exploit the possibilities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-07-04

Posted Jul 4, 2000
Site ussrback.com

LocalWEB HTTP Server v. 1.20 remote dos attack - Sending a malformed URL to port 80 causes a buffer to be overflow resulting in a denial of service. Includes perl exploit.

tags | remote, web, denial of service, overflow, perl
MD5 | 82aeb64543a3df7a40b91f7d9dde6ec0
Posted Jul 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: There is now support for decoding syslog, X11, and CLTP protocols. Ethereal can now read NetXRay 2.002 files and Linux ATM interfaces. The Win32 version now has the "Update list of packets in real time" feature.
tags | tool, sniffer, protocol
systems | unix
MD5 | 8d3e78d10410d5bc2c2d34bcfd7e5235
Posted Jul 4, 2000
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: Starting icmp id=0, a new null source IP option, and warns when the alias interface is used.
tags | tool
systems | unix
MD5 | 91505af18ae758721122acddfdbbbe82
Posted Jul 4, 2000
Authored by Vetesgirl | Site self-evident.com

VetesCan Local is a shell script which checks local unix security, including checking for rootkits, log permissions, home/root directory accessability, inetd services, /etc/securetty, SUID/SGID files, World writable files, Unowned files, .rhosts, and cracks passwd/shadow.

tags | tool, shell, local, root, scanner
systems | unix
MD5 | a6e7c7839460647bec59d88a2e9e8788
Posted Jul 4, 2000
Authored by Nelson Murilo

chkrootkit V. 0.15 locally checks for signs of a rootkit. Includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux 2.0.x, 2.2.x and FreeBSD 2.2.x, 3.x and 4.0.

Changes: lrk5 detection, Sun/Solaris support, and Red Hat fixes.
tags | tool, integrity, rootkit
systems | linux, unix, freebsd
MD5 | 918d81248d226f08f3d96f0f27fde3d4
Posted Jul 4, 2000

chklastlog.c v1.3 checks lastlog and wtmp for signs of tampering. It will detect most log wiping programs, such as z2 and zap.

Changes: Linux/FreeBSD port, new Red Hat compatibility.
systems | unix
MD5 | ec7e4916679ab5a52db61c032fe711af
Posted Jul 4, 2000

Chkwtmp v1.1 checks /var/log/wtmp for signs of deletion, such as use of zap or z2 or similar log wiping programs. See also chklastlog.c

Changes: Linux/FreeBSD port by Nelson Murilo.
systems | unix
MD5 | fce4743b75085d417016f7dc81d8bad7
Posted Jul 4, 2000
Authored by Txgreg

Ginastub.dll v1.0 - A WinLogon password grabber which records every users password as they log in.

MD5 | bb90d66b38de831aa0b61e65b43b46d8
Posted Jul 4, 2000
Authored by Theo Nolte | Site adsl-nolte1.rz.rwth-aachen.de

lkpatch is a Linux kernel patcher. It connects to the fastest mirror, checks for new versions of the Linux kernel, downloads them, and patches your kernel source. It determines the fastest mirror by keeping track of previous download times.

Changes: Added support for 2.4.0-test kernels.
tags | kernel
systems | linux
MD5 | 943770fb3684812105baa623a6927918
Posted Jul 4, 2000
Authored by Djlizard

How to get the username and password for Juno.

tags | paper
MD5 | 96a573e0f88355c931bd76b91333772d
Posted Jul 4, 2000
Authored by Odin | Site ojnk.sourceforge.net

Patch for Bash 2.02 and 2.03 which will log all user commands to /var/log/histories/(name), Disallow and log execution attempts when uid != euid, and sets a limit on the highest UID that can run the shell.

tags | shell, patch, bash
systems | unix
MD5 | b45e2f1613f3e75e1a411ddde2bafe41
Posted Jul 4, 2000
Authored by Odin | Site ojnk.sourceforge.net

iplog is a TCP/IP traffic logger capable of logging TCP, UDP and ICMP traffic. Features a DNS cache, the ability to detect port scans, null scans, and FIN scans, "smurf" attacks, bogus TCP flags used in OS detection, Xmas scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.

Changes: Much more portable, added support for a configuration file, better memory handling, bug fixes and documentation updates.
tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
MD5 | ca906ef470c4313fe622d0a545a16cfe
Posted Jul 4, 2000
Authored by Hitek | Site mxeleet.org

iMesh V1.02 Beta build 117 remote exploit for Windows 98. Exploits a buffer overflow to download a file from a given URL and execute it on the remote host. Includes windows binary and C source.

tags | exploit, remote, overflow
systems | windows, 9x
MD5 | 091169ff1b2465f0261c31870639b00a
Posted Jul 4, 2000
Authored by Steven Gurtler

This is a reference guide for the new hacker who needs to know the best websites for hacking, cracking, warez, and mp3's. July, 2000.

tags | paper
MD5 | 808e883f694f0de4542f63046d83163c
Posted Jul 4, 2000
Site debian.org

Debian Security Advisory - The canna package as distributed in Debian GNU/Linux 2.1 can be remotely exploited to gain access. This could be done by overflowing a buffer by sending a SR_INIT command with a very long usernamd or groupname.

tags | overflow
systems | linux, debian
MD5 | 66ad48b77d8bc5997648b1e0b1f5423a
Posted Jul 4, 2000
Authored by vade79, realhalo | Site realhalo.org

Getenv.pl allows you to find buffer overflows in a unix binary by finding getenv() calls.

tags | tool, overflow
systems | unix
MD5 | d2ce8a00cfbb6935142104e80cd90829
Page 1 of 1

File Archive:

February 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    22 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    2 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    50 Files
  • 6
    Feb 6th
    24 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    6 Files
  • 9
    Feb 9th
    1 Files
  • 10
    Feb 10th
    1 Files
  • 11
    Feb 11th
    22 Files
  • 12
    Feb 12th
    25 Files
  • 13
    Feb 13th
    16 Files
  • 14
    Feb 14th
    32 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    10 Files
  • 17
    Feb 17th
    2 Files
  • 18
    Feb 18th
    27 Files
  • 19
    Feb 19th
    32 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By