exploit the possibilities
Showing 1 - 25 of 477 RSS Feed

Files Date: 2000-01-10

pru.c
Posted Jan 10, 2000
Authored by Amir, Pisang

Clone.c mutation - Clonebot IRC war script.

tags | denial of service
MD5 | 4b2da08ea56441849a958d5154ad5ae2
nt.security.update.011000.txt
Posted Jan 10, 2000
Authored by winsd

Windows NT security update - Georgio Guninski discovered a problem with Internet Explorer that may allow the circumvention of the browser's domain security. Microsoft is aware of the issue, however no response was known at the time of this writing. Details here.

tags | magazine
systems | windows, nt
MD5 | 02c49b27792fdf000866ef28fdb1b996
skrypt.sh
Posted Jan 10, 2000

Wu-ftpd 2.4 remote root exploit for SuSE. Tested on SuSE 6.0 running Wu-ftpd 2.4.2-beta18.

tags | exploit, remote, root
systems | linux, suse
MD5 | bb6b5d678f956823e0e6b4cea65415e6
gh-plus.c
Posted Jan 10, 2000
Authored by Ytcracker

Remote exploit for PowerScripts PlusMail (all versions to current). Plusmail is an extremely popular cgi-based administration tool that allows you to remotely administer your website with a graphical control panel interface. The password file, however, is set with permissions rw enabled. All platforms are affected.

tags | exploit, remote, cgi
MD5 | 9806863a8920baf19bd61ce664818fbb
fake_freeav.zip
Posted Jan 10, 2000
Authored by Icer | Site ic3d.tsx.org

This program is a fake logon screen for Altavista's Free Internet Service (FreeAV). It automaticly logs the password and username and date in a log file. Screenshot here. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
MD5 | d5d83b930c87eae6e4ea1c60891c38e5
rhsa.2000-001-03.userhelper
Posted Jan 10, 2000

A security bug was found in userhelper; the bug can be exploited to provide local users with root access.

tags | local, root
systems | linux, redhat
MD5 | 296697df03f97566f2b055e8b08f84d0
rhsa.2000-002-01.lpr
Posted Jan 10, 2000

Two security vulnerabilities exist in the lpd (line printer daemon) shipped with the lpr package. First, authentication was not thorough enough. If a remote user was able to control their own DNS so that their IP address resolved to the hostname of the print server, access would be granted, when it should not be. Secondly, it was possible in the control file of a print job to specify arguments to sendmail. Through careful manipulation of control and data files, this could cause sendmail to be executed with a user-specified configuration file. This could lead very easily to a root compromise.

tags | remote, root, vulnerability
systems | linux, redhat
MD5 | eb44a2d09caf4df2a374d7a9ba33c7c3
floppyfw-1.0.1.img
Posted Jan 10, 2000
Authored by Thomas Lundquist | Site zelow.no

floppyfw is a router and simple firewall on one single floppy. It uses Linux basic firewall capabilities and have a very simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It has a simple installation, mostly only needed to edit one file on the floppy.

tags | tool, firewall
systems | linux
MD5 | af169ace3f189a4bd6c8884b8b93eb66
netfilter-0.1.15.tar.bz2
Posted Jan 10, 2000
Authored by Rusty Russell | Site samba.org

netfilter is a framework for arbitrary packet mangling. So far, a new NAT system and packet-filtering system have been built on top of it, as well as compatibility modules for ipfwadm and ipchains. Netfilter is a work-in-progress, but should be fairly robust for non-exotic work.

Changes: Support for kernel 2.3.38, and accumulated fixes.
tags | tool, arbitrary, firewall
systems | linux
MD5 | ab3f2eca98d2f30beac8bea5c4fc7b60
checksums-1.0.tar.gz
Posted Jan 10, 2000
Authored by Mike

Checksums takes a file of predetermined MD5 checksums and compares with the current sum. It can be installed as a command line tool, or as a CGI which will allow you to upload the sums file remotely. In either case it is a useful tool to detect changes in your system files, such as a trojan.

tags | tool, cgi, trojan, intrusion detection
systems | unix
MD5 | 0510644d9d3ff548bfd58f9c0ef75b13
gShield-1.3.tgz
Posted Jan 10, 2000
Authored by R. Gregory | Site linuxmafia.org

gShield (formerly Godot's Modified Modular Firewall), is an aggressive, modular, ipchains-based firewall script. Features include: easy configuration through a BSD-style configuration file, optional IPmasq support, TCPwrapper-like funtionality for service access, and extremely restrictive defaults. It hopes to make administrating a comprehensive firewall easier, as well as offering robust protection.

Changes: Various typo fixes, an option to drop traceroutes, a safety option to ensure remote X connections are dropped, various ip_masq_mod tweaks, fixes for POP3 errors, fixes for incorrect cable DHCP port designations, and readdition of various winclient trojan protection.
tags | tool, firewall
systems | linux, bsd
MD5 | ecf13699acd6294f892f3611b696e5a6
kmap-0.7.tar.gz
Posted Jan 10, 2000
Authored by Ian Zepp | Site islc.net

Kmap is a QT/KDE front-end to nmap, a popular and powerful console portscanner. Kmap allows quick and easy access to all of nmap's features, with much less hassle. Kmap also sorts the output from nmap into usable sections, so you easily extract the information you want.

Changes: Fixed install problem.
tags | tool, nmap
systems | unix
MD5 | cc5b110bb2f01ddcea8d742e48ea617b
debian.nvi.txt
Posted Jan 10, 2000

The version of nvi that was distributed with Debian GNU/Linux 2.1 has an error in the default /etc/init.d/nviboot script: it did not handle filenames with embedded spaces correctly. This made it possible to remove files in the root directory by creating entries in /var/tmp/vi.recover. Debian security homepage here.

tags | root
systems | linux, debian
MD5 | 0b662942567330520d0aa2f42d879dc5
OPCODE_OUTPUT.zip
Posted Jan 10, 2000
Authored by Jason | Site technotronic.com

When you write buffer overflows you need to put the opcodes, not the actual assembly in the script, or file or whatever. This program allows you to insert the assembly into the program, and then it outputs it to a text file in string format so you can put it directly into a char buffer in a C\C++ program.

tags | overflow
MD5 | 7ad978064a420630065e5535d5235cd1
ethereal-0.8.1.tar.gz
Posted Jan 10, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: This release fixes a lot of bugs that crept into the 0.8.0 release, and provides a workaround for problems when capturing with libpcap from RedHat 6.1 (and perhaps some other recent libpcaps). Some new GUI and printing options are avialable, plugin settings can now be saved, and an L2TP decoder has been added.
tags | tool, sniffer, protocol
systems | unix
MD5 | 9471bd27d91844a2c84d01c2fcffaecc
netraider0.0.zip
Posted Jan 10, 2000
Authored by Spirit | Site s0ftpj.org

NetRaider - Remote W9x/2000 Administration Tool. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
MD5 | b82fda700382dd5bde650cf8e7c8fa31
gccsploit.c
Posted Jan 10, 2000
Authored by s0ftpj, Pigpen

Gcc 2.7.2.x Exploit - C version.

MD5 | 395f6c317c136c1b5f7cb3ffb86ef9c5
spooflkm.tgz
Posted Jan 10, 2000
Authored by s0ftpj, Pigpen

LKMs to forge and detect spoofed packets on your host.

tags | spoof
MD5 | b25e48e7fbb54d0e652e5d6a195256d2
icmp_tunnel.h
Posted Jan 10, 2000
Authored by Dark Schneider

Covert Tunnelling in ICMP 0x00 ECHO REPLY messages for Windows.

systems | windows
MD5 | b13a7e398e176106aec24e9a357ab0fe
debian.lpr.txt
Posted Jan 10, 2000

The version of lpr that was distributed with Debian GNU/Linux 2.1 and the updated version released in 2.1r4 have a two security problems - Local users can obtain root access and remote users can access the print server. Debian security homepage here.

tags | remote, local, root
systems | linux, debian
MD5 | 4598f33acb97daed298ecb9e2d609df5
winamprev.txt
Posted Jan 10, 2000
Authored by s0ftpj, Ma

Reverse Engineering Winamp - How to modify windows binaries to do anything you want. Uses reverse engineering winamp to read encrypted mp3's as an example.

systems | windows
MD5 | f65cde0aaeb92ce80dd3d8de362d8546
msadc-trojan.pl
Posted Jan 10, 2000
Authored by r00tabega, Bansh33 | Site r00tabega.com

This script will upload a trojan to an RDS vulnerable site running NT and execute the trojan.

tags | exploit, trojan
MD5 | 1129f4d3059d43ccd3b5f9e04b2f031b
ovas0n.c
Posted Jan 10, 2000
Authored by misteri0

Opens a password protected backdoor and lets you execute commands, and then hides in the background. Based on gs.c.

tags | tool, rootkit
systems | unix
MD5 | 43ff0cfc1b7dce9d3e4729fe7d1659a3
HPSBUX0001-108.txt
Posted Jan 10, 2000

HPSBUX0001-108.txt

MD5 | 7439e2136f2420f027271b5303ecdddb
HPSBUX0001-109.txt
Posted Jan 10, 2000

The Audio Security File is world writable on HP9000 Series 7/800 running HP-UX releases 10.X and 11.X. Denial of service, increase in capabilities possable.

tags | denial of service
systems | hpux
MD5 | 4a8b63715e3703a5a518118fc4d9230d
Page 1 of 20
Back12345Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    1 Files
  • 25
    Oct 25th
    1 Files
  • 26
    Oct 26th
    17 Files
  • 27
    Oct 27th
    19 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close