Twenty Year Anniversary
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-07-04

labs48.txt
Posted Jul 4, 2000
Site ussrback.com

LocalWEB HTTP Server v. 1.20 remote dos attack - Sending a malformed URL to port 80 causes a buffer to be overflow resulting in a denial of service. Includes perl exploit.

tags | remote, web, denial of service, overflow, perl
MD5 | 82aeb64543a3df7a40b91f7d9dde6ec0
ethereal-0.8.10.tar.gz
Posted Jul 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: There is now support for decoding syslog, X11, and CLTP protocols. Ethereal can now read NetXRay 2.002 files and Linux ATM interfaces. The Win32 version now has the "Update list of packets in real time" feature.
tags | tool, sniffer, protocol
systems | unix
MD5 | 8d3e78d10410d5bc2c2d34bcfd7e5235
arping-0.6.tar.gz
Posted Jul 4, 2000
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: Starting icmp id=0, a new null source IP option, and warns when the alias interface is used.
tags | tool
systems | unix
MD5 | 91505af18ae758721122acddfdbbbe82
vsl-7-1-2000.tgz
Posted Jul 4, 2000
Authored by Vetesgirl | Site self-evident.com

VetesCan Local is a shell script which checks local unix security, including checking for rootkits, log permissions, home/root directory accessability, inetd services, /etc/securetty, SUID/SGID files, World writable files, Unowned files, .rhosts, and cracks passwd/shadow.

tags | tool, shell, local, root, scanner
systems | unix
MD5 | a6e7c7839460647bec59d88a2e9e8788
chkrootkit-0.15.tgz
Posted Jul 4, 2000
Authored by Nelson Murilo

chkrootkit V. 0.15 locally checks for signs of a rootkit. Includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux 2.0.x, 2.2.x and FreeBSD 2.2.x, 3.x and 4.0.

Changes: lrk5 detection, Sun/Solaris support, and Red Hat fixes.
tags | tool, integrity, rootkit
systems | linux, unix, freebsd
MD5 | 918d81248d226f08f3d96f0f27fde3d4
chklastlog.c
Posted Jul 4, 2000

chklastlog.c v1.3 checks lastlog and wtmp for signs of tampering. It will detect most log wiping programs, such as z2 and zap.

Changes: Linux/FreeBSD port, new Red Hat compatibility.
systems | unix
MD5 | ec7e4916679ab5a52db61c032fe711af
chkwtmp.c
Posted Jul 4, 2000

Chkwtmp v1.1 checks /var/log/wtmp for signs of deletion, such as use of zap or z2 or similar log wiping programs. See also chklastlog.c

Changes: Linux/FreeBSD port by Nelson Murilo.
systems | unix
MD5 | fce4743b75085d417016f7dc81d8bad7
winl_troj.zip
Posted Jul 4, 2000
Authored by Txgreg

Ginastub.dll v1.0 - A WinLogon password grabber which records every users password as they log in.

MD5 | bb90d66b38de831aa0b61e65b43b46d8
lkpatch-0.2.9.tar.gz
Posted Jul 4, 2000
Authored by Theo Nolte | Site adsl-nolte1.rz.rwth-aachen.de

lkpatch is a Linux kernel patcher. It connects to the fastest mirror, checks for new versions of the Linux kernel, downloads them, and patches your kernel source. It determines the fastest mirror by keeping track of previous download times.

Changes: Added support for 2.4.0-test kernels.
tags | kernel
systems | linux
MD5 | 943770fb3684812105baa623a6927918
bypassjuno.txt
Posted Jul 4, 2000
Authored by Djlizard

How to get the username and password for Juno.

tags | paper
MD5 | 96a573e0f88355c931bd76b91333772d
bash.security.patch.tgz
Posted Jul 4, 2000
Authored by Odin | Site ojnk.sourceforge.net

Patch for Bash 2.02 and 2.03 which will log all user commands to /var/log/histories/(name), Disallow and log execution attempts when uid != euid, and sets a limit on the highest UID that can run the shell.

tags | shell, patch, bash
systems | unix
MD5 | b45e2f1613f3e75e1a411ddde2bafe41
iplog-2.2.0.tar.gz
Posted Jul 4, 2000
Authored by Odin | Site ojnk.sourceforge.net

iplog is a TCP/IP traffic logger capable of logging TCP, UDP and ICMP traffic. Features a DNS cache, the ability to detect port scans, null scans, and FIN scans, "smurf" attacks, bogus TCP flags used in OS detection, Xmas scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.

Changes: Much more portable, added support for a configuration file, better memory handling, bug fixes and documentation updates.
tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
MD5 | ca906ef470c4313fe622d0a545a16cfe
imeshexp.zip
Posted Jul 4, 2000
Authored by Hitek | Site mxeleet.org

iMesh V1.02 Beta build 117 remote exploit for Windows 98. Exploits a buffer overflow to download a file from a given URL and execute it on the remote host. Includes windows binary and C source.

tags | exploit, remote, overflow
systems | windows, 9x
MD5 | 091169ff1b2465f0261c31870639b00a
newbieshelp.txt
Posted Jul 4, 2000
Authored by Steven Gurtler

This is a reference guide for the new hacker who needs to know the best websites for hacking, cracking, warez, and mp3's. July, 2000.

tags | paper
MD5 | 808e883f694f0de4542f63046d83163c
debian.canna.txt
Posted Jul 4, 2000
Site debian.org

Debian Security Advisory - The canna package as distributed in Debian GNU/Linux 2.1 can be remotely exploited to gain access. This could be done by overflowing a buffer by sending a SR_INIT command with a very long usernamd or groupname.

tags | overflow
systems | linux, debian
MD5 | 66ad48b77d8bc5997648b1e0b1f5423a
getenv.pl
Posted Jul 4, 2000
Authored by vade79, realhalo | Site realhalo.org

Getenv.pl allows you to find buffer overflows in a unix binary by finding getenv() calls.

tags | tool, overflow
systems | unix
MD5 | d2ce8a00cfbb6935142104e80cd90829
Page 1 of 1
Back1Next

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    45 Files
  • 16
    Nov 16th
    1 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close