exploit the possibilities
Showing 1 - 25 of 25 RSS Feed

Files Date: 2000-05-09

Posted May 9, 2000
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: Bug fixes, support for compressed database using zlib, and updated Mhash support along with linkname checking.
tags | tool, intrusion detection
systems | unix
MD5 | 0b2ed9eb3b608a19418800b87f5be848
Posted May 9, 2000
Authored by Moritz Both | Site comlink.apc.org

ipac is an IP accounting package for Linux which collects, summarizes, and nicely displays IP accounting data. The output of ipac can be a simple ASCII table, an ASCII graph, or even images with graphs showing traffic progression. ipac can be used for IP traffic analysis and for accounting purposes.

Changes: Bug fix in ipacsum.
systems | linux
MD5 | 0867c9fa75d0e07b10072cd83d6dd1e5
Posted May 9, 2000
Site l0pht.com

Heimlich, Proof-of-concept tool for Win98 (47kB), can be used in regards to the eToken vulnerability.

systems | windows
MD5 | 5818c71e9174404e37fd6c3553e2e549
Posted May 9, 2000
Authored by Kingpin | Site l0pht.com

l0pht Security Advisory - eToken Private Information Extraction and Physical Attack. Aladdin Knowledge Systems' (http://www.ealaddin.com) eToken is a portable USB (Universal Serial Bus) authentication device providing complete access control for digital assets. eToken stores private keys, passwords or electronic certificates in a hardware token the size of a house key. The eToken makes use of two-factor authentication. Using the legitimate user's PIN number ("what you know") and the physical USB key ("what you have"), access to the public and private data within the key will be granted.

tags | web
MD5 | 97f4c19f2239b97a10ed938e821a3388
Posted May 9, 2000
Authored by oblivion | Site l0pht.com

l0pht Security Advisory - NetStructure 7180 remote backdoor vulnerability. The NetStructure 7180 can be compromised via the admin console even after the admin password has been changed. Root access can be obtained via the Internet when used in a poorly configured or default configuration. Additionally, web based management authentication is done in the clear.

tags | remote, web, root
MD5 | 985179a32afe579a2b6c1814fb00fd31
Posted May 9, 2000
Authored by oblivion | Site l0pht.com

l0pht Security Advisory - NetStructure 7110 console backdoor. The NetStructure 7110 can be compromised via the admin console even after the admin password has been changed. An undocumented command list exists known as 'wizard' mode. Through this mode there is a password that overides the admin password and allows full access to the internal components of the NetStructure 7110. This password can be used from within the admin command line interface or to overide the admin password at an initial login prompt.

MD5 | b639f43b08ef928267b0e36a153b17a0
Posted May 9, 2000
Authored by Gerard Paul Java | Site cebu.mozcom.com

IPTraf 2.2.0 is an ncurses-based IP LAN monitor that generates various network statistics including TCP info, UDP counts, ICMP and OSPF information, Ethernet load info, node stats, IP checksum errors, and others.

Changes: Minor bug fixes, Promiscuous mode state restoration on exit is now suitable for bridges, automatic and manual removal of on-screen idle/closed/reset TCP connection entries and some logging improvements were added.
tags | tool, udp, sniffer, tcp
MD5 | 9bb42b28a8a467c5e0d5eee085597f8c
Posted May 9, 2000
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Bug fixes, changes from the OpenBSD version implemented, ssh2 protocol support, documentation updates.
tags | encryption
systems | linux, openbsd
MD5 | 437f4009dab203b2f7969cd75f7681b1
Posted May 9, 2000
Authored by vade79, realhalo | Site realhalo.org

Major security issue with networksolutions.com(easysteps.pl). This is being distributed amongst the irc.

tags | exploit
MD5 | ea9e53ee2ca38d7ea11a151009c573a9
Posted May 9, 2000
Authored by Axess | Site b0f.com

-(- Neon beta4 -)- Simple Host or Iplist Cgi Scanner ( 356 ) Checks

tags | cgi
MD5 | fcbbe41e4081d6f3ffc4902b86c685c9
Posted May 9, 2000
Authored by Ali Akcaagac | Site fh-wilhelmshaven.de

Palmpower PilotDis is a disasssembler for palm binaries.

systems | linux
MD5 | 8a8b5fe2fe29bebdc5dcdc2a651baf68
Posted May 9, 2000
Authored by sirius | Site b0f.com

Exploit/DoS for OmniHTTPd pro v.2.06 Win98 (NT not tested). The result is crash of remote server.

tags | remote
systems | windows
MD5 | bcacbf9c5c4468cc5daa396b467a2b3e
Posted May 9, 2000
Site freebsd.org

FreeBSD Security Advisory - gnapster(version 1.3.8 and earlier), from the ports collection, contains a vulnerability which allows remote gnapster users to view any file on the local system which is accessible to the user running gnapster. Gnapster does not run with elevated privileges, so it is only the user's regular filesystem access permissions which are involved.

tags | remote, local
systems | freebsd
MD5 | 8ece451b6b55885a4911d9d9bcbf0b6f
Posted May 9, 2000
Site freebsd.org

FreeBSD Security Advisory - A buffer overflow in libmytinfo may yield increased privileges with third-party software.

tags | overflow
systems | freebsd
MD5 | 14ec5af243c48c0a19080c1da3a7ca7a
Posted May 9, 2000
Site freebsd.org

FreeBSD Security Advisory - golddig, from the ports collection, erroneously installs a level-creation utility setuid root, which allows users to overwrite the contents of arbitrary local files. It is not believed that any elevation of privileges is possible with this vulnerability because the contents of the file are a textual representation of a golddig game level which is highly constrained.

tags | arbitrary, local, root
systems | freebsd
MD5 | e80dfab428f54601385c02d8c9ecb031
Posted May 9, 2000
Authored by Ulli Meybohm | Site meybohm.de

Chameleon is a new experimental file encryption tool using a password-generated, plaintext-feedbacked 2048 bit key, feedbacked xor-chains, and a dummy-header system. It is designed to give the encrypted files a better security against brute-force and known-plaintext attacks.

tags | encryption
MD5 | e50e1e4fa26e25504243b129041a04e9
Posted May 9, 2000
Authored by Francis J. Lacoste | Site indev.insu.com

Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. It supports multiple interfaces, masquerading and packet accounting. Fwctl doesn't replace a good security engineer, but it can make the job of the security engineer simpler.

Changes: Fix for a security hole which caused failure to report packets handled by a chain with a hyphen in the name.
tags | tool, firewall
systems | linux
MD5 | 8ed8bd584562bccb57c6c9f3f6bd972c
Posted May 9, 2000
Authored by spyder

Possible source to the Love Letter virus. Originally submitted to Packet Storm as Win32DLL.txt. Submitted by Ingenius N.N. who warns "Do not rename Win32DLL.txt with .vbs extention".

tags | virus
MD5 | bf87e31dc502ff88d7a0328493ba0bed
Posted May 9, 2000
Authored by X-Force | Site xforce.iss.net

ISS Security Advisory - TOP 10 VULNERABILITIES - The top 10 vulnerabilities represent the most commonly found and exploited high-risk vulnerabilities on the Internet. This list is derived from various trusted sources including ISS X-Force analysis, customer input, ISS Professional Services, and security partners. The top 10 list is maintained by ISS X-Force and distributed quarterly with the ISS Alert Summary.

tags | vulnerability
MD5 | 382f41373418bf00a703f64aac391ba2
Posted May 9, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: Many protocol decoders updated (DHIS/DDTP, OSI CLNP, CLTP, and ISIS, PPP, RTSP, IPv6, LPD, RTSP, DNS, FTP, ISAKMP, and SINEC H1), new decoders for OSI ESIS, RTCP, RTP, and the MS Proxy Protocol, The GUI behavior has been tweaked, the Win32 version now has a program icon, and some internals have changed.
tags | tool, sniffer, protocol
systems | unix
MD5 | fb9df9d4f9725ed168d7743ca80731d4
Posted May 9, 2000
Authored by RazboiniK | Site members.xoom.com

IRC plugin for BO2K v1.0. It is an IRC client, Channel Bot style. Is fully customizable and once logged into an IRC server, it is remotely administrable through the IRC /msg or /query commands. The bot will rejoin any channel where get kicked, reconnect on disconnect, generate random nicks on raw 432 or 433, can delete, list, copy, spawn files on remote machine through irc... Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
MD5 | 295058fb5d24f2a539f26f36e7352823
Posted May 9, 2000
Authored by Snafu | Site overloaded.org

Jport is a simple Java portscanner. Source and binary included. Works best under linux, uses 150 threads. The New version has more features than ever including Port Identifications and New Threading System Increases Speed.

tags | java
systems | linux
MD5 | 79a9158a1cc7891b1385b97ebe07c069
Nmap Scanning Utility 2.53
Posted May 9, 2000
Authored by Fyodor | Site insecure.org

Nmap 2.53 - Nmap v2.53 is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: Fixed a commenting issue that could cause trouble for non-GNU compilers and added a few new services to nmap-services.
tags | tool, remote, tcp, nmap
systems | unix
MD5 | 592ace3a758e31740d70d7ce4a2dd21c
Posted May 9, 2000
Authored by Cruciphux | Site welcome.to

A paper written to describe and give a brief overview of events on the whole www.apache.org hack.

tags | paper
MD5 | 9cd431acb07b6adb4e6aa2e57264b269
Posted May 9, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Fixed bugs in Access control for DENY type, fixed bugs to cause the system crash, fixed bugs lidsadm when updating.
tags | kernel, root
systems | linux
MD5 | 74d7975605cfc70a182d3d980bf88783
Page 1 of 1

File Archive:

July 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    13 Files
  • 2
    Jul 2nd
    12 Files
  • 3
    Jul 3rd
    1 Files
  • 4
    Jul 4th
    2 Files
  • 5
    Jul 5th
    34 Files
  • 6
    Jul 6th
    21 Files
  • 7
    Jul 7th
    21 Files
  • 8
    Jul 8th
    13 Files
  • 9
    Jul 9th
    6 Files
  • 10
    Jul 10th
    1 Files
  • 11
    Jul 11th
    3 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    19 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    15 Files
  • 16
    Jul 16th
    9 Files
  • 17
    Jul 17th
    2 Files
  • 18
    Jul 18th
    2 Files
  • 19
    Jul 19th
    19 Files
  • 20
    Jul 20th
    21 Files
  • 21
    Jul 21st
    53 Files
  • 22
    Jul 22nd
    14 Files
  • 23
    Jul 23rd
    14 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By