exploit the possibilities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2000-02-16

Project_ZombieZapper1.1.zip
Posted Feb 16, 2000
Site razor.bindview.com

Zombie Zapper v1.1 Windows NT Source Code - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: Supports shutting down of Troj_Trinoo (wintrinoo), bugfix for stopping unix trinoo.
tags | denial of service
systems | windows, nt
MD5 | cf325363e6db32489313303a0a1011fe
zombie.tar
Posted Feb 16, 2000
Site razor.bindview.com

Zombie Zapper Unix version 1.0 - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

tags | denial of service
systems | unix
MD5 | cda205b3ccd0c6d014498a8d204e259d
icmpenum-1.1.tgz
Posted Feb 16, 2000
Authored by Simple Nomad | Site razor.bindview.com

This is a proof-of-concept tool to demonstrate possible distributed attacking concepts, such as sending packets from one workstation and sniffing the reply packets on another.

tags | denial of service
MD5 | 887a4b39a441342a46a392bddced1aaa
winsd.021600.txt
Posted Feb 16, 2000
Authored by winsd | Site ntsecurity.net

Windows Security Digest - Contains Something Old, Something New: DNS Hijacking, Timbuktu Pro Denial of Service, SNMP Trap Watcher Denial of Service, Internet Anywhere DoS, Firewall-1 Allows Unauthorized TCP Connections, MySQL Allows Password Bypass, Novell GroupWise DoS, poll: What Will the Recent DDoS Attacks Lead to?, RSA Security Site Ransacked, Microsoft Outlines New Windows 2000 Security Strategy, and Why Deny Read Access To Executable Content?

tags | denial of service, tcp, magazine
systems | windows, 2k
MD5 | 559f65f4bc633c770a2b33417924ecba
dnsinfo.htm
Posted Feb 16, 2000
Authored by Johannes Erdfelt | Site apostols.org

Information on testing your DNS server to see if it is vulnerable to corruption attacks. A lot of services depend on DNS information. Online test for this vulnerability here.

tags | paper, protocol
MD5 | e0b0a6af64faeab1e9961ec7104ef20a
DDSA_Defense.htm
Posted Feb 16, 2000
Authored by Simple Nomad | Site razor.bindview.com

Distributed Denial of Service Defense Tactics - This paper details some practical strategies that can be used by system administrators to help protect themselves from distributed denial of service attacks as well as protect themselves from becoming unwitting attack nodes against other companies.

tags | denial of service
MD5 | e1f0aceb853031be5bb2d08b3d12c772
sshd.locked-accts.txt
Posted Feb 16, 2000
Authored by Marc Schaefer

In some cases where a system must be configured so that specific users only have access to POP, FTP, or restricted shell, the addition of the SSH protocol server (sshd) may create a security hole allowing the user to make tcp connections appearing to be from root at the attacked host.

tags | exploit, shell, root, tcp, protocol
MD5 | 0cae677a674229a49f93700b0d013a58
ultimatebb.txt
Posted Feb 16, 2000
Authored by Sergei A. Golubchik

The Ultimate Bulletin Board has remote vulnerabilities, shell commands can be executed.

tags | exploit, remote, shell, vulnerability
MD5 | fa4f5b71750c572cec7a3845cbdf1219
teso-nxt.tar.gz
Posted Feb 16, 2000
Authored by teso

Exploit for BIND-8.2/8.2.1 (NXT)

MD5 | 1e214fef8dfe3df3a399945b56a8b238
adv3.tar.gz
Posted Feb 16, 2000
Authored by teso, scut | Site team-teso.net

Nameserver traffic amplify (DNS Smurf) and NS Route discovery (DNS Traceroute) advisory and exploit.

MD5 | 03bb040880d2f4294d655db3d59fe609
rpv21.tar.gz
Posted Feb 16, 2000
Authored by Tommy. | Site soomka.com

Reverse Pimpage is a tool for allowing one to telnet backwards through a firewall, assuming the box is allowed to make outgoing tcp connections. You have to be able to get access to the inside machine first, though, to get the client on the machine.

Changes: The terminal emulation now works.
tags | tool, tcp, rootkit
systems | unix
MD5 | bc494b0a8cd6928710f1a50462b1d5b4
linux.klog.txt
Posted Feb 16, 2000
Authored by DR | Site dursec.com

Patch for the linux kernel which may help you inexpensively deploy some packet loggers at key network ingress/egress points. Turns any Linux system into an ethernet logger that records mac address, ip address, ports and protocols with a timestamp in the system log. It can be activated and deactivated at the system console with two keystrokes.

tags | kernel, protocol
systems | linux
MD5 | 5706b01372144f324ac0df893d064642
rcgixploit.c.txt
Posted Feb 16, 2000
Authored by Zinc_Sh

Remote CGI exploit - Attempts to exploit five common CGI bugs and retrieve /etc/passwd.

tags | exploit, remote, cgi
MD5 | 8f0318934f2fa3e8ab14910852bc8d46
crypto-gram-0002.txt
Posted Feb 16, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM February 15, 2000 - In this issue: Distributed Denial-of-Service Attacks, New Chinese Cryptography Regulations, Counterpane Internet Security News, Publicizing Vulnerabilities, Counterpane -- Featured Research, Mitnick Case Yields New Crypto Twist and Cookies.

tags | crypto, vulnerability, magazine
MD5 | beff39af73f1c5f7aea767773bc52258
Linbert.txt
Posted Feb 16, 2000
Authored by Grampa Elite

Linberto v1.0.2 (Q-Bert linux clone) can overwrite any file on the system, via insecure use of /tmp.

tags | exploit
systems | linux
MD5 | ab31ea2dcdf43ae4829995c7d386306f
medusa-0.7.9.tar.gz
Posted Feb 16, 2000
Authored by Marek Zelem, Martin Ockajak | Site medusa.fornax.sk

Medusa is a package which improves overall security of Linux OS by extending standard Linux security architecture, but preserving backward compatibility. There is a small kernel patch and a user space security daemon. Kernel changes do the monitoring of syscalls, filesystem actions, and processes, and they implement the communication protocol. The security daemon communicates with the kernel using the character device to send and receive packets.

Changes: file hiding, new sample config file, and many documentation fixes and updates.
tags | kernel, protocol
systems | linux
MD5 | 9972e5dcc9f92d88fbd7959dcac3421c
hv-smtpdos.pl
Posted Feb 16, 2000
Authored by Doctorx | Site hven.com.ve

Some SMTP servers crash under high volume - This perl script sends many mails to a list of addresses to test for this vulnerability.

tags | denial of service, perl
MD5 | b4392785742298d9f23fe778b50cf55b
Page 1 of 1
Back1Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    7 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close