accept no compromises
Showing 1 - 17 of 17 RSS Feed

Files Date: 2000-01-21

iptraf-2.1.1.tar.gz
Posted Jan 21, 2000
Authored by Gerard Paul Java

IPTraf 2.1.1 is an ncurses-based IP LAN monitor that generates various network statistics including TCP info, UDP counts, ICMP and OSPF information, Ethernet load info, node stats, IP checksum errors, and others.

Changes: This is a maintenance release fixing a small bug in the packet size breakdown facility resulting in inaccurate counts, and some typographical cleanup.
tags | tool, udp, sniffer, tcp
MD5 | 2b3e47c3826403c9d8a006a829d78a73
Hackyou.tgz
Posted Jan 21, 2000
Authored by Dark Spyrit, NedoDarkseed

Utility to send a trojan to any unpatched IIS 4.0 system by exploiting a buffer overflow. (Without SP6). Archive password is set to p4ssw0rd. Use at your own risk.

tags | overflow, trojan
MD5 | 0d5ad1a4e58c9d901f2e96ace9bcbf53
bind15.htm
Posted Jan 21, 2000
Site oliver.efri.hr

If you're running BIND 8.2.2, and you have the victim.dom name servers in your cache, and victim.dom changes its server names, then any user who can make recursive queries through your cache can break your victim.dom lookups until the old records time out. The complete attack is one brief burst of legitimate packets. This is, of course, not as disastrous as BIND's next buffer overflow, but it's still an interesting example of how an attacker can use BIND's bogus "credibility" mechanism to exacerbate the effects of a seemingly minor bug.

tags | exploit, overflow
MD5 | a446133c2e1c21a5ae719d9a14a6e07d
icq11.htm
Posted Jan 21, 2000
Site oliver.efri.hr

OS tested was Windows 2000 and ICQ v99b 1.1.1.1. ICQ is a very popular chat client that is affected by a exploitable buffer overflow when it parses an URL sent by another user. What this means is that arbitary assembly code can be run on the remote machine.

tags | exploit, remote, overflow
systems | windows, 2k
MD5 | 9998385f5f48e4537086965b5792b345
update.htm
Posted Jan 21, 2000
Site oliver.efri.hr

orel Linux comes with a program called "Corel Update" to manage the ".deb" files. This X oriented program is setuid root. The program is "get_it" and it's located in the /usr/X11R6/bin directory. If you can run it, it's easy to get root privileges in your system.

tags | exploit, root
systems | linux
MD5 | 66b2d0f2969de53239c47de95ee7eebb
sh-log+access.patch
Posted Jan 21, 2000
Authored by Omachonu Ogali | Site tribune.intranova.net

Patch to sh(1) that adds denying and logging features (user ID, username, process ID, parent process ID, parent process name, login name). Checks against /etc/sh.deny and if the parent/calling program is listed then execution is halted and logged.

systems | unix
MD5 | 7a86e69eb161d68e9db98b7e90b253de
uc.c
Posted Jan 21, 2000
Authored by Michal Zalewski

nsuncat 0.01b - Unix socket connectivity from the command line. (works just like netcat for tcp/udp sockets)

tags | tool, udp, tcp
systems | unix
MD5 | 1a3c5631f2d2c7972fe6a722647fd070
dust-0.2.tgz
Posted Jan 21, 2000
Authored by Carcin0gen | Site carcin0gen.gq.nu

Dust v0.2 is a shell script which runs 22 DoS attacks discovered in 1999. Linux only.

tags | denial of service, shell
systems | linux
MD5 | cdf6f7d798ffe3de01511f2004ecc70c
pspg-1.0.2.tar.gz
Posted Jan 21, 2000
Authored by Karellen | Site members.xoom.com

Pretty Simple Password Generator (PSPG) is a small and fast password generator for creating secure, non-pronounceable passwords which are harder to break.

Changes: This release features code modularization, documentation updates and a ChangeLog.
systems | unix
MD5 | 47295c2ba8f2cd6065c43de91619357a
ipaudit-0.91.1.tgz
Posted Jan 21, 2000
Authored by Jon Rifkin | Site sp.uconn.edu

ipaudit records network activity. It stores a count of bytes and packets exchanged for every combination of host/port pairs and protocol. It can be signalled after a fixed interval (30 minutes is typical) to output results. It's useful for identifying heavy bandwidth users, intrusive telnet sessions, denial of service attacks, scans, etc. There is also an option (like tcpdump) to save raw packet headers for detailed analysis with packages such as tcpdump or ethereal.

Changes: Bug fixes.
tags | tool, denial of service, sniffer, protocol
MD5 | 1b6e0f119dba3af6941e415ee65db0d9
Jon_Squire.doc
Posted Jan 21, 2000
Authored by Jon Squire

Packet Storm Contest Entry - GNIDS - Early Detection of Unknown Threats.

tags | paper
MD5 | 79011b6fce11f90158b30c8ca225a13c
Mixter.doc
Posted Jan 21, 2000
Authored by Mixter, 000 Prize Winner!

Winning Packet Storm Contest Entry - Protecting Against the Unknown - A guide to improving network security to protect the Internet against future forms of security hazards.

tags | paper
MD5 | 9ff71c96465e14c7f78bece493946eb1
RFP.doc
Posted Jan 21, 2000
Authored by rain forest puppy, NightAxis

Packet Storm Contest Entry - Purgatory 101: Learning to cope with the SYNs of the Internet.

tags | paper
MD5 | 14348b374f59c15e3271189eba68ff75
Richard_Kay.doc
Posted Jan 21, 2000
Authored by Richard Kay

Packet Storm Contest Entry - What pure or applied technical measures can be taken to protect the Internet against future forms of attack?

tags | paper
MD5 | 0a7c8831b4d00fff30158b9226120a49
Simple_Nomad.doc
Posted Jan 21, 2000
Authored by Simple Nomad

Packet Storm Contest Entry - Strategies for Defeating Distributed Attacks.

tags | paper
MD5 | 234c8cd4cd88e8f102eb20c093490d72
Tim_Yardley.doc
Posted Jan 21, 2000
Authored by Tim Yardley

Packet Storm Contest Entry - Distributed Attacks and the Way To Deal With Them.

tags | paper
MD5 | 0bf3d0772d84441d6040d9176075e2ff
snortpres2.ppt
Posted Jan 21, 2000
Authored by Martin Roesch | Site clark.net

PowerPoint presentation on Snort - Lightweight Intrusion Detection for Networks.

tags | paper
MD5 | 6a73f235695b70f58a92193d5dbbf555
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close