exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-04-01

rpc.AMD.FreeBSD3.2REL.tar.gz
Posted Apr 1, 2000
Authored by Anathema

FreeBSD 3.2-REL AMD remote root exploit.

tags | exploit, remote, root
systems | freebsd
SHA-256 | 74ebf4b7191e638c02170d2329ab03a22fa5046246e7efe9383a60af7ebd7ef2
lids-0.9pre1-2.2.14.tar.gz
Posted Apr 1, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: The ability to send security alerts through network using HTTP Post, mail, or remote syslog directly from the kernel, respawning if the top LIDS process is killed, alerts are only one line, and hidden processes network connections are also hidden.
tags | kernel, root
systems | linux
SHA-256 | c51b35d755a6cd333224adbb4669d65e3dc45030730d57b06456c4b29ce4ad26
windosprs.zip
Posted Apr 1, 2000
Site ussrback.com

Remote DoS exploit for the heap memory problem in Windows TCP/IP Print Server. ASM source.

tags | remote, tcp
systems | windows
SHA-256 | a8c56215a87ff6ac68036e3502dce256b059e15b6f5dae6b72c940dc6d0eea02
seawall-2.6.tar.gz
Posted Apr 1, 2000
Authored by Tom Eastep | Site seawall.sourceforge.net

Seawall is an ipchains firewall that supports IP masquerading and can be used on a standalone system, on a dedicated firewall system or on a multi-use gateway/server. It supports VPN via IPIP tunnels and PPTP, has an easy to edit configuration file, and can be extended without modifying the base product. It also includes realtime monitoring with an audible alarm that sounds when suspect packets are detected.

Changes: TCP replies to priv ports are now allowed in standalone mode, incoming ICQ chat requests now work, new clear command, seawall policies have been removed, and seawall.conf is more readable.
tags | tool, firewall
systems | linux
SHA-256 | 402cbac3638feb83b432a7fa7320f039ac0b586cd2d4679a50f6a26be640014a
nessus-0.99.10.tar.gz
Posted Apr 1, 2000
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 330 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.

Changes: GTK 1.0 compatible, polished the GUI, nmap is the default scanner, nessusd uses less CPU, and accounts.nes has more checks for rootkits.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
SHA-256 | 7ff9cdcdfec67e0c252a86db8ebd851d0765c1390a2e1dd6e81cc4f0eb0502a0
WebScan.zip
Posted Apr 1, 2000

Simple WWW scanner.

SHA-256 | 30d41b31f8087f90023708173b77b4e507678b866a3c943dc3bcd31ef0d463e4
winfreez.c
Posted Apr 1, 2000
Authored by Delmore | Site sos.nanko.ru

WinFreez.c - ICMP/Redirect-host message storm freeze Win9x/NT(sp4) box in LAN. Windows will receive redirect-host messages and change own route table, therefore it will be frozen or slowly working during this time.

tags | denial of service
systems | windows
SHA-256 | 1ed5f70554b5d748aee098456073c4aa8ce803b8e786cf1fdbb21d34a4417288
rns-V0.0.1beta.tar.gz
Posted Apr 1, 2000
Authored by John Smith

A banner grabber compiled with child support.

tags | tool, scanner
systems | unix
SHA-256 | d7d272e037d3efc11a1bc56ef2fea90dd6b46db8f6d57cb462a9a813b76dfc5b
icadecrypt.c.txt
Posted Apr 1, 2000
Authored by Dug Song | Site monkey.org

icadecrypt cracks the weak hash encryption on stored Citrix ICA passwords (in appsrv.ini).

tags | exploit
SHA-256 | 0181118dcdd35e59f180e0f657ec91f83b1e6c2830741f73a27b7ac95c081f4c
ms00-006
Posted Apr 1, 2000

Microsoft Security Bulletin (MS00-006) Update (March 31) - This patch eliminates two unrelated vulnerabilities in Microsoft Index Server. The first is the "Malformed Hit-Highlighting Argument" vulnerability which allowed any file on the system to be read. The second vulnerability involves the error message that is returned when a user requests a non-existent Internet Data Query (.idq) file which reveals the physical path to the web directory that was contained in the request. Microsoft FAQ on this issue available here.

tags | web, vulnerability
SHA-256 | 81a474653308031788bb616428d96a99df39af3992c4460f0e76636eea7526e5
biew503.tar.bz2
Posted Apr 1, 2000
Authored by Nick Kurshev | Site biew.sourceforge.net

Biew is Binary vIEWer with built-in editor for binary, hexadecimal and disassembler modes. It contains a PentiumIII/K7Athlon/Cyrix-M2 disassembler, full preview of MZ, NE, PE, LE, LX, DOS.SYS, NLM, arch, ELF, a.out, coff32, PharLap, and rdoff executable formats, a code guider, a text viewer with russian codepages support, and many other features.

Changes: Mouse reporting on xterms, eterm improvements, and bug fixes.
systems | linux
SHA-256 | 95fbca87e475f7437ad15dfb6645db14e31aad252f16460e0f5150647d5fa067
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close