Exploit the possiblities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-07-07

ms00-048
Posted Jul 7, 2000

Microsoft Security Bulletin (MS00-048) - Microsoft has released a patch for a security vulnerability in Microsoft SQL Server 7.0. The vulnerability allows a malicious user who can authenticate with the SQL server to run a database stored procedure without proper permissions. Microsoft FAQ on this issue avalable here.

MD5 | b7f9f325211d3b4e4dd205d4a9d325d5
CA-2000-13.ftpd
Posted Jul 7, 2000
Site cert.org

CERT Advisory CA-2000-13 Two Input Validation vulnerabilities in FTPD. Wu-Ftpd 2.6.0 has a site exec vulnerability, and BSD ftpd vulnerability involving a missing character-formatting argument in setproctitle(). Both of these can be exploited by remote attackers to gain root access.

tags | remote, root, vulnerability
systems | bsd
MD5 | afa5867a879e3daf0ec835e9e1241e84
iplog-2.2.1.tar.gz
Posted Jul 7, 2000
Authored by Odin | Site ojnk.sourceforge.net

iplog is a TCP/IP traffic logger capable of logging TCP, UDP and ICMP traffic. Features a DNS cache, the ability to detect port scans, null scans, and FIN scans, "smurf" attacks, bogus TCP flags used in OS detection, Xmas scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.

Changes: Fixed ident lookups and Fixed a bug that caused only one thread to change user or group when -u or -g was specified while the rest continued to run as root.
tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
MD5 | 5411e3a556b0635361a2aa94a6e9faae
pid_fuck.c
Posted Jul 7, 2000
Authored by Wouter ter Maat

Local linux dos - fork() bomb.

tags | denial of service, local
systems | linux
MD5 | bb765a599f5f8e35148f2c3a7fec4767
SX-20000620-3
Posted Jul 7, 2000
Site securexpert.com

SecureXpert Labs Advisory [SX-20000620-3] - Partial Denial of Service in Check Point Firewall-1 on Windows NT. The SMTP Security Server component of Check Point Firewall-1 4.0 and 4.1 is vulnerable to a simple network-based attack which raises the firewall load to 100%.

tags | exploit, denial of service
systems | windows, nt
MD5 | 59e2811f96884aaade157b2ac4d843dd
SX-20000620-2
Posted Jul 7, 2000
Site securexpert.com

SecureXpert Labs Advisory [SX-20000620-2] - Multiple services on Windows 2000 Server are vulnerable to a simple attack which allows remote network users to drive the CPU utilization to 100% in an extremely short period of time, at little cost to the attacker's machine.

tags | exploit, remote
systems | windows, 2k
MD5 | a21332a58d3c6244432be4688e7fe334
SX-20000620-1
Posted Jul 7, 2000
Site securexpert.com

SecureXpert Labs Advisory [SX-20000620-1] - Denial of Service vulnerability in Microsoft Windows 2000 Telnet Server. A remote user can cause the telnet server to stop responding to requests by sending a stream of binary zeros to the telnet server. This can easily be reproduced from a Linux system using netcat with an input of /dev/zero, with a command such as "nc target.host 23 < /dev/zero".

tags | exploit, remote, denial of service
systems | linux, windows, 2k
MD5 | 9d06d84dceb78e12f5cb9725074cb936
BIOS320.EXE
Posted Jul 7, 2000
Site 11a.nu

!Bios can decrypt the passwords used in some most common BIOS (including various bioses/versions by IBM, American Megatrends Inc, Award and Phoenix). !Bios can also save and restore the IBM standard CMOS/NVRAM memory where almost all common Bioses store the BIOS setup settings. !Bios can save the part of the RAM dedicated for the BIOS (which has security implications in some BIOSes as encryption algorithms and/or password may actually reside here in some badly coded BIOSes). !Bios can do crude, brutal attacks ("blasters") which removes password from a lot of Bioses. A bit dangerous though, can give unexpected and unwanted results. !Bios has a CMOS editor where you through a interface with similarities to several hex-editors can modify the CMOS/NVRAM memory in binary, decimal and hexadecimal ways. (only adviced for very experienced hackers) !Bios has a command line interface (CLI) and a very simple VGA-text interface, GUI. If no parameters is passed to !Bios, it starts the easy-to-use GUI, otherwise it starts the GUI. !Bios has built-in support pages which provides several tricks and tips, notes about known backdoors etc.

tags | cracker
MD5 | 2ec4babb08b73fe70ed124871bc92ceb
defaultpasswords.txt
Posted Jul 7, 2000
Authored by Roelof Temmingh | Site sensepost.com

Default Passwords for many network switches and devices. Includes many 3com products, ACC, AcceleratedDSL, ADC, Alteon, Arrowpoint, AT&T, AXIS200, Bay routers and switches, BreezzeCOM, Cabletron, Cayman_DSL, Crystalview, digiCorp, DLink, Flowpoint, Jetform_design, Lantronics, Linksys, Livingston, Microplex, Motorola, Netopia, Netprint, Orbitor_console, Osicom, Shiva, SpeedstreamDSL, UClinux_for_UCsimm, Webramp, Xylan, Zyxel, and more. Another nice list of default passwords is here.

tags | paper
MD5 | 0f992b0a3061303b4129ec09c5f5f114
hping2-beta54.tar.gz
Posted Jul 7, 2000
Authored by Antirez | Site kyuzz.org

hping2 is a network tool which sends custom ICMP/UDP/TCP packets and displays target replies like ping does with ICMP replies. hping2 can handle fragmentation, arbitrary packet body and size and can be used in order to transfer files under any supported protocol. hping2 is useful for testing firewall rules, spoofed port scanning, testing network performance under different protocols, packet sizes, TOS, and fragmentation, path MTU discovery, file transfer even with really facist firewall rules, traceroute with different protocols, firewalk like usage, remote OS fingerprinting, TCP/IP stack auditing, and much more.

Changes: Raw IP mode, lots of bug fixes, added NetBSD support, added settable checksum, tcp sequence and ack are settable, bad checksum option, out of sequence packet counter, and documentation updates.
tags | tool, remote, arbitrary, udp, scanner, spoof, tcp, protocol
systems | unix
MD5 | 703f2102b948f214d59d89b41bca9923
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close