Exploit the possiblities
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-05-14

msoua.txt
Posted May 14, 2000
Authored by Dildog | Site l0pht.com

L0pht Security Advisory - Microsoft Office 2000 UA Control Scripting is categorized as being "safe for scripting", allowing malicious active content to execute regardless of macro virus protection settings. Scripts can be executed without users consent from any HTML page viewed with active scripting enabled, including both Internet Explorer and Outlook e-mail in their default configurations. Online demonstration of this vulnerability in action here.

tags | virus
MD5 | 0f6b61dc993c3fee2f57006f1e3e085b
Freak88.zip
Posted May 14, 2000
Authored by Freak88@dalnet | Site freak88.net

Freak88's Distributed Attack Suite is a windows trojan similar to wintrin00. It can connect up to 3 infected machines and start 65000 byte ICMP floods. Auto starts from the registry and copies itself to c:\windows\system.

tags | denial of service, trojan, registry
systems | windows
MD5 | 7dbf5b3a7be12d4ee861d5b33bfe1f2d
Bastille-1.0.4p1.tar.gz
Posted May 14, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1/6.2. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Version 1.1.0 runs on non-virgin systems, can be uninstalled, can run multiple times, and includes an accept-and-log-only mode.
systems | linux, redhat
MD5 | 1404d451e674dfc28fab8dd04bb5bb2a
mstream.analysis.txt
Posted May 14, 2000
Authored by David Dittrich | Site washington.edu

Analysis of the "mstream" distributed denial of service attack tool, based on the source code of "stream2.c", a classic point-to-point DoS attack tool. mstream is more primitive than any of the other DDoS tools.

tags | denial of service
MD5 | 82dd67ecacb8ff5731279209d4b70342
mslinux.jpg
Posted May 14, 2000

Microsoft Linux box cover. Very chilling, frightening, and funny too.

systems | linux, unix
MD5 | 0d02e8dd8b1606c82e88a541ad31da11
sendfile.pl
Posted May 14, 2000
Authored by vade79, realhalo | Site realhalo.org

sendfile.pl is a tool which uses echo to send files to any webserver which has an unchecked open() call in a cgi script.

tags | web, cgi
MD5 | 33971fcef545107c5761f80bcf94e386
allmanage.pl.txt
Posted May 14, 2000
Authored by BigHawk

Websites using Allmanage Website Administration Software 2.6 with the upload ability contain an easily exploited vulnerability wich gives you full add/del/change access in the user-account directories and you can change the files in the main directory of the CGI script.

tags | exploit, cgi
MD5 | 6c673912ffb5234417509e557ae3ee66
watcheador.zip
Posted May 14, 2000
Authored by Leon De Juda

Watcheador is a Windows application allows you to view ASP source code using the Index Server bug in IIS 4 & IIS 5. Written in Delphi 4.0. Comments in spanish.

tags | exploit, asp
systems | windows
MD5 | a9b9aedbbb66c3d3fbdfc825f1b48362
tinc-1.0pre1.tar.gz
Posted May 14, 2000
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: A new protocol, better portability and stability, bug fixes.
tags | encryption
MD5 | 675248b88ba8de616c41c4793af26968
Linux IPTables Firewall
Posted May 14, 2000
Authored by Netfilter Core Team | Site iptables.org

Iptables is built on top of netfilter: the new packet alteration framework for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects.

Changes: Fixes for kernel version 2.3.99-pre8.
tags | tool, firewall
systems | linux
MD5 | ed34a107917254c80be463ea38432963
silent.delivery.txt
Posted May 14, 2000

Silent delivery and installation of an executable on a target Windows computer is possible by combining some bugs. No client input other than opening an email or newsgroup post is neceassary, making the possibilities endless. The key component is from Georgi Guninski, the wordpad overflow. An ActiveX control does the rest. Exploit code included.

tags | exploit, overflow, activex
systems | windows
MD5 | dc902b45317dbb84fd57790a18d4b1e0
Page 1 of 1
Back1Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close