exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-04-12

Posted Apr 12, 2000
Site ssh.fi

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: sftp2 rewritten, bug fixes.
tags | remote, shell, encryption
SHA-256 | 9d7c82113e8f96a67afb1ce99ceb348d95c8445a47a1a65acbcf84cb971bd5ee
Posted Apr 12, 2000
Authored by Daniel Ridge

The Linux kernel includes a powerful, filesystem independant mechanism for mapping logical files onto the sectors they occupy on disk, which can be subverted (with bmap and friends) to perform a variety of functions interesting to the computer forensics community and the computer security community.

tags | kernel
systems | linux
SHA-256 | 45ffa75f71b46ae1e420cd0bc8d67620f9cdbc30d96a650decbc15647de77f0d
Posted Apr 12, 2000
Authored by Kingpin | Site l0pht.com

CRYPTOCard's CRYPTOAdmin pin can be decrypted from the .pdb file - Windows 9X demonstration program.

tags | exploit
systems | windows
SHA-256 | 1c39bef81b495add319b132a0b439b84f5ac8247873637ae83f4dbc4f2ba012f
Posted Apr 12, 2000
Authored by Kingpin | Site l0pht.com

CRYPTOCard's CRYPTOAdmin software is a challenge/response user authentication administration system. The PT-1 token, which runs on a PalmOS device, generates the one-time-password response. A PalmOS .PDB file is created for each user and loaded onto their Palm device. By gaining access to the .PDB file, the legitimate user's PIN can be determined through a series of DES decrypts-and-compares. Using the demonstration tool, the PIN can be determined in under 5 minutes on a Pentium III 450MHz.

tags | exploit
systems | palmos
SHA-256 | e6389d8ca2def0371d397ac69b9cc79c004fcfe85414c5e79412c03aaadabb09
Posted Apr 12, 2000
Authored by CG1H3R0

hnsmarc.pl grabs current news from www.net-security.org, rewritten using the LWP-Package instead of lynx for increased portability and less resource usage.

tags | web
SHA-256 | 7b1c19eca6bd1d3610ccded97b442d9e54dac4c5c9e159b8ec75620fb9509a8b
Posted Apr 12, 2000
Authored by x00x00

Exploit for Microsoft Index Server 2.0 hithighlight exploit (as described in ms00-006) which allows you to view any file in the wwwroot directory and down.

tags | exploit
SHA-256 | e7181e3f88d7f2f6f593e36b2e6ccf4c1078d50114bac13f45e6f4fa709a3e04
Posted Apr 12, 2000

Microsoft Security Bulletin (MS00-023) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server. The vulnerability allows a malicious user to slow a web server's response or prevent it from providing service altogether. Microsoft FAQ on this issue available here.

tags | web
SHA-256 | da9189ad265b4177fbec8d84efe20feeeadb3bcd3ea5e77a1703a1bb0ef20e8b
Posted Apr 12, 2000
Authored by TheWiz

Registry Analyzer is a program that can analyze a Windows 95/98 registry file (user.dat,system.dat). Use this program to read the registry database of another computer registry file.

tags | registry
systems | windows
SHA-256 | 15edd2e9858d837775512a85dbfaeb4dd0e39836e46c25a4eedd9e6951fa475d
Posted Apr 12, 2000
Authored by Trenton D. Adams

TCPDump Filter is a program that filters hex output from tcpdump, and converts it to ASCII and displays it on the screen.

Changes: New -x option to include hex output instead of outputting it by default, -d option to decode IP packets, now includes a usage message.
tags | tool, sniffer
SHA-256 | 4dcee9ef07ede6bfe32a909c9b4a3b879696ff06ca05e2e9a443b4a6e98716ca
Posted Apr 12, 2000
Authored by r00tabega, ragnarox | Site r00tabega.com

DoS.pl uses Net::RawIP to launch a syn flood attack.

tags | denial of service
SHA-256 | 32ae0c00c03fd1e282fef426d088787651a77b6b9c1400e9ef48c2c496d3e497
Posted Apr 12, 2000
Authored by Kevin Steves | Site people.hp.se

Building a Bastion Host Using HP-UX 11 - Covers configuring HP-UX 10 and 11 to be a secure host, useful for firewall gateways, web servers, ftp servers, dns servers, mail hubs, and more.

tags | paper, web
systems | unix, hpux
SHA-256 | d1b8db73a010afb5da4be15559a94e2c098a450abb5a26cce22234cd6db501d7
Posted Apr 12, 2000
Authored by Bind | Site packetfactory.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Now works correctly under linux.
tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 6d5ba58d987fc714aa42799e13604eb61ef54d01b82002d7c9878e095880635b
Posted Apr 12, 2000
Authored by Frost Byte

Fortres 4.0 security software for Windows has an easily decrypted password. Qbasic source includeed to crack the simple encryption.

tags | exploit
systems | windows
SHA-256 | e2d86ed239ba13f4e4fead5544d33b1b698b5c7354b27dd04f8ea77839827da5
Page 1 of 1

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By