exploit the possibilities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2000-01-21

Posted Jan 21, 2000
Authored by Gerard Paul Java

IPTraf 2.1.1 is an ncurses-based IP LAN monitor that generates various network statistics including TCP info, UDP counts, ICMP and OSPF information, Ethernet load info, node stats, IP checksum errors, and others.

Changes: This is a maintenance release fixing a small bug in the packet size breakdown facility resulting in inaccurate counts, and some typographical cleanup.
tags | tool, udp, sniffer, tcp
MD5 | 2b3e47c3826403c9d8a006a829d78a73
Posted Jan 21, 2000
Authored by Dark Spyrit, NedoDarkseed

Utility to send a trojan to any unpatched IIS 4.0 system by exploiting a buffer overflow. (Without SP6). Archive password is set to p4ssw0rd. Use at your own risk.

tags | overflow, trojan
MD5 | 0d5ad1a4e58c9d901f2e96ace9bcbf53
Posted Jan 21, 2000
Site oliver.efri.hr

If you're running BIND 8.2.2, and you have the victim.dom name servers in your cache, and victim.dom changes its server names, then any user who can make recursive queries through your cache can break your victim.dom lookups until the old records time out. The complete attack is one brief burst of legitimate packets. This is, of course, not as disastrous as BIND's next buffer overflow, but it's still an interesting example of how an attacker can use BIND's bogus "credibility" mechanism to exacerbate the effects of a seemingly minor bug.

tags | exploit, overflow
MD5 | a446133c2e1c21a5ae719d9a14a6e07d
Posted Jan 21, 2000
Site oliver.efri.hr

OS tested was Windows 2000 and ICQ v99b ICQ is a very popular chat client that is affected by a exploitable buffer overflow when it parses an URL sent by another user. What this means is that arbitary assembly code can be run on the remote machine.

tags | exploit, remote, overflow
systems | windows, 2k
MD5 | 9998385f5f48e4537086965b5792b345
Posted Jan 21, 2000
Site oliver.efri.hr

orel Linux comes with a program called "Corel Update" to manage the ".deb" files. This X oriented program is setuid root. The program is "get_it" and it's located in the /usr/X11R6/bin directory. If you can run it, it's easy to get root privileges in your system.

tags | exploit, root
systems | linux
MD5 | 66b2d0f2969de53239c47de95ee7eebb
Posted Jan 21, 2000
Authored by Omachonu Ogali | Site tribune.intranova.net

Patch to sh(1) that adds denying and logging features (user ID, username, process ID, parent process ID, parent process name, login name). Checks against /etc/sh.deny and if the parent/calling program is listed then execution is halted and logged.

systems | unix
MD5 | 7a86e69eb161d68e9db98b7e90b253de
Posted Jan 21, 2000
Authored by Michal Zalewski

nsuncat 0.01b - Unix socket connectivity from the command line. (works just like netcat for tcp/udp sockets)

tags | tool, udp, tcp
systems | unix
MD5 | 1a3c5631f2d2c7972fe6a722647fd070
Posted Jan 21, 2000
Authored by Carcin0gen | Site carcin0gen.gq.nu

Dust v0.2 is a shell script which runs 22 DoS attacks discovered in 1999. Linux only.

tags | denial of service, shell
systems | linux
MD5 | cdf6f7d798ffe3de01511f2004ecc70c
Posted Jan 21, 2000
Authored by Karellen | Site members.xoom.com

Pretty Simple Password Generator (PSPG) is a small and fast password generator for creating secure, non-pronounceable passwords which are harder to break.

Changes: This release features code modularization, documentation updates and a ChangeLog.
systems | unix
MD5 | 47295c2ba8f2cd6065c43de91619357a
Posted Jan 21, 2000
Authored by Jon Rifkin | Site sp.uconn.edu

ipaudit records network activity. It stores a count of bytes and packets exchanged for every combination of host/port pairs and protocol. It can be signalled after a fixed interval (30 minutes is typical) to output results. It's useful for identifying heavy bandwidth users, intrusive telnet sessions, denial of service attacks, scans, etc. There is also an option (like tcpdump) to save raw packet headers for detailed analysis with packages such as tcpdump or ethereal.

Changes: Bug fixes.
tags | tool, denial of service, sniffer, protocol
MD5 | 1b6e0f119dba3af6941e415ee65db0d9
Posted Jan 21, 2000
Authored by Jon Squire

Packet Storm Contest Entry - GNIDS - Early Detection of Unknown Threats.

tags | paper
MD5 | 79011b6fce11f90158b30c8ca225a13c
Posted Jan 21, 2000
Authored by Mixter, 000 Prize Winner!

Winning Packet Storm Contest Entry - Protecting Against the Unknown - A guide to improving network security to protect the Internet against future forms of security hazards.

tags | paper
MD5 | 9ff71c96465e14c7f78bece493946eb1
Posted Jan 21, 2000
Authored by rain forest puppy, NightAxis

Packet Storm Contest Entry - Purgatory 101: Learning to cope with the SYNs of the Internet.

tags | paper
MD5 | 14348b374f59c15e3271189eba68ff75
Posted Jan 21, 2000
Authored by Richard Kay

Packet Storm Contest Entry - What pure or applied technical measures can be taken to protect the Internet against future forms of attack?

tags | paper
MD5 | 0a7c8831b4d00fff30158b9226120a49
Posted Jan 21, 2000
Authored by Simple Nomad

Packet Storm Contest Entry - Strategies for Defeating Distributed Attacks.

tags | paper
MD5 | 234c8cd4cd88e8f102eb20c093490d72
Posted Jan 21, 2000
Authored by Tim Yardley

Packet Storm Contest Entry - Distributed Attacks and the Way To Deal With Them.

tags | paper
MD5 | 0bf3d0772d84441d6040d9176075e2ff
Posted Jan 21, 2000
Authored by Martin Roesch | Site clark.net

PowerPoint presentation on Snort - Lightweight Intrusion Detection for Networks.

tags | paper
MD5 | 6a73f235695b70f58a92193d5dbbf555
Page 1 of 1

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    2 Files
  • 23
    Feb 23rd
    2 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    37 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By