what you don't know can hurt you
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-03-04

Posted Mar 4, 2000
Authored by LSD | Site hack.co.za

IRIX 5.3 and 6.2 remote bind iquery overflow.

tags | exploit, remote, overflow
systems | irix
MD5 | 2f117b3fcceb11a27bd2e4924725d9e5
Posted Mar 4, 2000
Authored by l-n1nja | Site hack.co.za

sXe sends IGMP packets, denying service to windows machines. If you can figure out how to use this, you can create quite an effective attack from even a 14kbs modem.

tags | exploit
systems | windows
MD5 | bb83e80359ad9e3003efa5ae30eae779
Posted Mar 4, 2000
Authored by Jared

Irix 6.5 InfoSearch is a web-based interface to books, manpages, and relnotes, distributed by SGI. infosrch.cgi can execute commands remotely.

tags | exploit, web, cgi
systems | irix
MD5 | 3536615dd0985d711d41b0dd562fccc8
Posted Mar 4, 2000
Authored by Cruz

AOL Instant Messenger can be crashed remotely with upper ascii symbols, version 3.5 tested, others most likely vulnerable. Unofficial patch available on the homepage, here.

tags | exploit, denial of service
MD5 | 8dc152bd7055edb9071046aeb23c66f2
Posted Mar 4, 2000
Authored by Gregory Duchemin | Site securite-internet.com

Trendmicro Officescan 3.5 has severe remote vulnerabilities, allowing a malicious user to remotely uninstall the anti virus, remotely stop the scan, remotely make the anti virus inefficient by modifying the scan configuration file through the network on the target pc, and finally, remotely write anywhere on the target file system! Includes exploit instructions.

tags | exploit, remote, vulnerability, virus
MD5 | 4431e88e2b6d7f7432ae00eb637b6f9c
Posted Mar 4, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Important new feature - macro expansion in destination filenames. Also contains stability and portability enhancements, and lots of code cleanup.
tags | system logging
systems | unix
MD5 | 5245d975a4ef394c1d1af75a7b6334f6
Posted Mar 4, 2000
Authored by Zoa_Chien

Many Windows programs crash if they access c:/con/con. IE and servU-FTP v 2.4a among others are vulnerable.

tags | exploit
systems | windows
MD5 | 0af0fb7ddfa8bdf566beb63dad61ad17
Posted Mar 4, 2000
Authored by Nick Kurshev | Site biew.sourceforge.net

Biew is Binary vIEWer with built-in editor for binary, hexadecimal and disassembler modes. It contains a PentiumIII/K7Athlon/Cyrix-M2 disassembler, full preview of MZ, NE, PE, LE, LX, DOS.SYS, NLM, arch, ELF, a.out, coff32, PharLap, and rdoff executable formats, a code guider, a text viewer with russian codepages support, and many other features.

systems | linux
MD5 | b2ce070901ee1e0b2949a595bf3c087f
Posted Mar 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: The new version lets you open a single packet's decode tree in a separate window. New protocol support includes Cisco's Group Management Protocol and Virtual Trunking Protocol, Time Protocol, SMB Mailslot and Netlogon, DHIS, and Sinec H1. Other protocol decoders were improved and fixed. Support for HPUX 11 nettl files was added, and the win32 port was enhanced to use the WinDump libpcap library and to use plugins.
tags | tool, sniffer, protocol
systems | unix
MD5 | e1a31df80484535c4c0d773b696630f3
Posted Mar 4, 2000
Authored by Tom Wu | Site srp.stanford.edu

Secure Remote Password (SRP) is a password-based authentication and key exchange mechanism where no information about the password is leaked during the authentication process. It does not require any public key infrastructure, and uses two DH keypairs so if one were to eavesdrop on the authentication process no information which would aid in guessing the password can be obtained. There are some modified telnet and ftp clients and servers available for use with SRP already.

Changes: OpenBSD support, a new license, integrity-protected encryption, and bugfixes.
tags | remote, encryption
MD5 | 2e1771d5930e7594a04b03f3dfc6ab02
Posted Mar 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal for Windows - Although the Ethereal source code now supports the WinDump libpcap library, my win32 build system still does not have a good version of this library, so the binary I have uploaded does *not* have capturing enabled. Included in the zip file is a file called "README.win32" which talks about both compiling and running Ethereal on Win32 platforms.

tags | tool, sniffer
systems | windows, 32
MD5 | c1be75754e1a371f5bf02d6aaf19dc44
Posted Mar 4, 2000
Authored by Paseante, set | Site thepentagon.com

Saqueadores Edicion Tecnica Issue #22 (En Espanol). Featuring everything about GPS&GLONASS, Random Numbers how's and why's, Electronics (lots of), Linux Kernel Modules Games, MacroVision Anti-Tapping and V-Chip, Cisco Routers on X.25 networks and more.

tags | kernel, magazine
systems | cisco, linux
MD5 | b809ce5cbba67c655635e3376074ded4
Posted Mar 4, 2000
Authored by Chopsui-cide | Site midgets.box.sk

sps3.c - Spaghetti Proxy Server 3.0 DoS attack. It does not appear as though arbitrary code could be execute using this vulnerability.

tags | exploit, arbitrary
MD5 | 9e650d8949757a5298f8ab4dc6401c87
Page 1 of 1

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By