Exploit the possiblities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-03-04

binds.c
Posted Mar 4, 2000
Authored by LSD | Site hack.co.za

IRIX 5.3 and 6.2 remote bind iquery overflow.

tags | exploit, remote, overflow
systems | irix
MD5 | 2f117b3fcceb11a27bd2e4924725d9e5
sXe.c
Posted Mar 4, 2000
Authored by l-n1nja | Site hack.co.za

sXe sends IGMP packets, denying service to windows machines. If you can figure out how to use this, you can create quite an effective attack from even a 14kbs modem.

tags | exploit
systems | windows
MD5 | bb83e80359ad9e3003efa5ae30eae779
irix-infosrch.cgi.txt
Posted Mar 4, 2000
Authored by Jared

Irix 6.5 InfoSearch is a web-based interface to books, manpages, and relnotes, distributed by SGI. infosrch.cgi can execute commands remotely.

tags | exploit, web, cgi
systems | irix
MD5 | 3536615dd0985d711d41b0dd562fccc8
AIM-dos.txt
Posted Mar 4, 2000
Authored by Cruz

AOL Instant Messenger can be crashed remotely with upper ascii symbols, version 3.5 tested, others most likely vulnerable. Unofficial patch available on the homepage, here.

tags | exploit, denial of service
MD5 | 8dc152bd7055edb9071046aeb23c66f2
officescan.txt
Posted Mar 4, 2000
Authored by Gregory Duchemin | Site securite-internet.com

Trendmicro Officescan 3.5 has severe remote vulnerabilities, allowing a malicious user to remotely uninstall the anti virus, remotely stop the scan, remotely make the anti virus inefficient by modifying the scan configuration file through the network on the target pc, and finally, remotely write anywhere on the target file system! Includes exploit instructions.

tags | exploit, remote, vulnerability, virus
MD5 | 4431e88e2b6d7f7432ae00eb637b6f9c
syslog-ng-1.4.0.tar.gz
Posted Mar 4, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Important new feature - macro expansion in destination filenames. Also contains stability and portability enhancements, and lots of code cleanup.
tags | system logging
systems | unix
MD5 | 5245d975a4ef394c1d1af75a7b6334f6
win98-con.txt
Posted Mar 4, 2000
Authored by Zoa_Chien

Many Windows programs crash if they access c:/con/con. IE and servU-FTP v 2.4a among others are vulnerable.

tags | exploit
systems | windows
MD5 | 0af0fb7ddfa8bdf566beb63dad61ad17
biew501.tar.bz2
Posted Mar 4, 2000
Authored by Nick Kurshev | Site biew.sourceforge.net

Biew is Binary vIEWer with built-in editor for binary, hexadecimal and disassembler modes. It contains a PentiumIII/K7Athlon/Cyrix-M2 disassembler, full preview of MZ, NE, PE, LE, LX, DOS.SYS, NLM, arch, ELF, a.out, coff32, PharLap, and rdoff executable formats, a code guider, a text viewer with russian codepages support, and many other features.

systems | linux
MD5 | b2ce070901ee1e0b2949a595bf3c087f
ethereal-0.8.4.tar.gz
Posted Mar 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: The new version lets you open a single packet's decode tree in a separate window. New protocol support includes Cisco's Group Management Protocol and Virtual Trunking Protocol, Time Protocol, SMB Mailslot and Netlogon, DHIS, and Sinec H1. Other protocol decoders were improved and fixed. Support for HPUX 11 nettl files was added, and the win32 port was enhanced to use the WinDump libpcap library and to use plugins.
tags | tool, sniffer, protocol
systems | unix
MD5 | e1a31df80484535c4c0d773b696630f3
srp-1.5.1.tar.gz
Posted Mar 4, 2000
Authored by Tom Wu | Site srp.stanford.edu

Secure Remote Password (SRP) is a password-based authentication and key exchange mechanism where no information about the password is leaked during the authentication process. It does not require any public key infrastructure, and uses two DH keypairs so if one were to eavesdrop on the authentication process no information which would aid in guessing the password can be obtained. There are some modified telnet and ftp clients and servers available for use with SRP already.

Changes: OpenBSD support, a new license, integrity-protected encryption, and bugfixes.
tags | remote, encryption
MD5 | 2e1771d5930e7594a04b03f3dfc6ab02
ethereal-0.8.4.zip
Posted Mar 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal for Windows - Although the Ethereal source code now supports the WinDump libpcap library, my win32 build system still does not have a good version of this library, so the binary I have uploaded does *not* have capturing enabled. Included in the zip file is a file called "README.win32" which talks about both compiling and running Ethereal on Win32 platforms.

tags | tool, sniffer
systems | windows, 32
MD5 | c1be75754e1a371f5bf02d6aaf19dc44
set22.zip
Posted Mar 4, 2000
Authored by Paseante, set | Site thepentagon.com

Saqueadores Edicion Tecnica Issue #22 (En Espanol). Featuring everything about GPS&GLONASS, Random Numbers how's and why's, Electronics (lots of), Linux Kernel Modules Games, MacroVision Anti-Tapping and V-Chip, Cisco Routers on X.25 networks and more.

tags | kernel, magazine
systems | cisco, linux
MD5 | b809ce5cbba67c655635e3376074ded4
sps3.c
Posted Mar 4, 2000
Authored by Chopsui-cide | Site midgets.box.sk

sps3.c - Spaghetti Proxy Server 3.0 DoS attack. It does not appear as though arbitrary code could be execute using this vulnerability.

tags | exploit, arbitrary
MD5 | 9e650d8949757a5298f8ab4dc6401c87
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    3 Files
  • 17
    Dec 17th
    13 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close