Internet Security Systems (ISS) has identified a vulnerability in id Software's Quake3Arena that could allow an attacker to read or write files on a computer that has the software installed. This vulnerability is important to network administrators who may be unaware that users are accessing potentially malicious Quake3Arena servers outside their network.
8a4d017e58a2be864d22ccf98c21f702854bcc48268c04bd1317160450a209b9
NT Sniffer 0.01 - For NT4.0 includes a packet driver. Sniffs packets from networks and displays full information for: Ethernet, IP, TCP (data also), and UDP.
c8c50c798895bc540413534177006b7c4fe4d2bd9758eb5f974dc33a198194a5
The Evolution of Malicious Agents. This paper examines the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the possibility of a new breed of malicious agents currently being developed on the Internet.
a10ecef1e5e13582371d8c84dcc65e8d8f741b6f00a1563c581b35984387104d
s0ftpr0ject Security Advisory 003-000: Remotely Exploitable Buffer Overflow in Sniffit. Possibly all systems running Sniffit (0.3.7beta and all versions logging mail headers). Successful attacks depend on being able to craft shellcodes so they can bypass input filter.
a304b30bb689966880a997812a854919d1e4be60e485e7b36713ff31343e60ac
exman.c is a new man exploit.
832e578f11428c863468dabddea6bce1956334bf36020dad8673f91d5be34f3b
outp.c will convert .s files to shell code.
a73e95b1db0a4a21d695a880d2485a1846a07cce539dcd13bafb1682d7bf7492
Through a netbios session request packet with a NULL source name, Windows 9[5,8] show a number of odd responses. Everything from lockups, reboots and "the blue screen of death", to total loss of network connectivity. Source code included. Reverse engineered from a binary exploit already in use.
f3538a492ff6e70e86c22b289cde727edd32fe6a78aeb81e4c21dbecb58b573c