exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-02-03

surfcontrol.txt
Posted Feb 3, 2000
Authored by Mike C

surfCONTROL SuperScout 2.6.1.6 allows web users to view websites blocked by the classification database.

tags | exploit, web
SHA-256 | 36ddf8049da9b107bd7993a63104caf8dd5ad23594920462c47574bf6f6b6f39
libjcrypt-2.05.00.tar.gz
Posted Feb 3, 2000

Jerry Crypt is a new encryption algorithm developed by Afro Productions Aqua Team

tags | encryption
SHA-256 | 25f1ad6e6ddcfc6658302d082aa82ce8a264883d7d3bbc2a99336e93ed51275a
m000h.sh
Posted Feb 3, 2000
Authored by Cosa Nostra

m000h.sh is a DoS attack against linux telnet users on systems that use the /dev/pts terminals which makes it very difficul to login. When a telnet user connects, but before he has logged in, his terminal will be world writable. This script makes it difficult to login by catting a binary to the terminal as a user is attempting to login.

tags | denial of service
systems | linux
SHA-256 | 6aa0ba688c30e961eeed60c40321eace5d846132c9d0ac3d823708e2a2ef2d7d
bytesaber.c
Posted Feb 3, 2000
Authored by Sectorx

Bytesaber generates various TCP packets by your request, written for testing a TCP fingerprinting based OS detection routine.

tags | tool, tcp
systems | unix
SHA-256 | 2de63e891b1fb23cb09736cc0e35e12c76ff54126034a2e8789f27af095786c8
sherpa-0.1.4.tar.gz
Posted Feb 3, 2000
Authored by Rick Crelia | Site sherpa.lavamonkeys.com

sherpa is a tool for configuring and then checking system security via the console. Written in perl, it allows an admin to maintain a custom database of file and directory permissions and ownership attributes as local needs dictate. Any changes from the prescribed layout will be detected each time sherpa is run. Also, sherpa does some basic system checks (world-writable files, .rhosts and hosts.equiv files, etc.) that help the busy admin keep on top of a system.

Changes: Sherpa now checks for shadow passwords, parses inetd.conf to look for use of tcp_wrappers, and verifies perms.lst for RedHat 6.1.
tags | tool, local, perl, intrusion detection
systems | unix
SHA-256 | e515798bcd47e9b8b914d18cfb02dc464c8dcb97b3c6caff53e10bd472187c68
rfp2k01.txt
Posted Feb 3, 2000
Authored by rain forest puppy | Site wiretrip.net

"How I hacked PacketStorm Forums" - A look at hacking wwwthreads via SQL. This is more of a technical paper than an advisory, but it does explain how I used a vulnerability in the wwwthreads package to gain administrative access and some 800 passwords to PacketStorm's discussion forum.

tags | exploit
SHA-256 | 29b3228561304410fb2ef71030ea7e75376cc046c8543397a51327868ce6872e
iss.summary.5.1
Posted Feb 3, 2000
Site xforce.iss.net

ISS Security Alert Summary 5.1 - Summary of vulnerabilities discovered in January, and thier severity levels. Contains information on vulnerabilities in http-indexserver-dirtrans, linux-vmware-symlink, nt-rdisk-enum-file, win-malformed-rtf-control-word, nt-spoofed-lpc-port, linux-corel-update, icq-url-bo, winamp-playlist-bo, hp-aserver, and sun-sadmind.

tags | web, spoof, vulnerability
systems | linux
SHA-256 | 94fb2951fd704cba13198318be5d25023cb00319bac2996dce14d3615ec91a94
CA-2000-02.htmltags
Posted Feb 3, 2000

CERT Advisory CA-2000-02 - Malicious HTML Tags Embedded in Client Web Requests. A web site may inadvertently include malicious HTML tags or script in a dynamically generated page based on unvalidated input from untrustworthy sources. Users may unintentionally execute scripts written by an attacker when they follow untrusted links in web pages, mail messages, or newsgroup postings.

tags | web
SHA-256 | ff0ccf2c8c60ebb0e78c1ba6f251213c0d060557be7126af0ef7e737dddda5d7
acros.txt
Posted Feb 3, 2000
Authored by Raven | Site blacksun.box.sk

CaIRA: Computer and Internet-Related Acronyms. 1,725 acronyms and abbreviations with definitions and explanations. Includes a listing of all internet country abbreviations.

tags | paper
SHA-256 | 83ac0240a4fcd64c7877890aa47e1f4dafd74408abdf40036d78a987d242cb4b
slzbserv.c
Posted Feb 3, 2000
Authored by Zan

slzbserv.c - local/remote exploit for ZBServer PRO 1.50-r1x (WinNT). ZBServer PRO 1.50-r1x exploit gets remote servers's full control, allows you to run arbitrary code. Tested on debian.

tags | exploit, remote, arbitrary, local
systems | linux, windows, debian
SHA-256 | 988c54751cc12389b0db8a0ee9c0a46023525cb6452cd770c1262b6e088788fa
getdata.tar.gz
Posted Feb 3, 2000
Authored by Cronix da silva sauro

Getdata Protocol Analyzer is another sniffer made with libpcap that supports multiple protocols like TCP, UDP, ICMP, IGMP, etc.

Changes: Bug fixes and some additional features.
tags | tool, udp, sniffer, tcp, protocol
SHA-256 | d93ee463e69fdf001d63a41f1e0a8e0f18337096b3c7a22898030daea5c01ec9
nt.security.update.020200.txt
Posted Feb 3, 2000
Authored by winsd

Windows/NT Security Update - Information on Outlook Express Object Access, Firewall-1 Allows Script Rule Circumvention, and Index Server Exposes File System. Also includes News: Visa Admits Its Sites Were Hacked, News: Security Holes Bite Online Bank, Kerberos 5 in Windows 2000, and Creating a Special TSE Logon Script. NTsecurity homepage here.

tags | magazine
systems | windows
SHA-256 | f5191112090c5efcd8381678f158a68ff26dc20e2592870a01b1c689e21bc399
warftpd-dos.c
Posted Feb 3, 2000
Authored by Toshimi Makino

War-ftpd for Windows95/98/NT is vulnerable to a buffer overflow in the MKD/CWD commands until version 1.71-0. DoS exploit included.

tags | exploit, denial of service, overflow
SHA-256 | 8fb4b7b98977d50ebe39d7cc972408c231774f65b8bab7a4536a9f16a827c8a5
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close