Exploit the possiblities
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-05-14

Posted May 14, 2000
Authored by Dildog | Site l0pht.com

L0pht Security Advisory - Microsoft Office 2000 UA Control Scripting is categorized as being "safe for scripting", allowing malicious active content to execute regardless of macro virus protection settings. Scripts can be executed without users consent from any HTML page viewed with active scripting enabled, including both Internet Explorer and Outlook e-mail in their default configurations. Online demonstration of this vulnerability in action here.

tags | virus
MD5 | 0f6b61dc993c3fee2f57006f1e3e085b
Posted May 14, 2000
Authored by Freak88@dalnet | Site freak88.net

Freak88's Distributed Attack Suite is a windows trojan similar to wintrin00. It can connect up to 3 infected machines and start 65000 byte ICMP floods. Auto starts from the registry and copies itself to c:\windows\system.

tags | denial of service, trojan, registry
systems | windows
MD5 | 7dbf5b3a7be12d4ee861d5b33bfe1f2d
Posted May 14, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1/6.2. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Version 1.1.0 runs on non-virgin systems, can be uninstalled, can run multiple times, and includes an accept-and-log-only mode.
systems | linux, redhat
MD5 | 1404d451e674dfc28fab8dd04bb5bb2a
Posted May 14, 2000
Authored by David Dittrich | Site washington.edu

Analysis of the "mstream" distributed denial of service attack tool, based on the source code of "stream2.c", a classic point-to-point DoS attack tool. mstream is more primitive than any of the other DDoS tools.

tags | denial of service
MD5 | 82dd67ecacb8ff5731279209d4b70342
Posted May 14, 2000

Microsoft Linux box cover. Very chilling, frightening, and funny too.

systems | linux, unix
MD5 | 0d02e8dd8b1606c82e88a541ad31da11
Posted May 14, 2000
Authored by vade79, realhalo | Site realhalo.org

sendfile.pl is a tool which uses echo to send files to any webserver which has an unchecked open() call in a cgi script.

tags | web, cgi
MD5 | 33971fcef545107c5761f80bcf94e386
Posted May 14, 2000
Authored by BigHawk

Websites using Allmanage Website Administration Software 2.6 with the upload ability contain an easily exploited vulnerability wich gives you full add/del/change access in the user-account directories and you can change the files in the main directory of the CGI script.

tags | exploit, cgi
MD5 | 6c673912ffb5234417509e557ae3ee66
Posted May 14, 2000
Authored by Leon De Juda

Watcheador is a Windows application allows you to view ASP source code using the Index Server bug in IIS 4 & IIS 5. Written in Delphi 4.0. Comments in spanish.

tags | exploit, asp
systems | windows
MD5 | a9b9aedbbb66c3d3fbdfc825f1b48362
Posted May 14, 2000
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: A new protocol, better portability and stability, bug fixes.
tags | encryption
MD5 | 675248b88ba8de616c41c4793af26968
Linux IPTables Firewall
Posted May 14, 2000
Authored by Netfilter Core Team | Site iptables.org

Iptables is built on top of netfilter: the new packet alteration framework for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects.

Changes: Fixes for kernel version 2.3.99-pre8.
tags | tool, firewall
systems | linux
MD5 | ed34a107917254c80be463ea38432963
Posted May 14, 2000

Silent delivery and installation of an executable on a target Windows computer is possible by combining some bugs. No client input other than opening an email or newsgroup post is neceassary, making the possibilities endless. The key component is from Georgi Guninski, the wordpad overflow. An ActiveX control does the rest. Exploit code included.

tags | exploit, overflow, activex
systems | windows
MD5 | dc902b45317dbb84fd57790a18d4b1e0
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

March 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    14 Files
  • 2
    Mar 2nd
    12 Files
  • 3
    Mar 3rd
    1 Files
  • 4
    Mar 4th
    3 Files
  • 5
    Mar 5th
    15 Files
  • 6
    Mar 6th
    23 Files
  • 7
    Mar 7th
    15 Files
  • 8
    Mar 8th
    15 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    2 Files
  • 11
    Mar 11th
    1 Files
  • 12
    Mar 12th
    16 Files
  • 13
    Mar 13th
    20 Files
  • 14
    Mar 14th
    14 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    15 Files
  • 17
    Mar 17th
    5 Files
  • 18
    Mar 18th
    2 Files
  • 19
    Mar 19th
    7 Files
  • 20
    Mar 20th
    15 Files
  • 21
    Mar 21st
    18 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By