what you don't know can hurt you
Showing 1 - 25 of 322 RSS Feed

Files Date: 2000-04-01 to 2000-04-30

Posted Apr 28, 2000
Authored by FallenAngel

How AustNet's Virtual World was hacked to reveal users real IP. Slightly crippled demonstration code included. Lots of information on the austnet hack available here.

tags | exploit
MD5 | 2656c2b54f61633943b715f088369b39
Posted Apr 28, 2000
Authored by Chopsui-cide | Site midgets.box.sk

Smart FTP v0.2 Beta denial of service.

tags | exploit, denial of service
MD5 | 2b412e4c038fbd930e061707c11085db
Nmap Scanning Utility 2.50
Posted Apr 28, 2000
Authored by Fyodor | Site insecure.org

Nmap v2.50 is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: New stable release! Contains 500 TCP/IP fingerprints for remote OS detection, direct RPC scanning (bypasses portmapper), Added ACK scanning and Window scanning for stealthy scanning of heavily firewalled hosts, Dozens of bug fixes and helpful tweaks.
tags | tool, remote, tcp, nmap
systems | unix
MD5 | 4fbc65b30bc117bfd0169121d741227a
Posted Apr 28, 2000

No information is available for this file.

MD5 | 8928e3653780d406db9c365c584c615e
Posted Apr 27, 2000
Authored by SnakeByte | Site kryptocrew.de

TFAK v3.0 is a client for 22 remote access trojans, and removes 257 remote access trojans and 9 file joiners. This is the first and only trojan scanner which is able to find new, unknown trojans. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Improved heuristics, the ability to scan entire folders, added the option to edit the autostarted files, automatic autostart file monitoring.
tags | remote, trojan
MD5 | 5a1aab513e67ad9e9a705dde2308a8c8
Posted Apr 27, 2000

fgets() is unsafely used in qpopper version 2.53.

tags | exploit
MD5 | d8c98f6f77bed4579d8a40dcbe530673
Posted Apr 27, 2000
Authored by Matt Power

Meeting Maker is a networked calendaring/scheduling software package that's estimated to be installed on over 700,000 desktops. Clients send passwords to a Meeting Maker server encoded using a polyalphabetic substitution cipher. Included perl script will decode passwords sent over the net.

tags | exploit, perl
MD5 | 6aa12572911a2db11e972569d941f6aa
Posted Apr 27, 2000
Authored by noir | Site hack.co.za

/usr/bin/lpset vulnerability in Solaris/SPARC 2.7.

tags | exploit
systems | solaris
MD5 | 54d2bd2b4f12959c9ef21f1ec38d019b
Posted Apr 27, 2000
Authored by Kil3r | Site hack.co.za

redhat 6.1 /usr/bin/man exploit.

tags | exploit
systems | linux, redhat
MD5 | 615c44e4e6b424aeadbc606befd53fa1
Posted Apr 27, 2000

Red Hat Security Advisory RHSA-2000:014-16 - The GUI portion of Piranha may allow any remote attacker to execute commands on the server. This may allow a remote attacker to launch additional exploits against a web site from inside the web server. This is an updated release that disables Piranha's web GUI interface unless the site administrator enables it explicitly.

tags | remote, web
systems | linux, redhat
MD5 | 06734cf99f93f95374a6dce7ba47e718
Posted Apr 27, 2000
Authored by DiGiT

Solaris 2.7 /usr/bin/lp local exploit, i386.

tags | exploit, local
systems | solaris
MD5 | d6d4028df3254b92a693b7db70dd2ced
Posted Apr 27, 2000
Authored by DiGiT

xsun2.c is a Solaris 7 x86 local root stack overflow for /usr/openwin/bin/Xsun.

tags | exploit, overflow, x86, local, root
systems | solaris
MD5 | 86c69c7b9a4bfb93d65ad4dae756f4f5
Posted Apr 27, 2000
Authored by Laurent Levier

/usr/bin/lpset local root exploit for sparc.

tags | exploit, local, root
MD5 | 039315a1ae2ffc9d35d71111e4ad05b9
Posted Apr 27, 2000
Authored by Funkysh

imwheel local root exploit (as discussed in RHSA-2000:016-02).

tags | exploit, local, root
MD5 | 3921848bcb87f1605cb4c04cd19564ba
Posted Apr 27, 2000
Authored by David Litchfield | Site cerberus-infosec.co.uk

Cerberus Information Security Advisory CISADV000427 - Cart32 secret password Backdoor. he Cerberus Security Team has discovered a serious security hole in Cart32 (http://www.cart32.com/) that can only be described as a blatant backdoor. Within cart32.exe, the main file that provides the cart's functionality, there is a secret hidden password that can be used to gain vital information such as other passwords and using these an attacker can modify the shopping cart's properties so that arbitary commands may be run on the server as well as gain access to customers' credit card details, shipping addresses and other highly sensitive information.

tags | web
MD5 | aaafc304f4c732e5e8a33ca3531727cf
Posted Apr 27, 2000
Authored by Lance Spitzner | Site enteract.com

Passive Fingerprinting is a method to learn more about the enemy, without them knowing it. Specifically, you can determine the operating system and other characteristics of the remote host using nothing more then sniffer traces. Though not 100% accurate, you can get surprisingly good results by looking at the TTL, TOS, Window Size, and DF bit. Includes information on changing your machines fingerprint on Linux and Solaris.

tags | paper, remote
systems | linux, unix, solaris
MD5 | 8bee07cbafbcbd2801a8aff717f7959d
Posted Apr 27, 2000
Authored by eth0 | Site b0f.freebsd.lublin.pl

Timbuktu Pro 2.0b650 denial of service exploit.

tags | denial of service
MD5 | 9f2830f69b5d9919739d014f885ba830
Posted Apr 27, 2000
Authored by winsd | Site win2000mag.com

Windows Security Update April 19 - In this issue: FrontPage 2000 Exposes Win2K Accounts, Buffer Overflow in Cmd.exe, Active Directory Mixed Object Access, Cisco IOS Subject to Denial of Service, Real Server Denial of Service, Netscape Communicator Exposes Local Files, Buffer Overflow and Path Exposure in HTimage, Internet Explorer 5.01 Allows Cross-Frame Navigation, Netware 5.1 Remote Administration Overflow, and Panda Security 3.0 Can Be Bypassed.

tags | remote, denial of service, overflow, local, magazine
systems | cisco, windows, 2k
MD5 | dab51a1fc4ea87162425f1819b5bd7bc
Posted Apr 27, 2000
Authored by djHD

Vulnerability found in cgi DNEWSWEB used for reading news groups from web. Its possible to overflow stack and read any file from remote host with web server rights. All versions and for all OSes exploitable. Example of reading file /etc/passwd for Linux included. Fixed in dnews 5.4c1, available here.

tags | exploit, remote, web, overflow, cgi
systems | linux
MD5 | 7fecf06e0095216f42b4c27cdb41a8d8
Posted Apr 27, 2000
Authored by Mike Richardson | Site quaking.demon.co.uk

KSnuffle is a network packet sniffer for KDE. It supports multiple concurrent sniffers, packet filtering (aka tcpdump), event triggers and commands, text and binary logging (and replay), remote sniffing (via a demon process), and dynamically loadable plugins. Network traffic is displayed graphically and in detail; supplied plugins summarise traffic by direction (incoming, outgoing), source, and destination.

tags | tool, remote, sniffer
MD5 | 69c2f97e99e3fe2738ecad7b90f97cd0
Posted Apr 27, 2000
Site cert.org

CERT Advisory CA-2000-03 - Continuing Compromises of DNS servers. Many systems are vulnerable to remote root bind bugs which are increasingly being exploited. A significant number of delegates DNS servers in the in-addr.arpa tree are running outdated version of DNS software as well. CERT

tags | remote, root
MD5 | 32549c6a877570f9948d9f777077df64
Posted Apr 26, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Compilation problem fixed.
tags | kernel, root
systems | linux
MD5 | 6057635d0b8d4ea6f7750e92f25fc027
Posted Apr 26, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
MD5 | 8b7cb945fc8652fe79162988509cf52a
Posted Apr 26, 2000
Site xforce.iss.net

ISS Security Advisory - Insecure file handling in IBM AIX frcactrl program. X-Force has discovered a vulnerability in the AIX frcactrl program. The Fast Response Cache Accelerator (FRCA) is a kernel module that can be used with the IBM HTTP server to improve the performance of a web server. If the FRCA module is loaded, a local attacker could use frcactrl, a program used to manage FRCA configuration, to modify files and/or gain root privileges.

tags | web, kernel, local, root
systems | aix
MD5 | 6566a16424151c35b034e6c7b6e2c165
Posted Apr 26, 2000
Authored by Darren Reed | Site coombs.anu.edu.au

IP Filter is a TCP/IP packet filter suitable for use in a firewall environment. To use, it can either be run as a loadable kernel module (recommended) or incorporated into your UNIX kernel. Scripts are provided to install and patch system files as required.

Changes: Fixes for parsing of range with portmap and NAT timeouts for ICMP packets, somewhat relaxed checking of FTP replies, and SunOS4 patches for ICMP redirects.
tags | tool, kernel, tcp, firewall
systems | unix
MD5 | 0f3a135630b60bbb53ee297d08da8964
Page 1 of 13

File Archive:

July 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    13 Files
  • 2
    Jul 2nd
    12 Files
  • 3
    Jul 3rd
    1 Files
  • 4
    Jul 4th
    2 Files
  • 5
    Jul 5th
    34 Files
  • 6
    Jul 6th
    21 Files
  • 7
    Jul 7th
    21 Files
  • 8
    Jul 8th
    13 Files
  • 9
    Jul 9th
    6 Files
  • 10
    Jul 10th
    1 Files
  • 11
    Jul 11th
    3 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    19 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    15 Files
  • 16
    Jul 16th
    9 Files
  • 17
    Jul 17th
    2 Files
  • 18
    Jul 18th
    2 Files
  • 19
    Jul 19th
    19 Files
  • 20
    Jul 20th
    21 Files
  • 21
    Jul 21st
    53 Files
  • 22
    Jul 22nd
    14 Files
  • 23
    Jul 23rd
    14 Files
  • 24
    Jul 24th
    1 Files
  • 25
    Jul 25th
    1 Files
  • 26
    Jul 26th
    21 Files
  • 27
    Jul 27th
    8 Files
  • 28
    Jul 28th
    9 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By