what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-04-11

FreeBSD Security Advisory 2000.12
Posted Apr 11, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory - healthd allows a local root compromise. healthd v0.3 installs a utility which is setuid root in order to monitor the system status. This utility contains a trivial buffer overflow which allows an unprivileged local user to obtain root privileges on the system. healthd is part of the freebsd ports collection.

tags | overflow, local, root
systems | freebsd
SHA-256 | 4f5be229484c65d7c49f8225b7b74307cfe1d849795c078158155c12990724f9
FreeBSD Security Advisory 2000.11
Posted Apr 11, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory - ircII port contains a remote overflow. ircII version 4.4 distributed with freebsd contained a remotely-exploitable buffer overflow in the /DCC CHAT command which allows remote users to execute arbitrary code as the client user.

tags | remote, overflow, arbitrary
systems | freebsd
SHA-256 | 3a268e8ea1fac6ad5e28d4025657105fbf8a8193d83f84cc0c60a9aad1ccb416
FCheck_2.07.51.tar.gz
Posted Apr 11, 2000
Authored by Mike Gumienny | Site sites.netscape.net

FCHECK is a very stable PERL script written to generate and comparatively monitor a UNIX system against its baseline for any file alterations and report them through syslog, console, or any log monitoring interface. Monitoring events can be done in as little as one minute intervals if a system's drive space is small enough, making it very difficult to circumvent. This is a freely-available open-source alternative to 'tripwire' that is time tested, and is easier to configure and use.

Changes: Fixes for the configuration files trailing space bug (fixed security hole), major bug fixes.
tags | tool, perl, intrusion detection
systems | unix
SHA-256 | fb3737c1c6d920726f78f8eb8ca0423876e061872907a6ac44797d57c526954d
lids-0.9pre3-2.2.14.tar.gz
Posted Apr 11, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Fixes for missing symbols for modules and an oops at sealing time, and optional console hangup.
tags | kernel, root
systems | linux
SHA-256 | 9c166e8e0e5a58a0ffeced7658dc95d44db9df2a1fcd671edd9e3bd9a7844608
nessus-1.0.0pre1.tar.gz
Posted Apr 11, 2000
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 330 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.

Changes: nessus-adduser : utility to add easily a nessusd user, nessus saves plugin preferences, nmap_wrapper.nes was updated to be compatable with the new nmap output, traditional netmasks are now accepted, freebsd 4 compile fixes, bug fixes.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
SHA-256 | bbc6b6399ce467317ea2045424a9d6b509589fee84d5a1cf3ffdba50107e3b98
Nmap Scanning Utility 2.30 BETA 20
Posted Apr 11, 2000
Authored by Fyodor | Site insecure.org

Nmap is an advanced utility for network exploration or security auditing. It supports ping scanning, many port scanning techniques, TCP/IP fingerprinting (remote OS detection), advanced host enumeration, firewall bypassing, flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: Fixed sparc core dumps, and a compilation problem on machines that do not have MAP_FAILED.
tags | tool, remote, tcp, nmap
systems | unix
SHA-256 | cff8ac72e75f90ed079f81104b7046b98eff7dceb7e5a40234d05d0541339b48
bcencrypt.zip
Posted Apr 11, 2000
Authored by blackcode, Rat | Site blackcode.com

An encrypt/decrypt utility. Nice&easy interface and strong encryption methods.

tags | magazine
SHA-256 | 0c7a050f3892c9e16e459c9e6e62f57b7b0dfb7240c7560f4e8f67b30f64a38a
datapool2.1.tar.gz
Posted Apr 11, 2000
Authored by Brad Spengler

Datapool v2.1 combines 82 dos attacks into one script. Features logging, port rance specification, continous attack option, miltiple IP addresses, and looping attack of multiple IPs. Includes sources of almost all attacks used.

Changes: Added portless attacks, updated old school ascii, bug fixes.
tags | denial of service
SHA-256 | bb70eb01c7c05bf69a77ac32527662ac4f02cad77ee8253d0db74cf093f2dabf
identscan.c
Posted Apr 11, 2000
Authored by john bloogg spam

identscan.c is a port scanner with identd lookup, to find the UID that each remote service is running under.

tags | tool, remote, scanner
systems | unix
SHA-256 | 5a5939479da9aeb9dba6f180b8420fbce981b280585ed177d171d87030487ebf
killwin.c
Posted Apr 11, 2000

killwin.c - winnuke idea, modifcation for me ONLY - napster

tags | denial of service
SHA-256 | 24f05493ff734720c99c65884c58e431fc48c6270d9cc663bcf92c323b6100f7
nestea2.c
Posted Apr 11, 2000
Authored by Ttol | Site hack.co.za

Nestea 2 - Improved version of nestea.

tags | denial of service
SHA-256 | bd1ba5d143c9416d9a483b4e84f86b9c5a784b19c269c5f4f77e67e342ca2668
NetIntro.txt
Posted Apr 11, 2000
Authored by Ratdance | Site neoerudition.hypermart.net

Introduction to Internetworking - Inspired by a cisco class, here is some information on how todays high bandwidth network connections work, and how packets get to thier destination.

tags | paper
systems | cisco
SHA-256 | 29b07499f57834b8f70bffe236a18e54dbbd16837d027f4ab7be055c8a29db74
readdev.txt
Posted Apr 11, 2000
Authored by vade79, realhalo

Documentation on possibilities to freeze/deny service to applications and daemons via reading devices on unix/windows based operating systems. (unix note: most of these device calls don't require root, on most dists) Includes some sample html for crashing browsers through file:// links.

tags | denial of service, root
systems | windows, unix
SHA-256 | d7c8deedc35391eaa333c07710195642bccfa5468ade29076a0bcabc58fa637c
yapp_exploit.c
Posted Apr 11, 2000
Authored by Dave Bowman | Site hack.co.za

Local buffer overflow exploit for Yapp Conferencing System, Version 2.2.

tags | exploit, overflow, local
SHA-256 | 42a69224ad18bfe0ffd84ecdd97d200a20ddcee417e83cc22a0f5d94706017ae
etherape-0.4.6.tar.gz
Posted Apr 11, 2000
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.

Changes: Bug Fixes, new features.
tags | tool, sniffer
SHA-256 | 139ede74780f763639c3e4c17e79775166a928120fafb3c52374277758d1d850
dsniff-1.8.tar.gz
Posted Apr 11, 2000
Authored by Dug Song | Site monkey.org

dsniff is a suite of utilities that are useful for penetration testing. It consists of the following programs: arpredirect intercepts packets from a target host on the LAN intended for another host on the LAN by forging ARP replies. findgw determines the local gateway of an unknown network via passive sniffing. macof floods the local network with random MAC addresses. tcpkill kills specified in-progress TCP connections. dsniff is a simple password sniffer which handles many protocols. mailsnarf outputs all messages sniffed from SMTP traffic in Berkeley mbox format. webspy sends URLs sniffed from a client to your local Netscape browser for display, updated in real-time.

Changes: Added SOCKS parsing, pcanywhere parsing, SMB parsing, IRC parsing, and NAI sniffer parsing to dsniff.
tags | tool, local, sniffer, tcp, protocol
SHA-256 | 52ba277dacb74c072066d3c2127476355fb36af015fc50f685a3fc540d94ddb2
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close