exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2000-05-24

labs42.txt
Posted May 24, 2000
Site ussrback.com

USSR Advisory #42 - HP Web JetAdmin remote denial of service attack. HP Web JetAdmin Version 6.0 for Windows NT / 2000 has a heap overflow. Sending a malformed URL the JetAdmin service which runs on port 8000 will cause it to stop responding.

tags | remote, web, denial of service, overflow
systems | windows
SHA-256 | b4251729211b04a255d527fe18341e1736747e209fc075c277e456f5b72bec0c
labs41.txt
Posted May 24, 2000
Site ussrback.com

USSR Advisory #41 - HP Web JetAdmin web interface server directory traversal vulnerability. HP Web JetAdmin Version 5.6 for Windows NT and 2000 (tcp port 8000) allows an attacker to read any file outside of the intended web-published filesystem directory. Exploit URL included.

tags | web, tcp
systems | windows
SHA-256 | 34a2c44b058e084b3e456e3f6fa27bcde80cc025fec19e5da65ab6189b9027a1
pat2.tgz
Posted May 24, 2000
Authored by Mixter | Site mixter.void.ru

Ping Analysis Tool II (PAT) performs icmp echo scans on a range of ip addresses as fast as physically possible. Features a dual-threaded scanning process and allows you to scan from a list of IP's.

SHA-256 | 8439bbaf530edef8540c0a91d5e8db14e343611eef1a9c0d9de2ea4f516e736e
saint-2.1.beta2.tar.gz
Posted May 24, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | a11fb20b7483f408d30ebabbfbf9d4fa739174d8f83dcd85e0c9d975b5737093
dnsloop.tar.gz
Posted May 24, 2000
Authored by Hugo Breton

There is a remote denial of service exploit against tcpdump. Tcpdump interprets UDP packets on port 53 as DNS traffic, however, domain names in DNS packets use a compression scheme that jumps to a particular offset in the packet to avoid multiple occurances. Sending a packet that has the offset set to a particular location and if a program trying to decompress the domain name does not have a strategy for avoiding infinite loops, tcpdump may fall into an infinite loop.

tags | exploit, remote, denial of service, udp
SHA-256 | 3cb11869215cdb4a624ad46e732b853b543df65c25669d3daa61fa3108233ad0
scs11.zip
Posted May 24, 2000
Authored by Meliksah Ozoral | Site meliksah.net

Simpsons CGI Scanner v1.1 - Windows based CGI / web server vulnerability scanner with a simpsons theme. Tested on Windows 95/98/2000/NT. Allows use of your own CGI database.

Changes: New vulnerabilities added, bugs fixed.
tags | tool, web, cgi, scanner
systems | windows
SHA-256 | eccab2ea264b74d35a86a8974f46766f2f878add00bf8ca13d7e4f6fff37b1bb
b0f5-Qpopper.txt
Posted May 24, 2000
Authored by Prizm | Site b0f.freebsd.lublin.pl

BufferOverflow Security Advisory #5 - Remote shell via Qpopper2.53. qpop_euidl.c exploit included. Requires a qpop account and gives UID mail.

tags | exploit, remote, overflow, shell
SHA-256 | 3b9258be6be245c764411f6a0fb9887e6d3353efa7d0f966e6a4b94561a41ad0
ciscowebdos.pl
Posted May 24, 2000
Authored by hypoclear of lUSt

Cisco IOS Router DOS attack via a specially formatted web get request.

tags | web, denial of service
systems | cisco
SHA-256 | 46a1c083fa6d3a214e4d19120ba7ff3d0e614a13e73bbee75c39e927cf55ca4e
CiscoAuditingTool-v1.tar.gz
Posted May 24, 2000
Authored by G0ne | Site scrypt.net

Cisco Auditing Tool - Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.

tags | perl, vulnerability
systems | cisco
SHA-256 | 83f0404b49b0651b5b06b1a0938a579429b8de76f749a2b92532493f0ecbdcfc
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close