exploit the possibilities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2000-01-21

Posted Jan 21, 2000
Authored by Gerard Paul Java

IPTraf 2.1.1 is an ncurses-based IP LAN monitor that generates various network statistics including TCP info, UDP counts, ICMP and OSPF information, Ethernet load info, node stats, IP checksum errors, and others.

Changes: This is a maintenance release fixing a small bug in the packet size breakdown facility resulting in inaccurate counts, and some typographical cleanup.
tags | tool, udp, sniffer, tcp
MD5 | 2b3e47c3826403c9d8a006a829d78a73
Posted Jan 21, 2000
Authored by Dark Spyrit, NedoDarkseed

Utility to send a trojan to any unpatched IIS 4.0 system by exploiting a buffer overflow. (Without SP6). Archive password is set to p4ssw0rd. Use at your own risk.

tags | overflow, trojan
MD5 | 0d5ad1a4e58c9d901f2e96ace9bcbf53
Posted Jan 21, 2000
Site oliver.efri.hr

If you're running BIND 8.2.2, and you have the victim.dom name servers in your cache, and victim.dom changes its server names, then any user who can make recursive queries through your cache can break your victim.dom lookups until the old records time out. The complete attack is one brief burst of legitimate packets. This is, of course, not as disastrous as BIND's next buffer overflow, but it's still an interesting example of how an attacker can use BIND's bogus "credibility" mechanism to exacerbate the effects of a seemingly minor bug.

tags | exploit, overflow
MD5 | a446133c2e1c21a5ae719d9a14a6e07d
Posted Jan 21, 2000
Site oliver.efri.hr

OS tested was Windows 2000 and ICQ v99b ICQ is a very popular chat client that is affected by a exploitable buffer overflow when it parses an URL sent by another user. What this means is that arbitary assembly code can be run on the remote machine.

tags | exploit, remote, overflow
systems | windows, 2k
MD5 | 9998385f5f48e4537086965b5792b345
Posted Jan 21, 2000
Site oliver.efri.hr

orel Linux comes with a program called "Corel Update" to manage the ".deb" files. This X oriented program is setuid root. The program is "get_it" and it's located in the /usr/X11R6/bin directory. If you can run it, it's easy to get root privileges in your system.

tags | exploit, root
systems | linux
MD5 | 66b2d0f2969de53239c47de95ee7eebb
Posted Jan 21, 2000
Authored by Omachonu Ogali | Site tribune.intranova.net

Patch to sh(1) that adds denying and logging features (user ID, username, process ID, parent process ID, parent process name, login name). Checks against /etc/sh.deny and if the parent/calling program is listed then execution is halted and logged.

systems | unix
MD5 | 7a86e69eb161d68e9db98b7e90b253de
Posted Jan 21, 2000
Authored by Michal Zalewski

nsuncat 0.01b - Unix socket connectivity from the command line. (works just like netcat for tcp/udp sockets)

tags | tool, udp, tcp
systems | unix
MD5 | 1a3c5631f2d2c7972fe6a722647fd070
Posted Jan 21, 2000
Authored by Carcin0gen | Site carcin0gen.gq.nu

Dust v0.2 is a shell script which runs 22 DoS attacks discovered in 1999. Linux only.

tags | denial of service, shell
systems | linux
MD5 | cdf6f7d798ffe3de01511f2004ecc70c
Posted Jan 21, 2000
Authored by Karellen | Site members.xoom.com

Pretty Simple Password Generator (PSPG) is a small and fast password generator for creating secure, non-pronounceable passwords which are harder to break.

Changes: This release features code modularization, documentation updates and a ChangeLog.
systems | unix
MD5 | 47295c2ba8f2cd6065c43de91619357a
Posted Jan 21, 2000
Authored by Jon Rifkin | Site sp.uconn.edu

ipaudit records network activity. It stores a count of bytes and packets exchanged for every combination of host/port pairs and protocol. It can be signalled after a fixed interval (30 minutes is typical) to output results. It's useful for identifying heavy bandwidth users, intrusive telnet sessions, denial of service attacks, scans, etc. There is also an option (like tcpdump) to save raw packet headers for detailed analysis with packages such as tcpdump or ethereal.

Changes: Bug fixes.
tags | tool, denial of service, sniffer, protocol
MD5 | 1b6e0f119dba3af6941e415ee65db0d9
Posted Jan 21, 2000
Authored by Jon Squire

Packet Storm Contest Entry - GNIDS - Early Detection of Unknown Threats.

tags | paper
MD5 | 79011b6fce11f90158b30c8ca225a13c
Posted Jan 21, 2000
Authored by Mixter, 000 Prize Winner!

Winning Packet Storm Contest Entry - Protecting Against the Unknown - A guide to improving network security to protect the Internet against future forms of security hazards.

tags | paper
MD5 | 9ff71c96465e14c7f78bece493946eb1
Posted Jan 21, 2000
Authored by rain forest puppy, NightAxis

Packet Storm Contest Entry - Purgatory 101: Learning to cope with the SYNs of the Internet.

tags | paper
MD5 | 14348b374f59c15e3271189eba68ff75
Posted Jan 21, 2000
Authored by Richard Kay

Packet Storm Contest Entry - What pure or applied technical measures can be taken to protect the Internet against future forms of attack?

tags | paper
MD5 | 0a7c8831b4d00fff30158b9226120a49
Posted Jan 21, 2000
Authored by Simple Nomad

Packet Storm Contest Entry - Strategies for Defeating Distributed Attacks.

tags | paper
MD5 | 234c8cd4cd88e8f102eb20c093490d72
Posted Jan 21, 2000
Authored by Tim Yardley

Packet Storm Contest Entry - Distributed Attacks and the Way To Deal With Them.

tags | paper
MD5 | 0bf3d0772d84441d6040d9176075e2ff
Posted Jan 21, 2000
Authored by Martin Roesch | Site clark.net

PowerPoint presentation on Snort - Lightweight Intrusion Detection for Networks.

tags | paper
MD5 | 6a73f235695b70f58a92193d5dbbf555
Page 1 of 1

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By