Twenty Year Anniversary
Showing 1 - 25 of 751 RSS Feed

Files Date: 2000-01-01 to 2000-01-31

Posted Jan 30, 2000
Authored by Jamie Zawinski | Site

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. More than 100 display modes are included in this package.

Changes: Various minor bug fixes have been made, 'sierpinski3d' now uses solid tetrahedrons instead of points, a -trace option has been added to 'xmatrix', and the new hacks 'xteevee' and 'xspirograph' have been added.
tags | root
systems | unix
MD5 | 938f867f593274a3bb890a39d4a0c2a4
Posted Jan 28, 2000
Authored by Noah | Site

A NetBUS client for Linux that works with NetBus 1.60.

systems | linux, unix
MD5 | ea4bf1ea6e22c269b3edb6cbd44182a4
Posted Jan 28, 2000
Authored by Noah | Site

Taskigt - A lkm that gives root to a process that read a special file in /proc.

tags | tool, root, rootkit
systems | unix
MD5 | b4d52ecb3a6914d9836ecfea34237649
Posted Jan 28, 2000
Authored by Noah | Site

Phide - A lkm that hides processes under Linux 2.0. There already exist such thing for Linux 2.2 [like heroin.c or knark] but they're just for Linux 2.2.

tags | tool, rootkit
systems | linux, unix
MD5 | 25ca4d12e42ba1ac0e3a5a71ccc9f33e
Posted Jan 28, 2000
Authored by Noah | Site

Snuff is a packet sniffer for Linux 2.0/2.2 that can monitor many streams at once. It can also mail and wipe the log if reached a specified size.

tags | tool, sniffer
systems | linux
MD5 | 4233057c89dde694a2671a13ee61077e
Posted Jan 28, 2000

FreeBSD Security Advisory - Old procfs hole incompletely filled. In 1997 a flaw was discoverd in *BSD procfs code involving /proc/pid/mem interface, leading to a local root compromise. Since then *BSD kernels contained a simple fix which was meant to close this hole. Unfortunately, throughout these three years it was still possible to abuse /proc/pid/mem in a similar, though more complicated fashion, which could lead to local root compromise. FreeBSD security site here.

tags | kernel, local, root
systems | freebsd, bsd
MD5 | 866572f4f87725889eb53e1c2bf83084
Posted Jan 28, 2000
Authored by Nergal | Site

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit (quite a bit ;)), and provides convinient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you don't have to build low-level network code. If you decide to use libnids, you have got E-component ready - you can focus on implementing other parts of NIDS.

Changes: GNU autoconf support, code cleanup and new libnids(3) manpage, pcap_filter field in nids_params, bugfix in ip_check_ext(), Solaris support.
tags | tool, local, intrusion detection
systems | unix
MD5 | 801b12ad1bce956af1d2e03b4d70f851
Posted Jan 28, 2000
Authored by Xaphan

sqlbf - MSSQL server brute force tool. This is a tool for auditing the strength of your SQL login passwords. c++ source.

tags | cracker
MD5 | 10e67f57c443936236baba7f08a6a523
Posted Jan 28, 2000
Authored by Jonas Borgstrom | Site

ZipCracker for linux cracks password protected zip archives with brute force.

Changes: A new GNOME UI, and no Win32 support.
tags | cracker
systems | linux
MD5 | 3d8b69a201f94ab0ae7aed652d4fbc6c
Nmap Scanning Utility 2.3 BETA 14
Posted Jan 28, 2000
Authored by Fyodor | Site

Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: Cleanup of the output routines, script kiddie mode (-oS), cleaner ident scan, Changed permutation algorithm to make port order and host order shuffling more random, and a longer host_timeout value.
tags | tool, remote, tcp, nmap
systems | unix
MD5 | 6709d218c588f595574f719a394bcf02
Posted Jan 28, 2000
Authored by Missinglnk | Site

A modified version of the original qpopper 3.0beta29 exploit by Zhodiac, added network support (no need for netcat) and allowed the user to specify which command to execute.

tags | exploit
MD5 | 82ad9b1f522d4dae7383117047b5f5bc
Posted Jan 28, 2000
Authored by Blasphemy

xdestroy.c - Destroys all windows in an X display.

tags | denial of service
systems | windows
MD5 | 451a675344708b6482dbe82f08f17615
Posted Jan 28, 2000
Authored by Bob Braun | Site

xinetd is a replacement for inetd, the internet services daemon. Anybody can use it to start servers that don't require privileged ports because xinetd does not require that the services in its configuration file be listed in /etc/services. It can do access control on all services based on the address of the remote host and time of access. Access control works on all services, whether multi-threaded or single-threaded and for both the TCP and UDP protocols.

Changes: Fixed logging for only_from addresses, BSDI compile fix, small BSD bugfixes.
tags | tool, remote, udp, tcp, protocol
systems | unix
MD5 | 86e78a6dbc03fac6c0722f83c67cc6b1
Posted Jan 28, 2000
Authored by Blasphemy

Spank - Denial of service attack. Uses up lots of bandwidth.

tags | denial of service
MD5 | 79ca119ecba9b174b9770055bf4d3e0a
Posted Jan 28, 2000
Authored by Mixter | Site

Stasis is a tool to fool atime/mtime timestamp checking. It records the timestamp of files, then periodically finds atime/mtime changes and restores the old timestamps, as if the files were never accessed / changed.

MD5 | 3e89aa06fa1548680d0d602628d0d46e
Posted Jan 28, 2000
Authored by Robert Graham

FAQ: Network Intrusion Detection Systems version 0.8.1 - (Updated Jan 17, 2000) This FAQ has lots of excellent info on IDS systems, with a good focus on how they work.

tags | paper
MD5 | 8461930a653e8e98844661d5ef6a3279
Posted Jan 28, 2000
Authored by David Litchfield | Site

Cerberus Information Security Advisory (CISADV000126) - Internet Information Server 4.0 ships with an ISAPI application webhits.dll that provides hit-highlighting functionality for Index Server. A vulnerability exists in webhits that allows an attacker to break out of the web virtual root file system and gain unathorized access to other files on the same logical disk drive. This vulnerability can also be used to obtain the source of Active Server Pages or any other server side script file which often contain UserIDs and passwords as well as other sensitive information. Vulnerable systems include Microsoft Windows NT 4 running Internet Information Server 4, all service packs. Microsoft FAQ on this issue is here.

tags | exploit, web, root
systems | windows, nt
MD5 | 512cf5e159aee75a024d84adc45e0996
Posted Jan 27, 2000
Authored by Steven Cheung | Site

The Design of GrIDS - A whitepaper on a graph based Intrusion Detection System. GrIDS is a prototype intrusion detection system that was designed to explore the issues involved in doing large scale IDS.

tags | paper
MD5 | 8f3879879bd8712a1e08ccc9eb5f9be0
Posted Jan 27, 2000

CIS vulnerability scanner Version 5.0.0 (formerly NTInfoScan) - Scans systems for remote vulnerabilities. Runs on Windows NT or 2000. Features a GUI, multi-threaded operation, and updates via DLL.

tags | remote, vulnerability
systems | windows, nt
MD5 | b2b0acf5eee1ff9444473687a1f08f81
Posted Jan 27, 2000
Authored by van Hauser, thc | Site

Placing Backdoors Through Firewalls version 1.5 - Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which does its job is not easily detectable. The kind of backdoor needed depends on the firewall architecture used. As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included.

tags | vulnerability
MD5 | 3e0af4692cc7192b54ae9a66e8498cc6
Posted Jan 27, 2000
Authored by Cash4All Admin | Site

Removes ALL major Viewbars from your desktop, and hide/show all (hidden) windows. Reclaims the reserved desktop space taken up by the Viewbars!

systems | windows
MD5 | 2a4b5174ea57caacfbdf49e8515a2e4f
Posted Jan 27, 2000
Authored by Renegade Master | Site

Shellcode programming for SCO. All examples are taken from a SCO OpenServer 5.0.4 machine so some of them may not work under another SCO type of Unix (like unixware) although I have tried to make it as portable as possible.

tags | paper, shellcode
systems | unix, unixware
MD5 | e2cf541e7912b8ad9f967cc885c076c9
Posted Jan 27, 2000
Authored by Tim Lawless

Libicmp is intended to provide a simple interface for sending and reciving icmp datagrams. Beyond the obvious diffrence of using ICMP, applications Using this interface would behave much in the same way an UDP application behaves.

tags | tool, udp
systems | unix
MD5 | 67284604b370a5b69f6436a085e0b43d
Posted Jan 27, 2000
Authored by Tim Yardley

Explanation of the 'spank' attack - a new breed stream/raped. Stream/Raped mearly flooded the host with ack's (or no flags) and came from random ips with random sequence numbers and/or ack numbers. The difference now is that this not only does the previous stuff, but also directly attacks from and to multicast addresses as well.

tags | exploit
MD5 | c9e46f542b311ed9d0f7c9dbc1204c03
Posted Jan 27, 2000
Authored by ADM, Shane A. Macaulay

Solaris Solstice Internet Mail IMAP4 Server x86 exploit.

tags | exploit, x86
systems | solaris
MD5 | 821fc99233c6792e3a5d571544e02056
Page 1 of 31

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

May 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    17 Files
  • 3
    May 3rd
    30 Files
  • 4
    May 4th
    29 Files
  • 5
    May 5th
    2 Files
  • 6
    May 6th
    3 Files
  • 7
    May 7th
    13 Files
  • 8
    May 8th
    27 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    15 Files
  • 11
    May 11th
    8 Files
  • 12
    May 12th
    2 Files
  • 13
    May 13th
    8 Files
  • 14
    May 14th
    7 Files
  • 15
    May 15th
    43 Files
  • 16
    May 16th
    19 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    3 Files
  • 20
    May 20th
    6 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    3 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By