exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-01-13

psftp-0.21.full.tar.gz
Posted Jan 13, 2000
Authored by Nadeem Riaz | Site nut.dhs.org

Psftp is an FTP client that uses ssh 1.x as its backend. Thus, all file transfers and communications using it are encyrpted and secure. It provides a command-line FTP interface on top of scp and ssh.

Changes: Use of Perl's except module so a patched version of ssh is no longer required, background file transfers, and misc. bug fixes.
tags | encryption
SHA-256 | 81b89ea67f35c3562182472c56a079e148ff73cbe1506c8c32ec0aeffae205b0
supermail.nt.txt
Posted Jan 13, 2000
Authored by Underground Security Systems Research

A memory leak exists in the Super Mail Transfer Package for Windows NT that may cause an NT host to stop functioning and/or need to be rebooted. DoS exploit description included.

tags | exploit, memory leak
systems | windows
SHA-256 | a01aab1ae7b5840b51fcf1072d89ef3b4fcf4c3f873d2009fc282fd6014ac277
funtimeApocalypseWin.zip
Posted Jan 13, 2000
Authored by The Pull

Dynamic IP's getting you down in your search for a better distributed attack? Don't think remote control, think "timed fuse". This is "concept code" designed to show the real danger of Windows systems being rooted en masse and used in a distributed attack scenario. Beta, no updates.

tags | remote, denial of service, root
systems | windows
SHA-256 | 47b7b9425f345b3e44df92110523db5ef1c8d97bc214f34c26dfcce4faf60822
find_ddos_v3_intel.tar.z
Posted Jan 13, 2000
Site fbi.gov

Find_ddos Version 3 (intel) - In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the NPIC has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The tool will detect several known denial-of-service attack tools.

Changes: Detects tfn2k client, tfn2k daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht master, stacheldraht client, stachelddraht demon and tfn-rush client. This new version (find_ddosV3) is now available for Solaris on Sparc or Intel platforms and will no longer improperly identify itself or any previous version as a DDOS program.
tags | denial of service, local
systems | solaris
SHA-256 | bc3fb651da42532108a4c8d7143c545f9a00ba72280365382af457c3e7408c08
find_ddos_v3_sparc.tar.z
Posted Jan 13, 2000
Site fbi.gov

Find_ddos Version 3 (sparc) - In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the NPIC has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The tool will detect several known denial-of-service attack tools.

Changes: Detects tfn2k client, tfn2k daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht master, stacheldraht client, stachelddraht demon and tfn-rush client. This new version (find_ddosV3) is now available for Solaris on Sparc or Intel platforms and will no longer improperly identify itself or any previous version as a DDOS program.
tags | denial of service, local
systems | solaris
SHA-256 | b1c3ccd8b59083c3c23809a68a3279286db3304fc76364c7dd89035c4c650f29
iplogled001.tar.gz
Posted Jan 13, 2000
Authored by Wh01X DuMP | Site web.interpuntonet.it

IPlogLED is a logger for IP packets via keyboard LEDs. It logs ICMP, UDP, and TCP connections.

tags | udp, tcp, system logging
systems | unix
SHA-256 | 28f819eccec69a2ef22bb1045074c09305b95580da3ebcffcdc0802f498e6c82
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close