exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2000-04-05

analyzer.exe
Posted Apr 5, 2000
Authored by Piero Viano | Site netgroup-serv.polito.it

Analyzer v2.02 is a full configurable windows packet sniffer and network analyzer. Developed in a Win32 environment, it works on both Windows 95/98 and Windows NT/2000 platforms. It features a GUI, an analysis engine and a capture program.

Changes: Packet Capture performance greatly improved, support for Windows 2000 added, and many bugs fixed. Requires a packet driver, available here.
tags | tool, sniffer
systems | windows
SHA-256 | 26b0d4a78466e8726e7d44efdd8ca21de96fcd05c5c971a37a1fb8f3e765b4b8
Securing-Optimizing-RH-Linux-1_2.pdf
Posted Apr 5, 2000
Authored by Gerhard Mourani | Site pages.infinit.net

Securing and Optimizing Red Hat Linux - This documentation is indispensable for peoples that want to get all advantage, security, and optimization of a Linux Server. Features Free/SWAN section, Quota configuration, Portsentry, Logcheck, section, improved firewall security approach, more system security tips and a lot other changes. This is the version 1.2 released the March 17, 2000.

tags | paper
systems | linux, redhat, unix
SHA-256 | 21fedc3ff40715c9ab54627a93f618933543a9092dd9c93b1701b7e1865b8233
ethereal-0.8.5.tar.gz
Posted Apr 5, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: After a pro-active bug hunt, bugs in many of the protocol dissectors were rooted out. Ethereal 0.8.5 also contains new support for MPLS and has a newly re-written LDAP dissector. Many other protocol dissectors were enhanced and updated. Capturing on Win32 works better now, and supports the newly released WinPcap 2.02 library. The wiretap netmon and iptrace readers were updated as well.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | a86271a7bfa3de19c018bdb9637588bca51d5d8b032bcdf971c6f593268173af
suse.kreatecd.txt
Posted Apr 5, 2000

SuSE Security Announcement - A security hole was discovered in kreatecd version 0.3.8b and below. Kreatecd is a KDE tool used to burn cd-roms, in which an exploitable buffer overflow was found allowing local users to get root. SuSE security website here.

tags | overflow, local, root
systems | linux, suse
SHA-256 | d143541083c4cd2e4218fc0c810424545d121f5db2811df201e4f8074bdabac7
suse.gpm.txt
Posted Apr 5, 2000

SuSE Security Announcement - A security hole was discovered in gpm verison 1.18.1 and before, allowing local users to execute commands as EUID 0. SuSE security page here.

tags | local
systems | linux, suse
SHA-256 | da04ad53049b68946f42d5b38d8d36f0ad7afa0ac85e1424a0e34694d3db7200
boink.c
Posted Apr 5, 2000
Site hack.co.za

Boink.c is a modification of bonk - DoS attack against windows.

tags | denial of service
systems | windows
SHA-256 | 7aec22a3206ed698148a6c4062d3660392e88832419ca5ceaeb326d3d8464fec
chupacabra.zip
Posted Apr 5, 2000
Authored by Dark Side Industries | Site darks1de.cjb.net

chupacabra is a remote access trojan created by Dark Side Industries. The trojan has the common remote access trojan fuctions and also a nice design. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
SHA-256 | 7eefe8f4274ce42204d4440d738b87998f370f2908396ee28f9b02cbc1e51396
demonhck.txt
Posted Apr 5, 2000
Authored by Voyager / TNO

Playing with the Internet Daemons - There are many fun internet daemons that can be played with to give a fuller understanding of unix networking. Very well written.

tags | paper
systems | unix
SHA-256 | 65189f823bd35fa6726a9232af8ed50e9c670ee0b6f78bff4667aa4f60200d41
dope_expl.c
Posted Apr 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

dopewars 1.4.4 exploit, it's been fixed now ( thanks to my patch :-) ). It dates back to oktober 1999. But i used some cool methods in it.

SHA-256 | f7b77db072d1405a450204a66ded9b44f5d8fe5c91b142d9376c984870b4f68f
IGMP.zip
Posted Apr 5, 2000
Authored by Jason Misoskian | Site XCoders.com

Misoskian's IGMP Nuker OSR - Includes delphi source.

tags | denial of service
SHA-256 | 0a150f34142362dddd5e61d7cc368d4010bc95cedcf634fcd6d2e95da1d0a714
paralyze3.c
Posted Apr 5, 2000
Authored by Xhostile

paralyze3.c will open as many connections to a remote host as supported (by both ends). Many daemons will crash and/or stop responding under the load.

tags | remote, denial of service
SHA-256 | cf39c4874fd834079ec15e0f07fbb763bd4552e4ce47d69b77678bba1386ca41
safe-exec.c
Posted Apr 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

safe_exec.c - execute programs in a secure environment with a specific uid/gid/user and you can specify a program to be executed before the chroot.

SHA-256 | a237a905c377b8cdf4065c45fb6568e482cec4b7ed56166967add7160a81033b
sc.tgz
Posted Apr 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

sc.tgz is a bunch of linux shellcodes. x86: shellexecuting, portbinding, encrypted (to avoid IDS detection), cdrom ejecting, writing (append "lamagra was here" to /etc/motd) , reading (read 255 chars and execute). tools: a tool that "creates" shellcode from the _start of a program, a list of useful syscalls + arguments. m68k: reading, shellexecuting.

tags | x86, shellcode
systems | linux
SHA-256 | 7a65245816d3ac1c54c5513145d58b318536f68db9ba2d683cf9ba7142068296
yatunnel-1.0.tar.gz
Posted Apr 5, 2000
Authored by Timo Sirainen | Site irccrew.org

YATunnel is an easy tunneling program to bypass firewalls so you can access your computers behind firewalls from other places.

tags | tool, firewall
systems | unix
SHA-256 | 334c5ad3390480d368c716545003b6d6ea13147cb877499c56721145ecdb89e2
Trojans213.zip
Posted Apr 5, 2000
Authored by Evil_dead

Trojans213.zip is a list of 213 remote access windows trojans, with the default port numbers they use. Also contains a list formatted for use with superscan 2.0*. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
systems | windows
SHA-256 | 1fd6a10a326570d7abd24f5219207d57e1f5f40291a26545d6029aed0e99d4b4
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close