exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2000-04-20

gr2k.zip
Posted Apr 20, 2000
Authored by psico nauta

Getting r00t 2k. A hacking guide for newbies that is completely written in Spanish. This has been created as a knowledge base for an understanding of hacking in South America and Spain as knowledge of hacking has gained more importance in these areas.

MD5 | 9208a6e6cfd4da20f4402f082998d81d
saint-2.0.1.tar.gz
Posted Apr 20, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
MD5 | 6b280553fc04d5a2f48645a9b09d921c
win98-bluescreen.txt
Posted Apr 20, 2000
Authored by RUBINHO

More ways to abuse c|/con/con - In mail with html tags, in normal html, serv-u ftp, and win registry.

tags | exploit, registry
MD5 | c0b4300165f98b796552d4d6959b3013
safer.000317.EXP.1.5
Posted Apr 20, 2000

S.A.F.E.R. Security Bulletin 000317.EXP.1.5 - Remote user can obtain list of directories on Netscape. Netscape Enterprise Server with 'Web Publishing' enabled can be tricked into displaying the list of directories and subdirectories, if user supplies certain 'tags'.

tags | remote, web
MD5 | 60df3f8b4459cf2b98238ef1b0d2793c
RFP2K03.txt
Posted Apr 20, 2000
Authored by rain forest puppy | Site wiretrip.net

RFP2K03 - Contemplations on dvwssr.dll and how it affects life. Lots of information here. Also includes a fixed versoin of the perl exploit.

tags | exploit, perl
MD5 | a0e102ff20a8533fc809e1c21dc5dc20
g2kBIOSspoof.zip
Posted Apr 20, 2000
Authored by Sodaphish

Windows keystroke logger - aimed at stealing a bios password. Visual Basic source included.

systems | windows
MD5 | 9c715294ff53e44d81234a65127ed5f6
OS2HKS.ZIP
Posted Apr 20, 2000
Authored by Johnny Cyberpunk

OS/2 suite of hacking tools - dnsscan scans a range of ip's for presents and resolves hostname, tcpscan is a classical connect() scanner for TCP service ports, udpscan scans UDP service ports, nbping Netbios information gathering tool, rhs, an os/2 trojan, epwrna is a portmapper service daemon, and rnc is the client for the trojan.

tags | udp, trojan, tcp
MD5 | 79b1f59f72fcb0ded2552911b22983ad
sentinel-0.6.tar.gz
Posted Apr 20, 2000
Authored by Bind | Site subterrain.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Minor code changes and cleanups, thanks to vacuum for his contributions.
tags | tool, remote, intrusion detection
systems | unix
MD5 | 83b659757c2d70a89e302ec3106499a5
sftp-0.9.2.tar.gz
Posted Apr 20, 2000
Authored by Brian Wellington | Site xbill.org

Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process.

Changes: Bug fixes.
tags | remote, shell, root, encryption, protocol
MD5 | 105350312b365b55436706cefc5d1abb
syslog-ng-1.4.3.tar.gz
Posted Apr 20, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Stable release - contains bug fixes from the development branch.
tags | system logging
systems | unix
MD5 | 8eae4931bd32cd8c2a9b7ef9a8606f9e
cgimail.txt
Posted Apr 20, 2000
Authored by Chopsui-cide

Anyone who can execute CGIMailer (anyone who can use the forms that use CGIMailer) can specify what configuration file to use and this can be any file on the system CGIMailer is running on. This allows for the existance of private files to be detected. There are more dangerous implications though: this vulnerability could possibly be exploited to obtain private files from the target system. If there is an FTP server running on the target system on which an attacker has upload priviledges, he/she could upload a malicious configuration file, and then run it using CGIMailer. Configuration files can be used to send files to the attacker via e-mail (among other things).

tags | exploit
MD5 | f7de5eda40daf04436bf842b5da50d4e
ircii_exploit.txt
Posted Apr 20, 2000
Authored by Bladi, Almudena

Two exploits are included in this. It is a dcc chat buffer overflow in seperate exploits for linux and mirc.

tags | exploit, overflow
systems | linux
MD5 | a5f3255a68ccceb208d72b8d2e5f1fbe
grout-pre.tar.gz
Posted Apr 20, 2000
Authored by Ambient Empire

The geographical tracerouter for unix. It combines the fastest tracerouter with the ability to locate where the intermediate machines are located in the world.

tags | tool
systems | unix
MD5 | 2b22b0680b0027a6f60dc4f12d203b2d
lincrack.c
Posted Apr 20, 2000
Authored by w0rm

This is a very flexible, easy to use password cracker for the Linux/Unix platform. Just specify the dictionary file and the passwd file and your set. It attempts to crack each password in the passwd file using the words from the dictionary file.

tags | cracker
systems | linux, unix
MD5 | 4988dce5e71a1b4fae889ae0c7acce77
ports2.c
Posted Apr 20, 2000
Authored by Dorian Goldman

Port scanner with a nice interface. Prompts for banner.

tags | tool, scanner
systems | unix
MD5 | 3e009f9ae1655421c4bcd80435522a9c
f_ps.c
Posted Apr 20, 2000
Authored by telar

Fake PS. A ps trojan that hides multiple services of your choice.

tags | tool, trojan
systems | unix
MD5 | 3b2a131e934d43012b1108d992a3d19d
adv5.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit

systems | linux
MD5 | a94bcdee982bff03ff71e70305a88ffb
adv4.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)

systems | linux
MD5 | b290036932315c697d3155d24cc64fd7
Page 1 of 1
Back1Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    2 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close