exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2000-04-20

gr2k.zip
Posted Apr 20, 2000
Authored by psico nauta

Getting r00t 2k. A hacking guide for newbies that is completely written in Spanish. This has been created as a knowledge base for an understanding of hacking in South America and Spain as knowledge of hacking has gained more importance in these areas.

SHA-256 | 1773578b04e321244b6e66f4d60c103506061359e9e02c2945bfe8b49ffb063a
saint-2.0.1.tar.gz
Posted Apr 20, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 6dd4c82c81b35846a579cd99abd16083fe4815afbee039265e9bba71445d6be5
win98-bluescreen.txt
Posted Apr 20, 2000
Authored by RUBINHO

More ways to abuse c|/con/con - In mail with html tags, in normal html, serv-u ftp, and win registry.

tags | exploit, registry
SHA-256 | dbd63bc06595239243344b801d6472325cf936204765a3d9446777ea220235b9
safer.000317.EXP.1.5
Posted Apr 20, 2000

S.A.F.E.R. Security Bulletin 000317.EXP.1.5 - Remote user can obtain list of directories on Netscape. Netscape Enterprise Server with 'Web Publishing' enabled can be tricked into displaying the list of directories and subdirectories, if user supplies certain 'tags'.

tags | remote, web
SHA-256 | 28a1f7d9a52e29f7b6c7169a7703161db67a48f4e7b0b0a67e10192242dcf897
RFP2K03.txt
Posted Apr 20, 2000
Authored by rain forest puppy | Site wiretrip.net

RFP2K03 - Contemplations on dvwssr.dll and how it affects life. Lots of information here. Also includes a fixed versoin of the perl exploit.

tags | exploit, perl
SHA-256 | 35d74c40a89b7e8cc70b2ff471f069a45fac739fddcdc7582bf99957b60ddc84
g2kBIOSspoof.zip
Posted Apr 20, 2000
Authored by Sodaphish

Windows keystroke logger - aimed at stealing a bios password. Visual Basic source included.

systems | windows
SHA-256 | 38c777ce53e8e33d266e679904dd73d55ae1d45ada9d5ba0a9dbe61ef92a6db6
OS2HKS.ZIP
Posted Apr 20, 2000
Authored by Johnny Cyberpunk

OS/2 suite of hacking tools - dnsscan scans a range of ip's for presents and resolves hostname, tcpscan is a classical connect() scanner for TCP service ports, udpscan scans UDP service ports, nbping Netbios information gathering tool, rhs, an os/2 trojan, epwrna is a portmapper service daemon, and rnc is the client for the trojan.

tags | udp, trojan, tcp
SHA-256 | 3250b4a3bdd558904de809b765769a243ce5de6535df2a5edd0393d7a5bc0da1
sentinel-0.6.tar.gz
Posted Apr 20, 2000
Authored by Bind | Site subterrain.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Minor code changes and cleanups, thanks to vacuum for his contributions.
tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 02e142e7a8a5cfef8d6e749c0d6701a73239b098fd104c2605164562580266ef
sftp-0.9.2.tar.gz
Posted Apr 20, 2000
Authored by Brian Wellington | Site xbill.org

Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process.

Changes: Bug fixes.
tags | remote, shell, root, encryption, protocol
SHA-256 | 85a5c78020ddfa0bfb731ac1339828ffb05581c43a3501e9bda5390d6be56624
syslog-ng-1.4.3.tar.gz
Posted Apr 20, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Stable release - contains bug fixes from the development branch.
tags | system logging
systems | unix
SHA-256 | bf0f60d0b240aad222ca48ebc861079b157b3ac72482591e0f9314e126752c56
cgimail.txt
Posted Apr 20, 2000
Authored by Chopsui-cide

Anyone who can execute CGIMailer (anyone who can use the forms that use CGIMailer) can specify what configuration file to use and this can be any file on the system CGIMailer is running on. This allows for the existance of private files to be detected. There are more dangerous implications though: this vulnerability could possibly be exploited to obtain private files from the target system. If there is an FTP server running on the target system on which an attacker has upload priviledges, he/she could upload a malicious configuration file, and then run it using CGIMailer. Configuration files can be used to send files to the attacker via e-mail (among other things).

tags | exploit
SHA-256 | 93e43f717e47063b7aa4ac1264f4e1f4436a2587838dfecd4a1ffd48d2008703
ircii_exploit.txt
Posted Apr 20, 2000
Authored by Bladi, Almudena

Two exploits are included in this. It is a dcc chat buffer overflow in seperate exploits for linux and mirc.

tags | exploit, overflow
systems | linux
SHA-256 | f3545aeb86c142cd44d2d9e66a6762114035037eafe2d84e99ae2888730f8e89
grout-pre.tar.gz
Posted Apr 20, 2000
Authored by Ambient Empire

The geographical tracerouter for unix. It combines the fastest tracerouter with the ability to locate where the intermediate machines are located in the world.

tags | tool
systems | unix
SHA-256 | 957f35ba6bc4b75bb8076c3128b95ecfa078b5d0d8f18661cc29bd277d65b82a
lincrack.c
Posted Apr 20, 2000
Authored by w0rm

This is a very flexible, easy to use password cracker for the Linux/Unix platform. Just specify the dictionary file and the passwd file and your set. It attempts to crack each password in the passwd file using the words from the dictionary file.

tags | cracker
systems | linux, unix
SHA-256 | aaa548be3dd9642b28de076a0c47d9219f6698481dd270e20087bb6b40e3c253
ports2.c
Posted Apr 20, 2000
Authored by Dorian Goldman

Port scanner with a nice interface. Prompts for banner.

tags | tool, scanner
systems | unix
SHA-256 | 8bd800104043b93ad61675985333a24b5e4beecff4a27488c42726047481d2a1
f_ps.c
Posted Apr 20, 2000
Authored by telar

Fake PS. A ps trojan that hides multiple services of your choice.

tags | tool, trojan
systems | unix
SHA-256 | 3e09bcc70563d501bf7435df4fda3acaa09a7abdba7db06486c4dfa3bbb3af65
adv5.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit

systems | linux
SHA-256 | 6477942c86ee6dd52bac80bf956cbed6863e52d464ae92b66bef9d20f7902b03
adv4.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)

systems | linux
SHA-256 | 189114c1fe799648b677c16aa36fcc179942f685bacb5b0318c678f0cb0f01b9
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close