accept no compromises
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-04-12

ssh-2.1.0.tar.gz
Posted Apr 12, 2000
Site ssh.fi

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: sftp2 rewritten, bug fixes.
tags | remote, shell, encryption
MD5 | adb4e460471a40cb3952a34864300ffc
bmap-1.0.16.tar.gz
Posted Apr 12, 2000
Authored by Daniel Ridge

The Linux kernel includes a powerful, filesystem independant mechanism for mapping logical files onto the sectors they occupy on disk, which can be subverted (with bmap and friends) to perform a variety of functions interesting to the computer forensics community and the computer security community.

tags | kernel
systems | linux
MD5 | b6ebb00ab857b66f1721720d4d110e8a
DeCRYPTO.zip
Posted Apr 12, 2000
Authored by Kingpin | Site l0pht.com

CRYPTOCard's CRYPTOAdmin pin can be decrypted from the .pdb file - Windows 9X demonstration program.

tags | exploit
systems | windows, 9x
MD5 | fe28a18e26b2a225d8b53084273f376f
cc-pinextract.txt
Posted Apr 12, 2000
Authored by Kingpin | Site l0pht.com

CRYPTOCard's CRYPTOAdmin software is a challenge/response user authentication administration system. The PT-1 token, which runs on a PalmOS device, generates the one-time-password response. A PalmOS .PDB file is created for each user and loaded onto their Palm device. By gaining access to the .PDB file, the legitimate user's PIN can be determined through a series of DES decrypts-and-compares. Using the demonstration tool, the PIN can be determined in under 5 minutes on a Pentium III 450MHz.

tags | exploit
systems | palmos
MD5 | b5712169e313cbe8cc085fdba02fc070
hnsmarc.pl
Posted Apr 12, 2000
Authored by CG1H3R0

hnsmarc.pl grabs current news from www.net-security.org, rewritten using the LWP-Package instead of lynx for increased portability and less resource usage.

tags | web
MD5 | 18d8b9567aac18896d206f2845cf591b
sourcegrab.pl
Posted Apr 12, 2000
Authored by x00x00

Exploit for Microsoft Index Server 2.0 hithighlight exploit (as described in ms00-006) which allows you to view any file in the wwwroot directory and down.

tags | exploit
MD5 | 75df463fec44f4df5dc680f7188c4d2f
ms00-023
Posted Apr 12, 2000

Microsoft Security Bulletin (MS00-023) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server. The vulnerability allows a malicious user to slow a web server's response or prevent it from providing service altogether. Microsoft FAQ on this issue available here.

tags | web
MD5 | 01aa75679fe970a161ec0e1d8fef3cbf
RegistryAnalyzer.zip
Posted Apr 12, 2000
Authored by TheWiz

Registry Analyzer is a program that can analyze a Windows 95/98 registry file (user.dat,system.dat). Use this program to read the registry database of another computer registry file.

tags | registry
systems | windows, 9x
MD5 | eb45ece94f91f65ba2f53de76766df3e
tcpdfilter_2.0.tar.gz
Posted Apr 12, 2000
Authored by Trenton D. Adams

TCPDump Filter is a program that filters hex output from tcpdump, and converts it to ASCII and displays it on the screen.

Changes: New -x option to include hex output instead of outputting it by default, -d option to decode IP packets, now includes a usage message.
tags | tool, sniffer
MD5 | 06b7006eeae0388690714784fc86ed9a
d0s.pl
Posted Apr 12, 2000
Authored by r00tabega, ragnarox | Site r00tabega.com

DoS.pl uses Net::RawIP to launch a syn flood attack.

tags | denial of service
MD5 | b4de8beddacbdd8ec02d83537f092aa0
bastion11.txt
Posted Apr 12, 2000
Authored by Kevin Steves | Site people.hp.se

Building a Bastion Host Using HP-UX 11 - Covers configuring HP-UX 10 and 11 to be a secure host, useful for firewall gateways, web servers, ftp servers, dns servers, mail hubs, and more.

tags | paper, web
systems | unix, hpux
MD5 | fbdbe23eb6db6e5064ca9f6f7e873493
sentinel-0.5.tar.gz
Posted Apr 12, 2000
Authored by Bind | Site packetfactory.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Now works correctly under linux.
tags | tool, remote, intrusion detection
systems | unix
MD5 | 99c7bde03bbdf6797a029d145cd300f6
Fortres4-analysis.txt
Posted Apr 12, 2000
Authored by Frost Byte

Fortres 4.0 security software for Windows has an easily decrypted password. Qbasic source includeed to crack the simple encryption.

tags | exploit
systems | windows
MD5 | 527b04431e4eb94f05d389b4797ced4c
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close