exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-02-04

ulogin.c
Posted Feb 4, 2000
Authored by Tragedy | Site etc-crew.org

Universal login trojan - Login trojan for pretty much any O/S. Tested on Linux, BSDI 2.0, FreeBSD, IRIX 6.x, 5.x, Sunos 5.5,5.6,5.7, and OSF1/DGUX4.0. Works by checking the DISPLAY environment variable before passing the session to the real login binary.

tags | tool, trojan, rootkit
systems | linux, unix, solaris, freebsd, irix
SHA-256 | fb412b9239e72a75c7f47ba4a4785c5cbfc7665494372801af49f21457eed13d
rpc.c
Posted Feb 4, 2000
Authored by Console | Site etc-crew.org

rpc.c is a small rpc scanner to scan for vulnerabilities. Currently it checks for cmsd, ttdbserverd, sadmind, statd, and amd. Tested on Redhat, Solaris 7, and OpenBSD.

tags | tool, scanner, vulnerability
systems | linux, redhat, unix, solaris, openbsd
SHA-256 | 81bbde1e877e7e2dd448c7b709ed8f06ef43e9ef4a90418141a026b050d5e9cb
lsacc.txt
Posted Feb 4, 2000
Authored by Errno Jones

Legitimate Sites as Covert Channels: An Extension to the Concept of Reverse HTTP Tunnels. Legitimate sites that allow anonymous posting can be used to covertly send commands to systems behind firewalls.

tags | paper, web, protocol
SHA-256 | f38870b0140c9dcaa3bf98fc8e5581801de0fde783deb6c1eeff0a5c2b2f451e
quantum.zip
Posted Feb 4, 2000
Authored by Caboom | Site code.box.sk

Quantum Encryption: just how does the whole thing works anyway? (Diagrams included)

tags | paper
SHA-256 | 57904fd44c7ca790d7c326dede72af1fda867ed1f0247671db29bc67f98f8a07
CISADV000203.txt
Posted Feb 4, 2000
Authored by David Litchfield

Cerberus Information Security Advisory - Windows NT systems running Frontpage Server Extentions reveals the name of the anonyous Internet account and leaks physical paths on system.

systems | windows
SHA-256 | a8f1405807d2ae29e4358d0e21c3a9db4d9b8e951dd86aab8ada6504e64ae1b1
pine4+ssl-1.4.tar.gz
Posted Feb 4, 2000
Authored by Nick Sayer | Site kfu.com

Pine/SSL adds the ability for Pine to make SSL connections to IMAP, POP, SMTP, or NNTP servers.

tags | encryption, imap
SHA-256 | 41a809ace52933b1344c6be17b3acb448d23f81e7d5f40bc248afbb23b51f598
cern-pss.txt
Posted Feb 4, 2000
Authored by Scrippie

CERN 3.0A Heap overflow advisory - There is a heap overflow that wastes memory space in the CERN/3.0A webserver. Close to 50000 bytes of the heap will be ruined! DoS example included.

tags | exploit, overflow
SHA-256 | 489fc3d42f1e7f2c642902f70308d9caefba877586655086add9c34454afe5b3
config.h
Posted Feb 4, 2000

This is a "fun version" of secfingerd's config.h file (which tells secfingerd where to look for files and what messages to display). This config.h causes secfingerd to barf out an ascii "flip the bird" hand in the event that

tags | tool
systems | unix
SHA-256 | 81f55c3aa78da8731f7bd7873139aaa158eac7a675c781e96801d9de062942a4
SHGetPathFromIDList.txt
Posted Feb 4, 2000
Authored by Underground Security Systems Research

Windows Api SHGetPathFromIDList Buffer Overflow - All Structure lengths, or Length of string, can be a modified or altered and cause whatever handles the shortcuts to crash.

tags | exploit, overflow
systems | windows
SHA-256 | 76e69a39aa4a55144387c30002193441b975a29627e84d7c38fecdb3a6baa1ca
serv-u.25b.txt
Posted Feb 4, 2000
Authored by Underground Security Systems Research

Serv-u FTP-Server v2.5b for Win9x/WinNTFTP-Server v2.5b will crash if you upload a malformed link file and type the ftp command LIST, due to overflow in Windows API SHGetPathFromIDList.

tags | exploit, overflow
systems | windows
SHA-256 | 1553e21d813e70115f971fbf6e139bf7d8dedb4efc386150d7a1b03a64116625
ms00-004
Posted Feb 4, 2000

Microsoft has released a patch for a security vulnerability in an administrative utility that ships with Microsoft Windows NT 4.0, Terminal Server Edition. The utility creates a temporary file during execution that can contain security-sensitive information, but does not appropriately restrict access to it. As a result, a malicious user on the terminal server could read the file as it was being created. Microsoft FAQ on this issue is available here.

systems | windows
SHA-256 | fa5b52b98e64074061511032b60cf140f292f9015c3bbd36a249521d7140d5c1
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close