what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-02-04

ulogin.c
Posted Feb 4, 2000
Authored by Tragedy | Site etc-crew.org

Universal login trojan - Login trojan for pretty much any O/S. Tested on Linux, BSDI 2.0, FreeBSD, IRIX 6.x, 5.x, Sunos 5.5,5.6,5.7, and OSF1/DGUX4.0. Works by checking the DISPLAY environment variable before passing the session to the real login binary.

tags | tool, trojan, rootkit
systems | linux, unix, solaris, freebsd, irix
SHA-256 | fb412b9239e72a75c7f47ba4a4785c5cbfc7665494372801af49f21457eed13d
rpc.c
Posted Feb 4, 2000
Authored by Console | Site etc-crew.org

rpc.c is a small rpc scanner to scan for vulnerabilities. Currently it checks for cmsd, ttdbserverd, sadmind, statd, and amd. Tested on Redhat, Solaris 7, and OpenBSD.

tags | tool, scanner, vulnerability
systems | linux, redhat, unix, solaris, openbsd
SHA-256 | 81bbde1e877e7e2dd448c7b709ed8f06ef43e9ef4a90418141a026b050d5e9cb
lsacc.txt
Posted Feb 4, 2000
Authored by Errno Jones

Legitimate Sites as Covert Channels: An Extension to the Concept of Reverse HTTP Tunnels. Legitimate sites that allow anonymous posting can be used to covertly send commands to systems behind firewalls.

tags | paper, web, protocol
SHA-256 | f38870b0140c9dcaa3bf98fc8e5581801de0fde783deb6c1eeff0a5c2b2f451e
quantum.zip
Posted Feb 4, 2000
Authored by Caboom | Site code.box.sk

Quantum Encryption: just how does the whole thing works anyway? (Diagrams included)

tags | paper
SHA-256 | 57904fd44c7ca790d7c326dede72af1fda867ed1f0247671db29bc67f98f8a07
CISADV000203.txt
Posted Feb 4, 2000
Authored by David Litchfield

Cerberus Information Security Advisory - Windows NT systems running Frontpage Server Extentions reveals the name of the anonyous Internet account and leaks physical paths on system.

systems | windows
SHA-256 | a8f1405807d2ae29e4358d0e21c3a9db4d9b8e951dd86aab8ada6504e64ae1b1
pine4+ssl-1.4.tar.gz
Posted Feb 4, 2000
Authored by Nick Sayer | Site kfu.com

Pine/SSL adds the ability for Pine to make SSL connections to IMAP, POP, SMTP, or NNTP servers.

tags | encryption, imap
SHA-256 | 41a809ace52933b1344c6be17b3acb448d23f81e7d5f40bc248afbb23b51f598
cern-pss.txt
Posted Feb 4, 2000
Authored by Scrippie

CERN 3.0A Heap overflow advisory - There is a heap overflow that wastes memory space in the CERN/3.0A webserver. Close to 50000 bytes of the heap will be ruined! DoS example included.

tags | exploit, overflow
SHA-256 | 489fc3d42f1e7f2c642902f70308d9caefba877586655086add9c34454afe5b3
config.h
Posted Feb 4, 2000

This is a "fun version" of secfingerd's config.h file (which tells secfingerd where to look for files and what messages to display). This config.h causes secfingerd to barf out an ascii "flip the bird" hand in the event that

tags | tool
systems | unix
SHA-256 | 81f55c3aa78da8731f7bd7873139aaa158eac7a675c781e96801d9de062942a4
SHGetPathFromIDList.txt
Posted Feb 4, 2000
Authored by Underground Security Systems Research

Windows Api SHGetPathFromIDList Buffer Overflow - All Structure lengths, or Length of string, can be a modified or altered and cause whatever handles the shortcuts to crash.

tags | exploit, overflow
systems | windows
SHA-256 | 76e69a39aa4a55144387c30002193441b975a29627e84d7c38fecdb3a6baa1ca
serv-u.25b.txt
Posted Feb 4, 2000
Authored by Underground Security Systems Research

Serv-u FTP-Server v2.5b for Win9x/WinNTFTP-Server v2.5b will crash if you upload a malformed link file and type the ftp command LIST, due to overflow in Windows API SHGetPathFromIDList.

tags | exploit, overflow
systems | windows
SHA-256 | 1553e21d813e70115f971fbf6e139bf7d8dedb4efc386150d7a1b03a64116625
ms00-004
Posted Feb 4, 2000

Microsoft has released a patch for a security vulnerability in an administrative utility that ships with Microsoft Windows NT 4.0, Terminal Server Edition. The utility creates a temporary file during execution that can contain security-sensitive information, but does not appropriately restrict access to it. As a result, a malicious user on the terminal server could read the file as it was being created. Microsoft FAQ on this issue is available here.

systems | windows
SHA-256 | fa5b52b98e64074061511032b60cf140f292f9015c3bbd36a249521d7140d5c1
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close