what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-05-12

seawall-3.0.tar.gz
Posted May 12, 2000
Authored by Tom Eastep | Site seawall.sourceforge.net

Seawall is an ipchains firewall that supports IP masquerading and can be used on a standalone system, on a dedicated firewall system or on a multi-use gateway/server. It supports VPN via IPIP tunnels and PPTP, has an easy to edit configuration file, and can be extended without modifying the base product. It also includes realtime monitoring with an audible alarm that sounds when suspect packets are detected.

Changes: New major release - Rewritten instalation script, updates are easier due to a second config file. Support for port forwarding, DMZ's, and PoPToP has been added, in addition to extensive documentation updates.
tags | tool, firewall
systems | linux
SHA-256 | c1e6b2a02f93a60cebb23853b7ab0496b72b1f0ab32f9250764cc4032875da8b
wpc-0_2b.tar.gz
Posted May 12, 2000
Authored by g1soft | Site members.xoom.com

WPC is a simple application that tries to guess usernames and passwords for password-protected web pages. This security tool is intended for webmasters.

Changes: Filters for specific http responses, improved http code, "configure" script tweaks.
tags | web
SHA-256 | 0a8216de126db4914a192cc687ed30f96963ee3768b34ef4e60d1edd74ff187a
pyro12.c
Posted May 12, 2000
Authored by Putois | Site asmbeginer.com

Pyro Scanner v1.2 scans for many web / cgi vulnerabilities and has the nice feature that it displays the server output so you can see what is really going on.

tags | tool, web, cgi, scanner, vulnerability
systems | unix
SHA-256 | 9ddc2b2e6e743728c84328afe7c7c42c29b91cf9abe474e97437c54bf302bf8d
nis-spoof.c
Posted May 12, 2000
Authored by Trevor Schroeder | Site zweknu.org

nis-spoof.c spoofs the response from a NIS server to a client.

tags | exploit, spoof
SHA-256 | e767ec14fcd1d8828d2216e5f793b7001d6f722f8cd0bbb2330dd185eed139b3
labs40.txt
Posted May 12, 2000
Site ussrback.com

USSR Advisory #40 - Remote DoS attack in Microsoft IIS 4.0 & 5.0 - Malformed Extension Data in URL Vulnerability. The Ussr Labs Team has recently discovered a memory problem in IIS. Performing an attack with specially-malformed information extension data in the URL will cause the server to slow or stop.

tags | remote
SHA-256 | 3ad2790a2aa9da5a9e68e4f05873fcf34d29c2e12efbfb4acaed60e374f2d48d
Neon_beta5.c
Posted May 12, 2000
Authored by Axess | Site b0f.freebsd.lublin.pl

Neon beta5 - Simple Host or Iplist cgi Scanner which does 358 checks.

Changes: Added more cgi, fixed better output.
tags | cgi
SHA-256 | a0fc3d293b0acf7825ebd5b79d94d7aa2fa74286565aaee9b6fc858b23fb9ae6
Internet Security Systems Security Advisory May 11, 2000
Posted May 12, 2000
Site xforce.iss.net

Internet Security Systems (ISS) X-Force has determined that Microsoft Internet Information Server (IIS) is vulnerable to a remote Denial of Service (DoS) attack. IIS is a popular web server application for Windows NT, and comprises the majority of Windows NT based web servers. This vulnerability may allow a remote attacker to effectively disable vulnerable versions of IIS.

tags | remote, web, denial of service
systems | windows
SHA-256 | b3f3869ababf8355003692b68bc463889b7d558c776dd4b96ffa2393d0ca1ac3
worm.txt
Posted May 12, 2000
Authored by Michal Zalewski | Site lcamtuf.na.export.pl

Writing Internet Worms for Fun and Profit - The love letter worm was very crude, and proof of concept code for much more powerful worms has been written. Expect next years worms to be architecture independent, invisable to the end user, spread without user intervention, learn and launch updated worms, polymorphic with no constant code, and dissapear after it has accomplished its objective.

tags | worm, proof of concept
SHA-256 | 4814e0d3497813ef018f3be0c85104943a8f0a6b10ad19514067d20f4a5d8653
cst1.tgz
Posted May 12, 2000
Authored by Toxic Ocean

Cum Security Toolkit (cst v1.0) - Contains a scriptscanner and a portscanner Coded in Java. The http-script scanner features the ability to use a proxy server, a scripts-to-scan database, anti-IDS url encoding, fake "X-Forwarded-For:" header, and uses fake "Referer: " info. The port scanner is a full TCP connection scanner which can scan port ranges and grab banners.

tags | java, web, tcp
SHA-256 | 4a48a8b8b4f3c855330733200affaf3d5fdca4f02a949b6e0d9a50938eab9560
bugzilla.txt
Posted May 12, 2000
Authored by Karin | Site root66.nl.eu.org

BufferOverflow Advisory: Unchecked system call in Bugzilla 2.8. The script used to submit new bugs, process_bug.cgi, is vulnerable because it does not check the contents of the who field. Includes perl remote exploit code.

tags | exploit, remote, overflow, cgi, perl
SHA-256 | c03b1338b6456d559d308a4ca0f67b5d6cb1acb1d1ed85a1dec83f1ca6175f4c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close