what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-01-27

grids.pdf
Posted Jan 27, 2000
Authored by Steven Cheung | Site seclab.cs.ucdavis.edu

The Design of GrIDS - A whitepaper on a graph based Intrusion Detection System. GrIDS is a prototype intrusion detection system that was designed to explore the issues involved in doing large scale IDS.

tags | paper
SHA-256 | 3f3bc5601c8210fe6ff0091402ea6c7c3012870e8d0117b8048f1f3864be3358
cis.zip
Posted Jan 27, 2000
Site cerberus-infosec.co.uk

CIS vulnerability scanner Version 5.0.0 (formerly NTInfoScan) - Scans systems for remote vulnerabilities. Runs on Windows NT or 2000. Features a GUI, multi-threaded operation, and updates via DLL.

tags | remote, vulnerability
systems | windows
SHA-256 | eeffa64245ee0859c441c1eee2eb3a7128c0df263ad45e9e0a406fdf2ce49850
fw-backd.htm
Posted Jan 27, 2000
Authored by van Hauser, thc | Site thc.org

Placing Backdoors Through Firewalls version 1.5 - Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which does its job is not easily detectable. The kind of backdoor needed depends on the firewall architecture used. As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included.

tags | vulnerability
SHA-256 | 8ef7f3e0278b056d10da9fd260d41e5f483cc869ba0c8728679ae31bf89e3ad2
viewbarhider.zip
Posted Jan 27, 2000
Authored by Cash4All Admin | Site members.xoom.com

Removes ALL major Viewbars from your desktop, and hide/show all (hidden) windows. Reclaims the reserved desktop space taken up by the Viewbars!

systems | windows
SHA-256 | 15460c651269d5bdbf86ba931a9714101b5b3140994c37a5369602c22b319fb8
mi018en.htm
Posted Jan 27, 2000
Authored by Renegade Master | Site hispahack.ccc.de

Shellcode programming for SCO. All examples are taken from a SCO OpenServer 5.0.4 machine so some of them may not work under another SCO type of Unix (like unixware) although I have tried to make it as portable as possible.

tags | paper, shellcode
systems | unix, unixware
SHA-256 | 87c08b528d90150e54c5f23a73488490f89852b7c1807a80215a7bcfe1019c7f
libicmp.tar.gz
Posted Jan 27, 2000
Authored by Tim Lawless

Libicmp is intended to provide a simple interface for sending and reciving icmp datagrams. Beyond the obvious diffrence of using ICMP, applications Using this interface would behave much in the same way an UDP application behaves.

tags | tool, udp
systems | unix
SHA-256 | caf73b834865d152fbdc4c29280e768d01d742a5dc8baeef50f58a811ba44253
spank.txt
Posted Jan 27, 2000
Authored by Tim Yardley

Explanation of the 'spank' attack - a new breed stream/raped. Stream/Raped mearly flooded the host with ack's (or no flags) and came from random ips with random sequence numbers and/or ack numbers. The difference now is that this not only does the previous stuff, but also directly attacks from and to multicast addresses as well.

tags | exploit
SHA-256 | 25a37bfece0acbe778ee130601ca1fda0d9188d98eebaee75e1352130f531bbb
ADMsximap.c
Posted Jan 27, 2000
Authored by ADM, Shane A. Macaulay

Solaris Solstice Internet Mail IMAP4 Server x86 exploit.

tags | exploit, x86
systems | solaris
SHA-256 | adcc570a64ad515dee55499942b44fc76607894ebc9c473d4d7a8654c863de59
qpop-xploit.c
Posted Jan 27, 2000
Authored by Zhodiac | Site hispahack.ccc.de

Remote linux x86 exploit for Qpopper 3.0beta29 and below. (not 2.5.3) Overflows the LIST command and spawns a shell with the UID of the user who logged in (requires valid account), and GID mail.

tags | exploit, remote, overflow, shell, x86
systems | linux
SHA-256 | 6e03060d06070addc039c651e773cc7edd7dfdbf64902dcb1d4ab4b12b4e97df
vpopmail.txt
Posted Jan 27, 2000
Authored by Shane A. Macaulay | Site w00w00.org

w00w00 Security Advisory - qmail-pop3d may pass an overly long command argument to it's password authentication service. When vpopmail is used to authenticate user information a remote attacker may compromise the privilege level that vpopmail is running, naturally root.

tags | exploit, remote, root
SHA-256 | 3bd0074f38eb47b414a84c38444aed7fa25ca801a4f14f89d10b39ad7380dd2d
vmware.htm
Posted Jan 27, 2000
Authored by Harikiri | Site w00w00.org

w00w00 Security Advisory - Linux VMware 1.1.2 Symlink Vulnerability. VMware stores temporary log files within the /tmp directory. It does not check whether all of these files exist prior to creation, resulting in the potential for a symlink attack.

tags | exploit
systems | linux
SHA-256 | da520fa5a7804353f424ed408de54dc3b46708d2f49b82447d0645507cc3049e
skey.htm
Posted Jan 27, 2000
Authored by Harikiri | Site w00w00.org

w00w00 Security Advisory - S/Key & OPIE Database Vulnerability affecting most Unixes (not NetBSD) running skey-2.2. (possibly earlier versions too) allowing offline password cracking.

tags | exploit
systems | netbsd
SHA-256 | 3ae33764fe45486317d0735a5c5fbdb38edd2d5553c4c986a29216ee7e9b8124
qmail-pop3d-vchkpw.c
Posted Jan 27, 2000
Authored by Shane A. Macaulay | Site ktwo.ca

Remote exploit for the inter7 supported vchkpw/vpopmail package for (replacement for chkeckpasswd). Tested on Sol/x86,linux/x86,Fbsd/x86 against linux-2.2.1 and FreeBSD 3.[34]-RELEASE, running vpopmail-3.4.10a/vpopmail-3.4.11[b-e]. Unofficial patch here.

tags | exploit, remote, x86
systems | linux, freebsd
SHA-256 | 96783f06acb089b526184c758e946ec901db1b61ec472cbee7dc24a2094b6765
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close