exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2000-01-12

httptunnel-3.0.tar.gz
Posted Jan 12, 2000
Authored by Lars Brinhoff | Site nocrew.org

httptunnel creates a bidirectional data channel through an HTTP proxy, from your isolated computer behind a restrictive firewall, to a system on the Internet you have access to.

Changes: Bugfixes and improved stability, Debianization, compatibility with Universal TUN driver, and many new options for improved operation.
tags | web
systems | unix
SHA-256 | 1c8e33af1950332160d20ce3202f2afe131eb1b111d425336bc159469cf9e691
SRS.tgz
Posted Jan 12, 2000
Authored by Matt Conover | Site w00w00.org

SRS is the largest syslog implementation for Unix (or any operating system). It has its own original protocol to ensure reliability.

tags | system logging, protocol
systems | unix
SHA-256 | 0fd0e6892167da1e606927d561a9e887736528832ccc7edaad63a0f88a3d3fc8
nt.security.update.011200.txt
Posted Jan 12, 2000
Authored by winsd

Windows NT Magazene Security Update - Contains information on Internet Explorer Allowing Circumvention of Domain Security, IMail IMonitor DoS, MCIS IMAP Buffer Overflow, NetSec 2000, Email Security, and Embedded NT Firewalls. NTsecurity homepage here.

tags | overflow, imap, magazine
systems | windows
SHA-256 | e10826cc45c3d2cc4e9fa262b9b5a88a4d1946983aa4f83b92098b3e7afbeaf3
mfsetup.zip
Posted Jan 12, 2000
Authored by Movax4c00int21h | Site geocities.com

Modem Finder v2.0b84 is a Windows based wardialer.

Changes: Added error correction to prevent crashes from opening comm port, fixed problem with not being able to set comm port or dialing method in options menu.
systems | windows
SHA-256 | dcd35ce35e365f721fc3b3cc9ae2e091c967d90a501933ba22333546a8abc571
cssetup.zip
Posted Jan 12, 2000
Authored by Movax4c00int21h | Site geocities.com

Cisco Scanner for Windows v1.02. Cisco Scanner will scan a range of IP address for Cisco routers that havn't changed their default password of "cisco".

Changes: Added extra code to verify that verify that the server being scanned is a valid Cisco router.
systems | cisco, windows
SHA-256 | 28e910c326f6bd4e48bdbfc05087e4972613986077d569841e803fabceb15ad6
qib.tgz
Posted Jan 12, 2000
Authored by Dildog

QIB - Remote access through Linux LPD. Binds a shell to port 26092.

tags | exploit, remote, shell
systems | linux
SHA-256 | 97afaabada366abf97982811fdd724de55e48453cce1302244854e8ba62fadfc
mysql.grant.txt
Posted Jan 12, 2000
Authored by Viktor Fougstedt | Site dtek.chalmers.se

Anyone with access to a running MySQL and GRANT privilege for any database or table in it, can change any MySQL-password he wishes, including the MySQL superusers. This makes all default-configured MySQL very vulnerable.

tags | exploit
SHA-256 | e35a0dceadc9e253ba3e40f84739ccab2b43de064f7db17e121ef8cc5029f754
altavista.txt
Posted Jan 12, 2000
Authored by RC

Exploit information for the recent bugs in the Altavista Search Engine to read any file on the system.

tags | exploit
SHA-256 | 31947cb85d87ea62e83e870b5086f47b97bbc339e314a15df7b3eb2b2b1af1f4
hotmail.java.txt
Posted Jan 12, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #5 - Yet another Hotmail security hole. Hotmail allows executing JavaScript code in email messages using vascript, which may compromise user's Hotmail mailbox when viewed with Internet Explorer. Includes exploit code.

tags | exploit, javascript
SHA-256 | 65fdac7706125ec8e60e80805e2a38b4ad6098e748b5365f66c120c827d08596
l0pht.00-01-08.lpd
Posted Jan 12, 2000
Authored by Dildog

L0pht Advisory - A remote user can execute arbitrary code on a properly configured Linux LPD server.

tags | remote, arbitrary
systems | linux
SHA-256 | 09a305e3e24195a53ab09f9a992de2f278d9d4743d6570f174bdd602e7df59f1
httptype.1.2.1.tar.gz
Posted Jan 12, 2000
Authored by Philip Tellis | Site sourceforge.net

httptype reads a list of http hosts and optionally the port number for each of these. It queries each host, displaying the type of HTTP server running on that host, if any. It reads the http_proxy and no_proxy environment variables to determine whether to use a proxy or not. These options may also be specified through the command line.

Changes: A fix for a minor bug that caused display of uninitialised variable if the no_proxy environment variable was not set, and all proxy support from the development version has been incorporated into the stable version.
tags | web
SHA-256 | a8721faf825430542fd67b9287e29124b45f981cd5ed7cf1d91e56f17dd31415
netfilter-0.1.16.tar.bz2
Posted Jan 12, 2000
Authored by Rusty Russell | Site antarctica.penguincomputing.com

netfilter is a framework for arbitrary packet mangling. So far, a new NAT system and packet-filtering system have been built on top of it, as well as compatibility modules for ipfwadm and ipchains. Netfilter is a work-in-progress, but should be fairly robust for non-exotic work.

Changes: Fixes for connection tracking panic on <=64MB machines.
tags | tool, arbitrary, firewall
systems | linux
SHA-256 | f78a3f2078400db7d7f6f152a8f6801bf578926487e20d5a8175c31c7af57d57
ipaudit-0.91.tgz
Posted Jan 12, 2000
Authored by Jon Rifkin | Site sp.uconn.edu

Ipaudit records network activity. It stores a count of bytes and packets exchanged for every combination of host/port pairs and protocol. It can be signalled after a fixed interval (30 minutes is typical) to output results. It's useful for identifying heavy bandwidth users, intrusive telnet sessions, denial of service attacks, scans, etc. There is also an option (like tcpdump) to save raw packet headers for detailed analysis with packages such as tcpdump or ethereal.

Changes: Time fields added to output, minor bug fix.
tags | tool, denial of service, sniffer, protocol
SHA-256 | 69cf1c9bb497338ecc4bdefd8e61e7e4441fbae7beb1a2fc493764ca62c31abe
printsux.c
Posted Jan 12, 2000
Authored by s0ftpj, Pigpen

This src grabs documents printed on a network printer installed with lpd by sniffing it from the network.

SHA-256 | fdd3a4da4b6c7e5bdabff5d056a2cdc6624bc2137b16ee1f75f434459fc2b500
gork-2.0b.c
Posted Jan 12, 2000
Authored by s0ftpj, Pigpen

Gork is a tcp/udp/icmp/ip dumper with options to log only packets from/to specific machine/s in a file. This version supports pcap library. Tested on Redhat, Debian, and FreeBSD.

Changes: Bug fixes.
tags | udp, tcp
systems | linux, redhat, freebsd, debian
SHA-256 | 5888b46530d4848b2f9113d552f2992a3955bbb3340fd1f234250f1690ffc7f1
vetescan-01-12-2000.tar.gz
Posted Jan 12, 2000
Authored by Vetesgirl | Site self-evident.com

VeteScan is a bulk vunerability scanner containing programs to scan Windows NT and UNIX systems for the latest trojans/remote exploits, a scanner for the vulnerabilities of single hosts (with or without host checking), a tool for scanning multiple hosts, a scanner for class A/B/C networks, and fixes for various vulnerablities.

Changes: Only shows vulnerabilities now, added Patch: and Exploit to logging so it will tell you where to get patch and/or sploit for the paticular vulnerability. Added lpd scan.
tags | tool, remote, scanner, trojan, vulnerability
systems | windows, unix
SHA-256 | 9271d6e3afb250451e53ecac981efb95ebf6df94bb39629eb4fa170ff929d58a
vetesTCL-01-12-2000.tar.gz
Posted Jan 12, 2000
Authored by Vetesgirl | Site self-evident.com

The Vetestcl package contains various TCL scripts with the same functionality found in the VeteScan package. You can load the scripts within an Eggdrop bot to make sure none of your channel operators or hosts running IRC bots suffers from security vulnerabilities present in the operating system or user space applications.

tags | tool, scanner, vulnerability
systems | unix
SHA-256 | aa465ba5a2ef8425aa485bee8ee8a1d3b9ba82e52d60b16747d932e435abaa6d
vetesBX-01-12-2000.tar.gz
Posted Jan 12, 2000
Authored by Vetesgirl | Site self-evident.com

Vetes.bx is a remote vulnerability scanner for the BitchX irc client. Includes scans for rpc services, bind version, and windows trojans.

tags | tool, remote, scanner, trojan
systems | windows, unix
SHA-256 | 6db57558a65908b41a01699de53006aca14a19f88876559ca422ca4036c196c5
mem-crash.c
Posted Jan 12, 2000
Authored by Talla | Site etc-crew.org

Uses malloc to tie up all available memory, crashing a RH 6.1 box w/ 64 MB ram in 10 seconds.

tags | denial of service
SHA-256 | 7662e1284064f4cf86581211e7d2046926fd04a8256274c31e34a8fa0cafc586
Secure-Programs-HOWTO.htm
Posted Jan 12, 2000
Authored by David A. Wheeler

Secure Programming Howto - This paper provides a set of design and implementation guidelines for writing secure programs for Linux systems. Such programs include application programs used as viewers of remote data, CGI scripts, network servers, and setuid/setgid programs.

tags | paper, remote, cgi
systems | linux
SHA-256 | b065896ba58bc640450fba80726f03db71475b8ff5923da0350cfc11dc22dd3e
inet-palm.zip
Posted Jan 12, 2000
Authored by Gothstain, InET

InET Magazene in Palm Pilot format. (Issues 1 through 4) In Spanish.

tags | magazine
SHA-256 | 91c8e70195a81064e137762a503d9d143cd42f5ed93d440afa0eed2eec942f79
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close