what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-03-04

binds.c
Posted Mar 4, 2000
Authored by LSD | Site hack.co.za

IRIX 5.3 and 6.2 remote bind iquery overflow.

tags | exploit, remote, overflow
systems | irix
SHA-256 | b801143c1ce4d17ed2fa72ee309b8de04aca3c0a8f28c3d870db447f3237d770
sXe.c
Posted Mar 4, 2000
Authored by l-n1nja | Site hack.co.za

sXe sends IGMP packets, denying service to windows machines. If you can figure out how to use this, you can create quite an effective attack from even a 14kbs modem.

tags | exploit
systems | windows
SHA-256 | f18ebdcc683a3ad9273e51a98f03ebc3c02121e312de43dbacc1cb62867dbd1b
irix-infosrch.cgi.txt
Posted Mar 4, 2000
Authored by Jared

Irix 6.5 InfoSearch is a web-based interface to books, manpages, and relnotes, distributed by SGI. infosrch.cgi can execute commands remotely.

tags | exploit, web, cgi
systems | irix
SHA-256 | eba4d77a802d260631abb020810e7f15fba73aa9ed4f550a8086a00d34d95608
AIM-dos.txt
Posted Mar 4, 2000
Authored by Cruz

AOL Instant Messenger can be crashed remotely with upper ascii symbols, version 3.5 tested, others most likely vulnerable. Unofficial patch available on the homepage, here.

tags | exploit, denial of service
SHA-256 | 85acb684e56bd11b112a7bc134dd69c34a46d09d9700f0f57f01d2e2eaa2c47f
officescan.txt
Posted Mar 4, 2000
Authored by Gregory Duchemin | Site securite-internet.com

Trendmicro Officescan 3.5 has severe remote vulnerabilities, allowing a malicious user to remotely uninstall the anti virus, remotely stop the scan, remotely make the anti virus inefficient by modifying the scan configuration file through the network on the target pc, and finally, remotely write anywhere on the target file system! Includes exploit instructions.

tags | exploit, remote, vulnerability, virus
SHA-256 | 1b397afbf8b09ecf70d57af6cf9b203f751689535272af2e5daa44bfc52d3737
syslog-ng-1.4.0.tar.gz
Posted Mar 4, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Important new feature - macro expansion in destination filenames. Also contains stability and portability enhancements, and lots of code cleanup.
tags | system logging
systems | unix
SHA-256 | 0c64cc0cde088c99e1f720ccc02edcd728b3e9839534f3893601efc303ccced8
win98-con.txt
Posted Mar 4, 2000
Authored by Zoa_Chien

Many Windows programs crash if they access c:/con/con. IE and servU-FTP v 2.4a among others are vulnerable.

tags | exploit
systems | windows
SHA-256 | 2cd855c77217cd1f57738d00c43cc9f132e315b6dc636915255b6653aeb4107a
biew501.tar.bz2
Posted Mar 4, 2000
Authored by Nick Kurshev | Site biew.sourceforge.net

Biew is Binary vIEWer with built-in editor for binary, hexadecimal and disassembler modes. It contains a PentiumIII/K7Athlon/Cyrix-M2 disassembler, full preview of MZ, NE, PE, LE, LX, DOS.SYS, NLM, arch, ELF, a.out, coff32, PharLap, and rdoff executable formats, a code guider, a text viewer with russian codepages support, and many other features.

systems | linux
SHA-256 | ad862ef4cb3579b62b76fd680c4b683a9916204893dbee4bc9609d0b60b95575
ethereal-0.8.4.tar.gz
Posted Mar 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: The new version lets you open a single packet's decode tree in a separate window. New protocol support includes Cisco's Group Management Protocol and Virtual Trunking Protocol, Time Protocol, SMB Mailslot and Netlogon, DHIS, and Sinec H1. Other protocol decoders were improved and fixed. Support for HPUX 11 nettl files was added, and the win32 port was enhanced to use the WinDump libpcap library and to use plugins.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 5226c6f4853964bb3f6d7ac32710a66ce7b3a13a08e4f2400b3004a6387c9a7f
srp-1.5.1.tar.gz
Posted Mar 4, 2000
Authored by Tom Wu | Site srp.stanford.edu

Secure Remote Password (SRP) is a password-based authentication and key exchange mechanism where no information about the password is leaked during the authentication process. It does not require any public key infrastructure, and uses two DH keypairs so if one were to eavesdrop on the authentication process no information which would aid in guessing the password can be obtained. There are some modified telnet and ftp clients and servers available for use with SRP already.

Changes: OpenBSD support, a new license, integrity-protected encryption, and bugfixes.
tags | remote, encryption
SHA-256 | a991bd6b20a7be4b011a6419369965a42270f69ebb2964d680c218d658b8684a
ethereal-0.8.4.zip
Posted Mar 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal for Windows - Although the Ethereal source code now supports the WinDump libpcap library, my win32 build system still does not have a good version of this library, so the binary I have uploaded does *not* have capturing enabled. Included in the zip file is a file called "README.win32" which talks about both compiling and running Ethereal on Win32 platforms.

tags | tool, sniffer
systems | windows
SHA-256 | dc57aed6290b4d6a20d2acd16d77bd56c1a1a3369b4a392cf8309ea7846ebfcd
set22.zip
Posted Mar 4, 2000
Authored by Paseante, set | Site thepentagon.com

Saqueadores Edicion Tecnica Issue #22 (En Espanol). Featuring everything about GPS&GLONASS, Random Numbers how's and why's, Electronics (lots of), Linux Kernel Modules Games, MacroVision Anti-Tapping and V-Chip, Cisco Routers on X.25 networks and more.

tags | kernel, magazine
systems | cisco, linux
SHA-256 | cc14f060a32904b6a84149ec0cc9e84fa4abdf6d71c9e092d5b4e5b19b6b307a
sps3.c
Posted Mar 4, 2000
Authored by Chopsui-cide | Site midgets.box.sk

sps3.c - Spaghetti Proxy Server 3.0 DoS attack. It does not appear as though arbitrary code could be execute using this vulnerability.

tags | exploit, arbitrary
SHA-256 | 680f512523df1c01ddcba29dfb4caf73bb78cf523c949bcc773afb2b6dfa4066
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close