weight port-scanner designed for the BSD operating system. It currently supports scanning single hosts, subnets, logging results, scanning ports in a random order, specifying a port range, and a speed option to only scan commonly used ports.

tags | tool, scanner
systems | unix, bsd
SHA-256 | 1972dd31c79439d79e5e07cfcde0322d3a0e1e68a48d717e92f17ecd0bb8c2c7
nutcrack.1.0.tar.gz
Posted Jan 8, 2000
Authored by Ryan Rhea | Site northernlights.bizland.com

Nutcracker is a simple, fast, and effective password cracker for UNIX and Linux systems. It is faster than the other crackers available. Disabled accounts and accounts with no password are detected. Results are shown in a nicely-formatted table. A sample password file and dictionary file are included, although you can use any word list you wish (including the file '/usr/dict/words' included with most Linux distributions). Nutcracker will work with '/etc/passwd' or '/etc/shadow' files.

tags | cracker
systems | linux, unix
SHA-256 | affd79bda6b3e45a5ad515badce2a192503d13eb3c8b7f2f61ec88ad64b46fb5
Openwall Linux Kernel Patch
Posted Jan 8, 2000
Site openwall.com

This patch (for kernel version 2.2.14) is a collection of security-related features for the Linux kernel, all configurable via the new 'Security options' configuration section. Features a Non-executable user stack area, Restricted links in /tmp, Restricted FIFOs in /tmp, Restricted /proc, Special handling of fd 0, 1, and 2, Enforce RLIMIT_NPROC on execve(2), Destroy shared memory segments not in use, and Privileged IP aliases.

tags | kernel
systems | linux
SHA-256 | 0acceb4d4dbb7607df35197ca339f9fedcd0d7fb21b5bdaaea8da6804e763d90
warftp.txt
Posted Jan 8, 2000
Authored by Sir Dystic

All versions of War-ftpd have serious security issues. The current release has some serious problems with the parsing of macros which can be exploited without even logging in.

tags | exploit
SHA-256 | 16d21665824030da7b62fb5a23d329eaa92e5d6389b0e9707f44e6abf7bef48f
acl-0.7.0.tar.gz
Posted Jan 8, 2000
Authored by Patrick Mullen | Site LinuxRC.org

Inspired by ColorLogs, acl (Advanced Color Logs) has advanced parsing capabilities, including multiple search strings and negative search strings (matches if the string is not found in the line). It's very useful for highlighting important or non-standard messages from daemons, while not highlighting standard status messages from the same daemons.

Changes: Much more configurability, can "wake up" a console that has been blanked, and special processing for syslog-format files to configure a color for the timestamp, specifying different colors depending on what host generated the message (if syslog is logging remote messages as well) and specification of a special color for highlighting messages from different daemons.
tags | system logging
systems | unix
SHA-256 | 5ed488b5c331364d3f571521bbd68920a3ae3b64eb9d54ebfe19b1af739b50c2
ie5.cross-frame.txt
Posted Jan 8, 2000
Authored by Georgi Guninski

Internet Explorer 5.01 under Windows 95 and 5.5 under WinNT 4.0 (suppose other versions are also vulnerable) allows circumventing "Cross frame security policy" by accessing the DOM of "old" documents using IMG SRC="javascript:..." and a design flaw in IE. This exposes the whole DOM of the target document and opens lots of security risks. This allows reading local files, reading files from any host, window spoofing, getting cookies, etc. Demonstration available here.

tags | exploit, local, spoof, javascript
systems | windows
SHA-256 | 08b65ae8aa1cc08a745f60c70d01fe3694092271137bffce73f1decd10d15396
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close