what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 477 RSS Feed

Files Date: 2000-01-10

pru.c
Posted Jan 10, 2000
Authored by Amir, Pisang

Clone.c mutation - Clonebot IRC war script.

tags | denial of service
SHA-256 | aaa31957a35cc46bb46b173b0eff597201a4590d2decf46f8351852f60114306
nt.security.update.011000.txt
Posted Jan 10, 2000
Authored by winsd

Windows NT security update - Georgio Guninski discovered a problem with Internet Explorer that may allow the circumvention of the browser's domain security. Microsoft is aware of the issue, however no response was known at the time of this writing. Details here.

tags | magazine
systems | windows
SHA-256 | 3d8453baf779aa48a54279be429ddc72af319e8be0ef01cc23d83f7fbab12591
skrypt.sh
Posted Jan 10, 2000

Wu-ftpd 2.4 remote root exploit for SuSE. Tested on SuSE 6.0 running Wu-ftpd 2.4.2-beta18.

tags | exploit, remote, root
systems | linux, suse
SHA-256 | 862433a85c3fe8dac027facc9893261265443d119f46a08313455648da4c343a
gh-plus.c
Posted Jan 10, 2000
Authored by Ytcracker

Remote exploit for PowerScripts PlusMail (all versions to current). Plusmail is an extremely popular cgi-based administration tool that allows you to remotely administer your website with a graphical control panel interface. The password file, however, is set with permissions rw enabled. All platforms are affected.

tags | exploit, remote, cgi
SHA-256 | 3a4c5c187df76131d4ae05c24665c8c7ee7290abe354df60a05f00210e06f59c
fake_freeav.zip
Posted Jan 10, 2000
Authored by Icer | Site ic3d.tsx.org

This program is a fake logon screen for Altavista's Free Internet Service (FreeAV). It automaticly logs the password and username and date in a log file. Screenshot here. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | 073be178a4d39072eea70fa81cbf4575c56001c8472fc66a1f820836fa33b57e
rhsa.2000-001-03.userhelper
Posted Jan 10, 2000

A security bug was found in userhelper; the bug can be exploited to provide local users with root access.

tags | local, root
systems | linux, redhat
SHA-256 | fc3a85f9ccd212e3b0bcadc3eaae214af2b8f7c2b9310450a380508e3ed8aca2
rhsa.2000-002-01.lpr
Posted Jan 10, 2000

Two security vulnerabilities exist in the lpd (line printer daemon) shipped with the lpr package. First, authentication was not thorough enough. If a remote user was able to control their own DNS so that their IP address resolved to the hostname of the print server, access would be granted, when it should not be. Secondly, it was possible in the control file of a print job to specify arguments to sendmail. Through careful manipulation of control and data files, this could cause sendmail to be executed with a user-specified configuration file. This could lead very easily to a root compromise.

tags | remote, root, vulnerability
systems | linux, redhat
SHA-256 | 56b741d61ee2576a5d24470f80029e501accafe37d6d997f5fa992cf0d973d00
floppyfw-1.0.1.img
Posted Jan 10, 2000
Authored by Thomas Lundquist | Site zelow.no

floppyfw is a router and simple firewall on one single floppy. It uses Linux basic firewall capabilities and have a very simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It has a simple installation, mostly only needed to edit one file on the floppy.

tags | tool, firewall
systems | linux
SHA-256 | 3bfa89b8fab1ead497e119f9cc1b129783e0c86f449a72c0ac952df65a4a9f6d
netfilter-0.1.15.tar.bz2
Posted Jan 10, 2000
Authored by Rusty Russell | Site samba.org

netfilter is a framework for arbitrary packet mangling. So far, a new NAT system and packet-filtering system have been built on top of it, as well as compatibility modules for ipfwadm and ipchains. Netfilter is a work-in-progress, but should be fairly robust for non-exotic work.

Changes: Support for kernel 2.3.38, and accumulated fixes.
tags | tool, arbitrary, firewall
systems | linux
SHA-256 | 5c408a9ccdfb46e1d8fa414673cca5538332fbf428a258088e7938ed700858a9
checksums-1.0.tar.gz
Posted Jan 10, 2000
Authored by Mike

Checksums takes a file of predetermined MD5 checksums and compares with the current sum. It can be installed as a command line tool, or as a CGI which will allow you to upload the sums file remotely. In either case it is a useful tool to detect changes in your system files, such as a trojan.

tags | tool, cgi, trojan, intrusion detection
systems | unix
SHA-256 | 96a42c4516d93a85f9e64561995083aa0404bd3dd489339bcc99aca203398fbe
gShield-1.3.tgz
Posted Jan 10, 2000
Authored by R. Gregory | Site linuxmafia.org

gShield (formerly Godot's Modified Modular Firewall), is an aggressive, modular, ipchains-based firewall script. Features include: easy configuration through a BSD-style configuration file, optional IPmasq support, TCPwrapper-like funtionality for service access, and extremely restrictive defaults. It hopes to make administrating a comprehensive firewall easier, as well as offering robust protection.

Changes: Various typo fixes, an option to drop traceroutes, a safety option to ensure remote X connections are dropped, various ip_masq_mod tweaks, fixes for POP3 errors, fixes for incorrect cable DHCP port designations, and readdition of various winclient trojan protection.
tags | tool, firewall
systems | linux, bsd
SHA-256 | 2b2b2f05385266ea208312a5a7ef5622705f625a29c02d2dc8a2f145be1702a1
kmap-0.7.tar.gz
Posted Jan 10, 2000
Authored by Ian Zepp | Site islc.net

Kmap is a QT/KDE front-end to nmap, a popular and powerful console portscanner. Kmap allows quick and easy access to all of nmap's features, with much less hassle. Kmap also sorts the output from nmap into usable sections, so you easily extract the information you want.

Changes: Fixed install problem.
tags | tool, nmap
systems | unix
SHA-256 | de9be336a87deb7dc42bf57855679326caf55bfe92d50ce1ccbc0986d25c4f20
debian.nvi.txt
Posted Jan 10, 2000

The version of nvi that was distributed with Debian GNU/Linux 2.1 has an error in the default /etc/init.d/nviboot script: it did not handle filenames with embedded spaces correctly. This made it possible to remove files in the root directory by creating entries in /var/tmp/vi.recover. Debian security homepage here.

tags | root
systems | linux, debian
SHA-256 | 6d4d0a9f29c0d75e85c71619ed6c28d2c170f546ad98962ee9eee00a03583594
OPCODE_OUTPUT.zip
Posted Jan 10, 2000
Authored by Jason | Site technotronic.com

When you write buffer overflows you need to put the opcodes, not the actual assembly in the script, or file or whatever. This program allows you to insert the assembly into the program, and then it outputs it to a text file in string format so you can put it directly into a char buffer in a C\C++ program.

tags | overflow
SHA-256 | ee23bb2efd95ce84c852fdf6822d8cf9332d4492a2ce0ee628408c5fd17e3726
ethereal-0.8.1.tar.gz
Posted Jan 10, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: This release fixes a lot of bugs that crept into the 0.8.0 release, and provides a workaround for problems when capturing with libpcap from RedHat 6.1 (and perhaps some other recent libpcaps). Some new GUI and printing options are avialable, plugin settings can now be saved, and an L2TP decoder has been added.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 0eedca5debe6af6a5af845337e86808bb47200e01fa50d69a0c58f3e3d9b74ba
netraider0.0.zip
Posted Jan 10, 2000
Authored by Spirit | Site s0ftpj.org

NetRaider - Remote W9x/2000 Administration Tool. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
SHA-256 | e379315a4b8a5841d6ef735084a467af6ec33712111b63d7ade2831308b070da
gccsploit.c
Posted Jan 10, 2000
Authored by s0ftpj, Pigpen

Gcc 2.7.2.x Exploit - C version.

SHA-256 | 867a0fdc26a013485e3d1f9f158a953de2b5612c8ef8f16856d92774668eb453
spooflkm.tgz
Posted Jan 10, 2000
Authored by s0ftpj, Pigpen

LKMs to forge and detect spoofed packets on your host.

tags | spoof
SHA-256 | 63eeed4aae44fadc07265a1c0556b5a934b034ff55fa486354a70e0a716427c9
icmp_tunnel.h
Posted Jan 10, 2000
Authored by Dark Schneider

Covert Tunnelling in ICMP 0x00 ECHO REPLY messages for Windows.

systems | windows
SHA-256 | 4262694dbb61e796e99741c6d41e263dbe37a5eee399e98fdd70e9d047dc32cc
debian.lpr.txt
Posted Jan 10, 2000

The version of lpr that was distributed with Debian GNU/Linux 2.1 and the updated version released in 2.1r4 have a two security problems - Local users can obtain root access and remote users can access the print server. Debian security homepage here.

tags | remote, local, root
systems | linux, debian
SHA-256 | 76f28548f53eab0c17b0e5cb003d08d19470656cb9af609506e56f57b0c25ed8
winamprev.txt
Posted Jan 10, 2000
Authored by s0ftpj, Ma

Reverse Engineering Winamp - How to modify windows binaries to do anything you want. Uses reverse engineering winamp to read encrypted mp3's as an example.

systems | windows
SHA-256 | b205c7aa737490b5282634163d7d5c96864e4fc24cac7d39c30de010ec9c410e
msadc-trojan.pl
Posted Jan 10, 2000
Authored by r00tabega, Bansh33 | Site r00tabega.com

This script will upload a trojan to an RDS vulnerable site running NT and execute the trojan.

tags | exploit, trojan
SHA-256 | 103493a4c6051cab304f220b22274a4ca432f01306d62d03af4825d7c7bf7105
ovas0n.c
Posted Jan 10, 2000
Authored by misteri0

Opens a password protected backdoor and lets you execute commands, and then hides in the background. Based on gs.c.

tags | tool, rootkit
systems | unix
SHA-256 | 118f42a1b5e7124b4e829331a89a5b9f25e3c7b3cc532e337fd5d7b50f328bc9
HPSBUX0001-108.txt
Posted Jan 10, 2000

HPSBUX0001-108.txt

SHA-256 | 7e0972b43759005224b7400e4fe364e662a155b0eb2f90c90a42b372f8cd141e
HPSBUX0001-109.txt
Posted Jan 10, 2000

The Audio Security File is world writable on HP9000 Series 7/800 running HP-UX releases 10.X and 11.X. Denial of service, increase in capabilities possable.

tags | denial of service
systems | hpux
SHA-256 | 40cdf8e217100d575b7d1230b20a876d147c01cfb06025595a9f49baf3429cce
Page 1 of 20
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close