exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2000-04-20

Posted Apr 20, 2000
Authored by psico nauta

Getting r00t 2k. A hacking guide for newbies that is completely written in Spanish. This has been created as a knowledge base for an understanding of hacking in South America and Spain as knowledge of hacking has gained more importance in these areas.

MD5 | 9208a6e6cfd4da20f4402f082998d81d
Posted Apr 20, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
MD5 | 6b280553fc04d5a2f48645a9b09d921c
Posted Apr 20, 2000
Authored by RUBINHO

More ways to abuse c|/con/con - In mail with html tags, in normal html, serv-u ftp, and win registry.

tags | exploit, registry
MD5 | c0b4300165f98b796552d4d6959b3013
Posted Apr 20, 2000

S.A.F.E.R. Security Bulletin 000317.EXP.1.5 - Remote user can obtain list of directories on Netscape. Netscape Enterprise Server with 'Web Publishing' enabled can be tricked into displaying the list of directories and subdirectories, if user supplies certain 'tags'.

tags | remote, web
MD5 | 60df3f8b4459cf2b98238ef1b0d2793c
Posted Apr 20, 2000
Authored by rain forest puppy | Site wiretrip.net

RFP2K03 - Contemplations on dvwssr.dll and how it affects life. Lots of information here. Also includes a fixed versoin of the perl exploit.

tags | exploit, perl
MD5 | a0e102ff20a8533fc809e1c21dc5dc20
Posted Apr 20, 2000
Authored by Sodaphish

Windows keystroke logger - aimed at stealing a bios password. Visual Basic source included.

systems | windows
MD5 | 9c715294ff53e44d81234a65127ed5f6
Posted Apr 20, 2000
Authored by Johnny Cyberpunk

OS/2 suite of hacking tools - dnsscan scans a range of ip's for presents and resolves hostname, tcpscan is a classical connect() scanner for TCP service ports, udpscan scans UDP service ports, nbping Netbios information gathering tool, rhs, an os/2 trojan, epwrna is a portmapper service daemon, and rnc is the client for the trojan.

tags | udp, trojan, tcp
MD5 | 79b1f59f72fcb0ded2552911b22983ad
Posted Apr 20, 2000
Authored by Bind | Site subterrain.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Minor code changes and cleanups, thanks to vacuum for his contributions.
tags | tool, remote, intrusion detection
systems | unix
MD5 | 83b659757c2d70a89e302ec3106499a5
Posted Apr 20, 2000
Authored by Brian Wellington | Site xbill.org

Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process.

Changes: Bug fixes.
tags | remote, shell, root, encryption, protocol
MD5 | 105350312b365b55436706cefc5d1abb
Posted Apr 20, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Stable release - contains bug fixes from the development branch.
tags | system logging
systems | unix
MD5 | 8eae4931bd32cd8c2a9b7ef9a8606f9e
Posted Apr 20, 2000
Authored by Chopsui-cide

Anyone who can execute CGIMailer (anyone who can use the forms that use CGIMailer) can specify what configuration file to use and this can be any file on the system CGIMailer is running on. This allows for the existance of private files to be detected. There are more dangerous implications though: this vulnerability could possibly be exploited to obtain private files from the target system. If there is an FTP server running on the target system on which an attacker has upload priviledges, he/she could upload a malicious configuration file, and then run it using CGIMailer. Configuration files can be used to send files to the attacker via e-mail (among other things).

tags | exploit
MD5 | f7de5eda40daf04436bf842b5da50d4e
Posted Apr 20, 2000
Authored by Bladi, Almudena

Two exploits are included in this. It is a dcc chat buffer overflow in seperate exploits for linux and mirc.

tags | exploit, overflow
systems | linux
MD5 | a5f3255a68ccceb208d72b8d2e5f1fbe
Posted Apr 20, 2000
Authored by Ambient Empire

The geographical tracerouter for unix. It combines the fastest tracerouter with the ability to locate where the intermediate machines are located in the world.

tags | tool
systems | unix
MD5 | 2b22b0680b0027a6f60dc4f12d203b2d
Posted Apr 20, 2000
Authored by w0rm

This is a very flexible, easy to use password cracker for the Linux/Unix platform. Just specify the dictionary file and the passwd file and your set. It attempts to crack each password in the passwd file using the words from the dictionary file.

tags | cracker
systems | linux, unix
MD5 | 4988dce5e71a1b4fae889ae0c7acce77
Posted Apr 20, 2000
Authored by Dorian Goldman

Port scanner with a nice interface. Prompts for banner.

tags | tool, scanner
systems | unix
MD5 | 3e009f9ae1655421c4bcd80435522a9c
Posted Apr 20, 2000
Authored by telar

Fake PS. A ps trojan that hides multiple services of your choice.

tags | tool, trojan
systems | unix
MD5 | 3b2a131e934d43012b1108d992a3d19d
Posted Apr 20, 2000
Authored by teso

vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit

systems | linux
MD5 | a94bcdee982bff03ff71e70305a88ffb
Posted Apr 20, 2000
Authored by teso

vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)

systems | linux
MD5 | b290036932315c697d3155d24cc64fd7
Page 1 of 1

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By