exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-02-02

instructor.c
Posted Feb 2, 2000
Authored by David Goldsmith

Instructor is a 32 bit instruction set auditor. By sequentially executing every 32 Bit OpCode, one can find instructions that might have adverse effects on operating environments. For example, Instructor was used to find the non-privileged halt instruction.

tags | tool
systems | unix
SHA-256 | cab3daead94e9ad13bce609a5574a99466290e60115dd1dad349896f71547a1b
RecyclerSnooper.exe
Posted Feb 2, 2000
Authored by Nobuo Miwa | Site lac.co.jp

RecyclerSnooper exploits the vulnerability described in ms00-007 by creating many directories in the recycle bin, allowing you to retrive items others have recycled. Works on WinNT and Win2K.

systems | windows
SHA-256 | a3066a68231866c5ad660a32cc16b3e59e42bedd5c7e53bbfd1a9e828eb0349a
sara-2.1.6.tar.gz
Posted Feb 2, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Added SARA extensions to SARA, Tweaked the documentation, and Fixed problem with mimetyping.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 8884a64fffc0cd9416c3fea53f209ccab6aa8dc59e4a1e3778b2ec3341b3b68a
ipch-1.8.tar.gz
Posted Feb 2, 2000
Authored by Rainer Weikusat

ipch-select is a small Perl script for printing certain ipchains log entries based on logical expressions.

Changes: Fixed a bug that prevented ICMP 0 (echo reply) from being selected.
tags | tool, perl, firewall
systems | linux
SHA-256 | 33169ea6f3938bff14b29c1d673e36fb7d298deee02f01e8bc7ac1804736d8c3
sendmail-tls-0.23.tar.gz
Posted Feb 2, 2000
Authored by Jeremy Beker | Site opensource.3gi.com

Sendmail-TLS is a wrapper for Sendmail which allows for clients to make a secure (SSL) connection to their mailserver as described in RFC 2487.

Changes: A bug where an invalid MTA executable name would cause a silent failure was fixed.
systems | unix
SHA-256 | 09bdc19cf752ca4fc1e9c609e29df0fe32790fba0f6f9b49b41c3c497598e507
dsniff-1.4.tar.gz
Posted Feb 2, 2000
Authored by Dug Song | Site monkey.org

dsniff is a suite of utilities that are useful for penetration testing. It consists of the following programs: arpredirect intercepts packets from a target host on the LAN intended for another host on the LAN by forging ARP replies. tcpnice slows down specified in-progress TCP connections via "active" traffic shaping (useful for sniffing fast networks). forges tiny TCP window advertisements, and optionally ICMP source quench replies. findgw determines the local gateway of an unknown network via passive sniffing. macof floods the local network with random MAC addresses. tcpkill kills specified in-progress TCP connections. dsniff is a simple password sniffer which handles many protocols. mailsnarf outputs all messages sniffed from SMTP traffic in Berkeley mbox format. webspy sends URLs sniffed from a client to your local Netscape browser for display, updated in real-time.

Changes: New tcpnice program (Slows down traffic in a network via "active" tcp shaping. Added HTTP proxy support in dsniff, urlsnarf, webspy. Fixed mailsniff mbox formatting of ^From in message body, added NNTP processing to dsniff, and added the -v (verbose) flag to tcpkill and tcpnice.
tags | tool, local, sniffer, tcp, protocol
SHA-256 | ba306b87355e9c1d8376d5d3f9f68256f968bcc1d37df2585318b8b878a45c5c
instructor.c
Posted Feb 2, 2000
Authored by David Goldsmith | Site ksrt.org

instructor.c is an OpenBSD 2.5 DoS attack which attempts to execute every 32 bit instruction. It is useful for people who are trying to find hidden features, or hidden bugs in their hardware or operating system. Many "features" have been found with this program.

tags | exploit
systems | openbsd
SHA-256 | a70cc461f83c0c214d4cbf175bc5b405671807e2937804c52d63b58d9d1f9822
outlook5.vuln.txt
Posted Feb 2, 2000
Authored by Georgi Guninski | Site nat.bg

Georgi Guninski security advisory #6 - Outlook Express 5.01 and Internet Explorer 5.01 under Windows 95 (others too) allow reading subsequently opened email messages after a hostile message is opened. Exploit code included. Workaround: Disable Active Scripting.

tags | exploit
systems | windows
SHA-256 | 40e5fa882e4448e2504aa6f59add27ddb20730b6add122d795a838cfa1ea5033
debian.apcd.txt
Posted Feb 2, 2000

The apcd package as shipped in Debian GNU/Linux 2.1 is vulnerable to a symlink attack. Debian security homepage here.

systems | linux, debian
SHA-256 | d4d746f93cdf6e16238b57c71b4e4d83fa971a07c7d2d889813877f5cf1fee15
ethereal-0.8.3.tar.gz
Posted Feb 2, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: Ethereal 0.8.3 addresses various small problems with the previous version, 0.8.2. The two new features are support for TFTP Option Extensions (RFC 2437) and support for reading NetXRay WAN traces. Includes many bugfixes.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 487838bce7642a61cbba18d3e5518a8bb0f6352e73ffe060be28a24e09e7b6ec
ACF48CB.doc
Posted Feb 2, 2000
Authored by Joe Walko

A Distributed Approach to Network Security - Paper which gives a overview of Distributed attacks and how IDS systems can detect them, and about the future of IDS systems and distributed attack tools.

tags | paper
SHA-256 | dacd869738fa503f413ea261bb8e9683e0488c71c38ac73b147e7c8f6bf45354
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close