exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-04-12

Posted Apr 12, 2000
Site ssh.fi

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: sftp2 rewritten, bug fixes.
tags | remote, shell, encryption
MD5 | adb4e460471a40cb3952a34864300ffc
Posted Apr 12, 2000
Authored by Daniel Ridge

The Linux kernel includes a powerful, filesystem independant mechanism for mapping logical files onto the sectors they occupy on disk, which can be subverted (with bmap and friends) to perform a variety of functions interesting to the computer forensics community and the computer security community.

tags | kernel
systems | linux
MD5 | b6ebb00ab857b66f1721720d4d110e8a
Posted Apr 12, 2000
Authored by Kingpin | Site l0pht.com

CRYPTOCard's CRYPTOAdmin pin can be decrypted from the .pdb file - Windows 9X demonstration program.

tags | exploit
systems | windows, 9x
MD5 | fe28a18e26b2a225d8b53084273f376f
Posted Apr 12, 2000
Authored by Kingpin | Site l0pht.com

CRYPTOCard's CRYPTOAdmin software is a challenge/response user authentication administration system. The PT-1 token, which runs on a PalmOS device, generates the one-time-password response. A PalmOS .PDB file is created for each user and loaded onto their Palm device. By gaining access to the .PDB file, the legitimate user's PIN can be determined through a series of DES decrypts-and-compares. Using the demonstration tool, the PIN can be determined in under 5 minutes on a Pentium III 450MHz.

tags | exploit
systems | palmos
MD5 | b5712169e313cbe8cc085fdba02fc070
Posted Apr 12, 2000
Authored by CG1H3R0

hnsmarc.pl grabs current news from www.net-security.org, rewritten using the LWP-Package instead of lynx for increased portability and less resource usage.

tags | web
MD5 | 18d8b9567aac18896d206f2845cf591b
Posted Apr 12, 2000
Authored by x00x00

Exploit for Microsoft Index Server 2.0 hithighlight exploit (as described in ms00-006) which allows you to view any file in the wwwroot directory and down.

tags | exploit
MD5 | 75df463fec44f4df5dc680f7188c4d2f
Posted Apr 12, 2000

Microsoft Security Bulletin (MS00-023) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server. The vulnerability allows a malicious user to slow a web server's response or prevent it from providing service altogether. Microsoft FAQ on this issue available here.

tags | web
MD5 | 01aa75679fe970a161ec0e1d8fef3cbf
Posted Apr 12, 2000
Authored by TheWiz

Registry Analyzer is a program that can analyze a Windows 95/98 registry file (user.dat,system.dat). Use this program to read the registry database of another computer registry file.

tags | registry
systems | windows, 9x
MD5 | eb45ece94f91f65ba2f53de76766df3e
Posted Apr 12, 2000
Authored by Trenton D. Adams

TCPDump Filter is a program that filters hex output from tcpdump, and converts it to ASCII and displays it on the screen.

Changes: New -x option to include hex output instead of outputting it by default, -d option to decode IP packets, now includes a usage message.
tags | tool, sniffer
MD5 | 06b7006eeae0388690714784fc86ed9a
Posted Apr 12, 2000
Authored by r00tabega, ragnarox | Site r00tabega.com

DoS.pl uses Net::RawIP to launch a syn flood attack.

tags | denial of service
MD5 | b4de8beddacbdd8ec02d83537f092aa0
Posted Apr 12, 2000
Authored by Kevin Steves | Site people.hp.se

Building a Bastion Host Using HP-UX 11 - Covers configuring HP-UX 10 and 11 to be a secure host, useful for firewall gateways, web servers, ftp servers, dns servers, mail hubs, and more.

tags | paper, web
systems | unix, hpux
MD5 | fbdbe23eb6db6e5064ca9f6f7e873493
Posted Apr 12, 2000
Authored by Bind | Site packetfactory.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Now works correctly under linux.
tags | tool, remote, intrusion detection
systems | unix
MD5 | 99c7bde03bbdf6797a029d145cd300f6
Posted Apr 12, 2000
Authored by Frost Byte

Fortres 4.0 security software for Windows has an easily decrypted password. Qbasic source includeed to crack the simple encryption.

tags | exploit
systems | windows
MD5 | 527b04431e4eb94f05d389b4797ced4c
Page 1 of 1

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By