what you don't know can hurt you
Showing 1 - 21 of 21 RSS Feed

Files Date: 2000-04-19

Posted Apr 19, 2000
Authored by Dethy

Local exploit for Linux Mandrake 7.0's wmcdplay 1.0 beta 1. Unlike the Teso exploit for wmcdplay, this code exploits the -position argument.

tags | exploit, local
systems | linux, mandrake
MD5 | 785feed4909216091acb3e38b39c0624
Posted Apr 19, 2000
Authored by Grampa Elite

Vulnerability: Any user can overwrite any file in the system with x11amp ver .70.

tags | exploit
MD5 | 6a3502236ea9eb76b2781d450922a5bb
Posted Apr 19, 2000

Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection

tags | paper, denial of service
MD5 | 86520fa1e5b1cd86f19fdc232c0ad13d
Posted Apr 19, 2000

MRTG is a The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing GIF images which provide a LIVE visual representation of this traffic. Check http://www.ee.ethz.ch/stats/mrtg/ for an example. MRTG is based on Perl and C and works under UNIX and Windows NT. MRTG is being successfully used on many sites around the net.

tags | tool, web, perl
systems | windows, unix, nt
MD5 | 1279ae12c85c458cb5b3111fe5e01341
FreeBSD Security Advisory 2000.13
Posted Apr 19, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:13 - generic-nqs v3.50.7 and earlier from the ports connection contains a local root compromise.

tags | local, root
systems | freebsd
MD5 | fed344ca687999e3687be67c0f61f78c
Posted Apr 19, 2000
Authored by vade79, realhalo | Site realhalo.org

ide_expl.mrc is an ircii-4-4 exploit ported to mirc5.7, works reverse to ircii-4.4.c. You send the chat request instead of having them chat you, attempts to execute /bin/sh.

tags | exploit
MD5 | addd65fdc0c1ae6459ab9dcad5b30f13
Posted Apr 19, 2000
Site vtun.sourceforge.net

VTun is the easiest way to create Virtual Tunnels over TCP/IP networks with traffic shaping, compression, and encryption. It is a user space implementation and doesn't need modification of any kernel parts. VTun supports IP, PPP, SLIP, Ethernet, and other tunnel types. VTun is easily and highly configurable; it can be used for various network tasks like VPN, Mobil IP, Shaped Internet access, Ethernet tunnel, IP address saving, etc.

Changes: This is the final stable 2.1 release. It features small cleanups, updated packages, and a Web site update. All users should upgrade.
tags | tool, kernel, tcp, firewall
systems | unix
MD5 | 0174ff0f0521fc155ee74434201fce14
Posted Apr 19, 2000
Authored by Jonathan McDowell | Site earth.li

sersniff is a program for tunnelling/sniffing for between 2 serial ports, written to help aid with the decoding of the protocol for the Nokia 9000i Communicator. It also has support for TCP connections.

tags | tcp, protocol
systems | linux
MD5 | 8f1f5b2d1501333b6dd8d3e2712b97fb
Posted Apr 19, 2000
Authored by Tfreak | Site hack.co.za

lincity-svga local buffer overflow.

tags | exploit, overflow, local
MD5 | b4a62664c040e60ac56f382ae6fd9b85
Posted Apr 19, 2000
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 330 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.

Changes: Login time segfault fixed, and various GUI fixes.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
MD5 | 2a830488f27393138d3d445c5d5ccc57
Posted Apr 19, 2000
Authored by Niall Smart | Site hack.co.za

lprm-bsd.c - Exploit for lprm local root vulnerability in OpenBSD and FreeBSD-stable.

tags | exploit, local, root
systems | freebsd, bsd, openbsd
MD5 | 3af11316dd1189929e02fa8963942d73
Posted Apr 19, 2000
Site hack.co.za

ISC BIND 4.9.7-T1B local exploit - The named daemon will dump the named database to /var/tmp/named_dump.db when it receives a SIGINT signal. It does not check for symbolic links while doing so and can be made to overwrite any file in the system.

tags | exploit, local
MD5 | 9e3322da75b9792e0a877bdaabb9a82f
Posted Apr 19, 2000
Authored by Mudge | Site l0pht.com

imap_core.sh is a quick proof of concept tool that causes some imapd implementations to dump core. Unfortunately the core file contains the password and shadow password file in it!

tags | exploit, proof of concept
MD5 | 9481064c839b0d9a8f986f1b6cf42749
Posted Apr 19, 2000
Site hack.co.za

Linux kernel 2.2.14 local DoS - When accessing a file or directory with a very long path the process hangs in an unkillable state. All other processes are SEGFAULTing when trying to access unkillable process' /proc entry. So system utilities ps, w, top, killall and the like are stoppping working. Except that, the system continues to function normally. The only solution is reboot.

tags | exploit, kernel, local
systems | linux
MD5 | 5130ec28180b662880af7d2ee6c7bc33
Posted Apr 19, 2000
Authored by Konstantin Boldyshev | Site hack.co.za

bedie is a beos (5.0/4.5) local dos exploit which exploits a kernel bug. ASM source and binary included.

tags | exploit, kernel, local
systems | beos
MD5 | 257010ec6b7777f6ad6eb77d96fe9b78
Posted Apr 19, 2000
Site hack.co.za

BizDB is a web databse integration product using perl CGI scripts. One of the scripts, bizdb-search.cgi, has an unchecked open() call and can therefore be made to execute commands at the privilege level of the webserver. Remote exploit included.

tags | exploit, remote, web, cgi, perl
MD5 | 401db6658201fb288a1f18f7a06f55e7
Posted Apr 19, 2000
Authored by Nelson Brito | Site stderr.sekure.org

farpce.pl - Force ARP Cache Entries. Force ARP Cache Entries Perl Script was designed to help System/Network administrators to prevent ARP Cache Poisoning / ARP spoofing. It's a simple and powerful perl script, based on forcehwaddr by John Goerzen.

tags | perl, spoof
systems | unix
MD5 | 5305288ebffd54ac3c8141ef9663fd35
Posted Apr 19, 2000
Authored by Axess | Site b0f.com

BufferOverflow Advisory #2 - The NetOp Remote Control for NT tool allows anyone with a client to connect to the host software and download any file. Version 6 is vulnerable.

tags | remote, overflow
MD5 | 90008d5a73104863d3757608ebafa575
Posted Apr 19, 2000
Authored by Slash | Site b0f.com

Evaluating the Security of a NT System Part II - In depth information on NT security. Includes discussion of Groups and User rights, The Administrator Account and Administrators Group, The Guest Account and Everyone Group, Files Folders Permissions and Shares, Virus and Trojan Horse Controls, Auditing and Event Logs, and backup.

tags | trojan, virus
MD5 | fe7e11cad54e919bd29cead6d72f68af
Posted Apr 19, 2000
Authored by Alek O. Komarnitsky | Site sni.net

nmap-web v1.3 is a quick-n-dirty Web interface to nmap. It's some simple Perl/CGI script(s) you install on your web server which allows you to submit nmap commands (and receive the responses) through a web interface.

Changes: Add option to show ports NOT open, Add stuff to handle POP and IMAP, and bug fixes. Screen shots available here.
tags | tool, web, cgi, perl, nmap
systems | unix
MD5 | 8d29c9bdd70c507875baaf5afc5cc9be
Posted Apr 19, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM April 15, 2000. In this issue: AES News, The French Banking Card Hack, Counterpane -- Featured Research, Counterpane Internet Security News, The Doghouse: Cyber Security Information Act, Microsoft Active Setup "Backdoor", The Uniform Computer Information Transactions Act (UCITA), and Comments from Readers.

tags | crypto, magazine
MD5 | d93d0000a465fb78f5280670665ca022
Page 1 of 1

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By