exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2000-04-19

Posted Apr 19, 2000
Authored by Dethy

Local exploit for Linux Mandrake 7.0's wmcdplay 1.0 beta 1. Unlike the Teso exploit for wmcdplay, this code exploits the -position argument.

tags | exploit, local
systems | linux, mandrake
SHA-256 | eed00eb19c97858a9e3a92302523c50bd3259f79d45239243286e9ab1b43681f
Posted Apr 19, 2000
Authored by Grampa Elite

Vulnerability: Any user can overwrite any file in the system with x11amp ver .70.

tags | exploit
SHA-256 | f854507d6d5cef408de353bd42cf556273c973adfc5e305c7058e4a61a099eab
Posted Apr 19, 2000

Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection

tags | paper, denial of service
SHA-256 | 2159a30060cec7d5e267b083c2935a46e14e8b1e37d3534565f3efa1ef7b3539
Posted Apr 19, 2000

MRTG is a The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing GIF images which provide a LIVE visual representation of this traffic. Check http://www.ee.ethz.ch/stats/mrtg/ for an example. MRTG is based on Perl and C and works under UNIX and Windows NT. MRTG is being successfully used on many sites around the net.

tags | tool, web, perl
systems | windows, unix
SHA-256 | 04f52e0390bd6cc108991b7624c21faa480891f43b97c671a973436de3a5f26b
FreeBSD Security Advisory 2000.13
Posted Apr 19, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:13 - generic-nqs v3.50.7 and earlier from the ports connection contains a local root compromise.

tags | local, root
systems | freebsd
SHA-256 | ef2592b6ee1f85613b4697dc9647ef182edb76c9b0b50c536c2611807caf36cc
Posted Apr 19, 2000
Authored by vade79, realhalo | Site realhalo.org

ide_expl.mrc is an ircii-4-4 exploit ported to mirc5.7, works reverse to ircii-4.4.c. You send the chat request instead of having them chat you, attempts to execute /bin/sh.

tags | exploit
SHA-256 | 07bb96538921b3cdfee62b6c246d8843f69f27f4c4ae7b182d900f7f81eee2fb
Posted Apr 19, 2000
Site vtun.sourceforge.net

VTun is the easiest way to create Virtual Tunnels over TCP/IP networks with traffic shaping, compression, and encryption. It is a user space implementation and doesn't need modification of any kernel parts. VTun supports IP, PPP, SLIP, Ethernet, and other tunnel types. VTun is easily and highly configurable; it can be used for various network tasks like VPN, Mobil IP, Shaped Internet access, Ethernet tunnel, IP address saving, etc.

Changes: This is the final stable 2.1 release. It features small cleanups, updated packages, and a Web site update. All users should upgrade.
tags | tool, kernel, tcp, firewall
systems | unix
SHA-256 | 9969309539ca09ea798ec04ecef5921b64b47129c9f14258c0084b0131ca997d
Posted Apr 19, 2000
Authored by Jonathan McDowell | Site earth.li

sersniff is a program for tunnelling/sniffing for between 2 serial ports, written to help aid with the decoding of the protocol for the Nokia 9000i Communicator. It also has support for TCP connections.

tags | tcp, protocol
systems | linux
SHA-256 | 7adb899fac13a9a2cbf14b0ab190cbb4945e712b35717a2822a31c8e67372857
Posted Apr 19, 2000
Authored by Tfreak | Site hack.co.za

lincity-svga local buffer overflow.

tags | exploit, overflow, local
SHA-256 | 0e992f611058e6475b476b93e2fd3551b88d4998ced583ba5f74cac10c7f8afa
Posted Apr 19, 2000
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 330 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.

Changes: Login time segfault fixed, and various GUI fixes.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
SHA-256 | 8354df17a4303145db8268d78cb122bd7bcea882785e20967e3b97731f5c5ac8
Posted Apr 19, 2000
Authored by Niall Smart | Site hack.co.za

lprm-bsd.c - Exploit for lprm local root vulnerability in OpenBSD and FreeBSD-stable.

tags | exploit, local, root
systems | freebsd, bsd, openbsd
SHA-256 | 5064c9b186987b843722ade89337e97adf457061ef2df4def5af44727cbd370f
Posted Apr 19, 2000
Site hack.co.za

ISC BIND 4.9.7-T1B local exploit - The named daemon will dump the named database to /var/tmp/named_dump.db when it receives a SIGINT signal. It does not check for symbolic links while doing so and can be made to overwrite any file in the system.

tags | exploit, local
SHA-256 | 7fa0d1d6006035097d0506453bbfab039ef2cfd3493040c536282fb994572502
Posted Apr 19, 2000
Authored by Mudge | Site l0pht.com

imap_core.sh is a quick proof of concept tool that causes some imapd implementations to dump core. Unfortunately the core file contains the password and shadow password file in it!

tags | exploit, proof of concept
SHA-256 | 5e97f6397d4e546bc641fcd0059100b35a6649499f07bf90d15bf975d7a592ee
Posted Apr 19, 2000
Site hack.co.za

Linux kernel 2.2.14 local DoS - When accessing a file or directory with a very long path the process hangs in an unkillable state. All other processes are SEGFAULTing when trying to access unkillable process' /proc entry. So system utilities ps, w, top, killall and the like are stoppping working. Except that, the system continues to function normally. The only solution is reboot.

tags | exploit, kernel, local
systems | linux
SHA-256 | fed62f7bfada74221cc3839183f0cc7c51740bb3db917b76f9a033646deaf593
Posted Apr 19, 2000
Authored by Konstantin Boldyshev | Site hack.co.za

bedie is a beos (5.0/4.5) local dos exploit which exploits a kernel bug. ASM source and binary included.

tags | exploit, kernel, local
systems | beos
SHA-256 | ae01773b2e23dc02ef439825f66b171c3495bc5f91bd0bf5201e831e687897d9
Posted Apr 19, 2000
Site hack.co.za

BizDB is a web databse integration product using perl CGI scripts. One of the scripts, bizdb-search.cgi, has an unchecked open() call and can therefore be made to execute commands at the privilege level of the webserver. Remote exploit included.

tags | exploit, remote, web, cgi, perl
SHA-256 | 0231145f36e7ae2640f0dc97b6b4306c0261fc240d851610ac7e3925a5697f20
Posted Apr 19, 2000
Authored by Nelson Brito | Site stderr.sekure.org

farpce.pl - Force ARP Cache Entries. Force ARP Cache Entries Perl Script was designed to help System/Network administrators to prevent ARP Cache Poisoning / ARP spoofing. It's a simple and powerful perl script, based on forcehwaddr by John Goerzen.

tags | perl, spoof
systems | unix
SHA-256 | 901b59be0ff785bba17c8553b59e3c1d7e22c94ccfcbf9bb9750261bd81ae958
Posted Apr 19, 2000
Authored by Axess | Site b0f.com

BufferOverflow Advisory #2 - The NetOp Remote Control for NT tool allows anyone with a client to connect to the host software and download any file. Version 6 is vulnerable.

tags | remote, overflow
SHA-256 | c8aecbf2235c9cb21ac221f98f56af1a9457a30fea67a017427f132b915b270a
Posted Apr 19, 2000
Authored by Slash | Site b0f.com

Evaluating the Security of a NT System Part II - In depth information on NT security. Includes discussion of Groups and User rights, The Administrator Account and Administrators Group, The Guest Account and Everyone Group, Files Folders Permissions and Shares, Virus and Trojan Horse Controls, Auditing and Event Logs, and backup.

tags | trojan, virus
SHA-256 | a3ba4426df164c8f53bb9b8b31d38d2bce9306adea7f9f2dd16ec49f84f8514d
Posted Apr 19, 2000
Authored by Alek O. Komarnitsky | Site sni.net

nmap-web v1.3 is a quick-n-dirty Web interface to nmap. It's some simple Perl/CGI script(s) you install on your web server which allows you to submit nmap commands (and receive the responses) through a web interface.

Changes: Add option to show ports NOT open, Add stuff to handle POP and IMAP, and bug fixes. Screen shots available here.
tags | tool, web, cgi, perl, nmap
systems | unix
SHA-256 | 8918bb87e8f342903d9bd37862343f0a882a573253e9d8d4c55f8a00cde77959
Posted Apr 19, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM April 15, 2000. In this issue: AES News, The French Banking Card Hack, Counterpane -- Featured Research, Counterpane Internet Security News, The Doghouse: Cyber Security Information Act, Microsoft Active Setup "Backdoor", The Uniform Computer Information Transactions Act (UCITA), and Comments from Readers.

tags | cryptography, magazine
SHA-256 | 1ecdc6ce3a58a7f087fe74065e4831f41987d3282b128d31159013cf3cd45bde
Page 1 of 1

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By