exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-07-04

Posted Jul 4, 2000
Site ussrback.com

LocalWEB HTTP Server v. 1.20 remote dos attack - Sending a malformed URL to port 80 causes a buffer to be overflow resulting in a denial of service. Includes perl exploit.

tags | remote, web, denial of service, overflow, perl
SHA-256 | ae66ac0f9d4486258392b6e5e9de670cd146472dcf0dbc59417ba7cdc6d2c386
Posted Jul 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: There is now support for decoding syslog, X11, and CLTP protocols. Ethereal can now read NetXRay 2.002 files and Linux ATM interfaces. The Win32 version now has the "Update list of packets in real time" feature.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 9ff7fcb05b8a07ee511ebc05a58ca5f30219fe52ddbcf08440e3171429e208c9
Posted Jul 4, 2000
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: Starting icmp id=0, a new null source IP option, and warns when the alias interface is used.
tags | tool
systems | unix
SHA-256 | 20a8198a37d49a72e13aefedfa5fa5a26e5a1cdf9d49c1c66fb85fa880fcfb6b
Posted Jul 4, 2000
Authored by Vetesgirl | Site self-evident.com

VetesCan Local is a shell script which checks local unix security, including checking for rootkits, log permissions, home/root directory accessability, inetd services, /etc/securetty, SUID/SGID files, World writable files, Unowned files, .rhosts, and cracks passwd/shadow.

tags | tool, shell, local, root, scanner
systems | unix
SHA-256 | b87698a55c3c26161c964db95c00a12d1ee3e098becb4a91e3438bbd9565a9b3
Posted Jul 4, 2000
Authored by Nelson Murilo

chkrootkit V. 0.15 locally checks for signs of a rootkit. Includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux 2.0.x, 2.2.x and FreeBSD 2.2.x, 3.x and 4.0.

Changes: lrk5 detection, Sun/Solaris support, and Red Hat fixes.
tags | tool, integrity, rootkit
systems | linux, unix, freebsd
SHA-256 | 9e7692f3446815890da483169ccdc3ecf6042caa923cd3052ced18f3a23e3cde
Posted Jul 4, 2000

chklastlog.c v1.3 checks lastlog and wtmp for signs of tampering. It will detect most log wiping programs, such as z2 and zap.

Changes: Linux/FreeBSD port, new Red Hat compatibility.
systems | unix
SHA-256 | 5c70a4d3d2f9a170c0fb3ab5fec5a3ac1e7f46bf1c40d812bf7e23dea65d5910
Posted Jul 4, 2000

Chkwtmp v1.1 checks /var/log/wtmp for signs of deletion, such as use of zap or z2 or similar log wiping programs. See also chklastlog.c

Changes: Linux/FreeBSD port by Nelson Murilo.
systems | unix
SHA-256 | ba47e452988bc30607f06ac77751c893e030993b529c900b16a3ba1333412053
Posted Jul 4, 2000
Authored by Txgreg

Ginastub.dll v1.0 - A WinLogon password grabber which records every users password as they log in.

SHA-256 | 03d0a2bb3624c1ddc5346e5a71863061db2223f16de32adea0a2c10dec3b9706
Posted Jul 4, 2000
Authored by Theo Nolte | Site adsl-nolte1.rz.rwth-aachen.de

lkpatch is a Linux kernel patcher. It connects to the fastest mirror, checks for new versions of the Linux kernel, downloads them, and patches your kernel source. It determines the fastest mirror by keeping track of previous download times.

Changes: Added support for 2.4.0-test kernels.
tags | kernel
systems | linux
SHA-256 | 3e96d24df9fae16e241d70ec67d9a3857e4e33174e16ac269547a219708a6bf1
Posted Jul 4, 2000
Authored by Djlizard

How to get the username and password for Juno.

tags | paper
SHA-256 | 931b70f501b1743f23d5148d2e962c364a3c4728582c4dc870f0ffd6e4c48c1f
Posted Jul 4, 2000
Authored by Odin | Site ojnk.sourceforge.net

Patch for Bash 2.02 and 2.03 which will log all user commands to /var/log/histories/(name), Disallow and log execution attempts when uid != euid, and sets a limit on the highest UID that can run the shell.

tags | shell, patch, bash
systems | unix
SHA-256 | a6b294895fa7688a2df91f6d204db1e74bb9c4584284bb32a4703d9d68a84cd9
Posted Jul 4, 2000
Authored by Odin | Site ojnk.sourceforge.net

iplog is a TCP/IP traffic logger capable of logging TCP, UDP and ICMP traffic. Features a DNS cache, the ability to detect port scans, null scans, and FIN scans, "smurf" attacks, bogus TCP flags used in OS detection, Xmas scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.

Changes: Much more portable, added support for a configuration file, better memory handling, bug fixes and documentation updates.
tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 8ae3c88c2f9ec0d6f417bf5889f728c4d3c94329a68a7c1c659f24c892eb0b28
Posted Jul 4, 2000
Authored by Hitek | Site mxeleet.org

iMesh V1.02 Beta build 117 remote exploit for Windows 98. Exploits a buffer overflow to download a file from a given URL and execute it on the remote host. Includes windows binary and C source.

tags | exploit, remote, overflow
systems | windows
SHA-256 | fdac6101b44177dac984a8a1c7f42db4cc6a06d01a432a007d4b060595a4cc66
Posted Jul 4, 2000
Authored by Steven Gurtler

This is a reference guide for the new hacker who needs to know the best websites for hacking, cracking, warez, and mp3's. July, 2000.

tags | paper
SHA-256 | aeb759c84d4999132670eea4f3844f370bc6af1b8b0a1785aa6d3ae44d6964e7
Posted Jul 4, 2000
Site debian.org

Debian Security Advisory - The canna package as distributed in Debian GNU/Linux 2.1 can be remotely exploited to gain access. This could be done by overflowing a buffer by sending a SR_INIT command with a very long usernamd or groupname.

tags | overflow
systems | linux, debian
SHA-256 | be478a463b446020b571954efb53fbf74e2093f37d872dee19a68560f2f3dee7
Posted Jul 4, 2000
Authored by vade79, realhalo | Site realhalo.org

Getenv.pl allows you to find buffer overflows in a unix binary by finding getenv() calls.

tags | tool, overflow
systems | unix
SHA-256 | 57f50d3ff335c0dfd414ed424f6a20d8849ef9b8d0e14b9e739b7a6b33927a50
Page 1 of 1

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    17 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By