exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-07-15

VIGILANTE-2000003.txt
Posted Jul 15, 2000
Authored by Vigilante | Site vigilante.com

Microsoft IIS v4.0 and 5.0 contain a remote denial of service vulnerability if the server has been upgraded from v3.0. Issuing a malformed request for a certain file contained in /scripts/iisadmin can result in the webserver going into to an infinite loop, causing the web server to no longer accept requests. Microsoft bulletin available here.

tags | exploit, remote, web, denial of service
SHA-256 | 4c48bae0b226218deaf38e5938232cb42629e8cd6e919da87f76a5db9e3da358
sscc.tar.gz
Posted Jul 15, 2000
Authored by Faxrazor

sscc.tar.gz scans C source code for common insecure functions which can be exploited for buffer overflows. It finds and identifes the file name and line of the possible insecure function, taking a lot of the monotony out of auditing source code.

tags | overflow
systems | unix
SHA-256 | 97dea035cefbc0cc409d93070bf3d90614f5b27ed109431070c21edec8739422
7350qpop.c
Posted Jul 15, 2000
Authored by teso, scut | Site team-teso.net

qpopper 2.53 euidl x86/linux remote exploit. Includes a procedure to abuse format strings to find the correct offset. Tested on Debian 2.1, RedHat 6.1, Slackware 7, Suse 5.2 and 6.0.

tags | exploit, remote, x86
systems | linux, redhat, suse, slackware, debian
SHA-256 | d4fbf6b568b41b3a4ab5332d446981b085dcf13b1b623c727517903de3998105
libpcap 0.5
Posted Jul 15, 2000
Site tcpdump.org

Libpcap is a portable packet capturing library based on the BSD packet filter (BPF). It is very useful for writing sniffers and network analyzers.

tags | library
systems | bsd
SHA-256 | 6de9cfe333f929c0479dc0100128f531216af4a19efe2d8c1b5c4930ace08590
tcpdump-3.5.tar.gz
Posted Jul 15, 2000
Site tcpdump.org

Tcpdump allows you to dump the traffic on a network. It can be used to print out the headers of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect "ping attacks" or to monitor the network activities. Requires Libpcap.

Changes: Support for many more protocols, ASCII output, IPV6 support, and a new CVS repository and homepage.
tags | tool, sniffer
SHA-256 | 8543b517f7f4c327094157b7f0ff668630db98d9fcdb4b2397db29e8bcbbc11d
GNU Privacy Guard
Posted Jul 15, 2000
Site gnupg.org

GnuPG is a complete and free replacement for PGP. Because it does not use IDEA or RSA it can be used without any restrictions. GnuPG is a RFC2440 (OpenPGP) compliant application.

Changes: Encryption is now much faster. Lots of fixes, new options, and more translations have been added. Compiles well on many more systems now, including linux.
tags | encryption
SHA-256 | bc6c4db0eb98a550a83637c87d3b6914a6672d33e0d69e5e1330020abb223a24
Samhain File Integrity Checker
Posted Jul 15, 2000
Authored by Rainer Wichmann | Site samhain.sourceforge.net

samhain is a distributed host integrity monitoring system. It consists of monitoring agents running on individual hosts, and a central log server collecting reports from these agents via authenticated TCP/IP connections. On single hosts, it is possible to run a standalone monitoring agent. Currently, agents may monitor the integrity of files and directories, and watch for login/logout events. In addition to forwarding reports to the log server, other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. samhain has been tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Downloading database and configuration files from the server has been enabled, the client/server communication protocol has been revised, obsolete funtionality has been removed, the 'stealth' mode has been improved, and nested conditionals are possible now in the configuration file. An extensive manual has been added.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 53da78706a18ff4dce9b0ee37a60fe8df981b1076074833d5e55def8f98a32c2
ipchains-0.80.3.wbm
Posted Jul 15, 2000
Authored by Tim Niemueller | Site niemueller.de

The IPchains firewall module for Webbin lets you graphically create ipchains firewall scripts. Nearly all of the IPchains options are supported.

Changes: A fix for a critical bug in the import feature of this module that caused every rule to be interpreted as an ICMP-protocolled one.
tags | tool, firewall
systems | linux
SHA-256 | f0973c33b64669405a7901add9e37c1ee230af69f26651ea77e6901dea52016c
mw-exp.c
Posted Jul 15, 2000
Authored by W. ter Maat

makewhatis local dos exploit - overwrites /etc/passwd as soon as makewhatis runs, usually from cron.

tags | exploit, local
SHA-256 | cdb2304ec7442f32b6ef9838ca5f9055ec18ed08472c3e7cab9d1e6986337c97
ms00-044
Posted Jul 15, 2000

Microsoft Security Bulletin (MS00-044) - Microsoft has released a patch for two security vulnerabilities in Microsoft Internet Information Server. The "Absent Directory Browser Argument" vulnerability allows a malicious user to stop the web server from providing useful service. A new way to exploit the "File Fragment Reading via .HTR" vulnerability has been found which does not strip out most of the useful parts of the ASP source which it allows remote users to view. Microsoft FAQ on this issue available here.

tags | remote, web, vulnerability, asp
SHA-256 | f8b9423316f85c8e2b02c7d798e8467c1cf37a8087884d644b021c6a60a8bc17
Cgi-alt3kx1.0a.c
Posted Jul 15, 2000
Authored by Alt3kx | Site hertmx.org

The CGI scanner by alt3kx_h3z finds 218 remote CGI vulnerabilities.

tags | remote, cgi, vulnerability
systems | unix
SHA-256 | 4c4dd5c84d18986b5cc3c312f994fbf87c9e8411d0c68c2b2fc9b7b3e855b5f8
md5bd.c
Posted Jul 15, 2000
Authored by Mixter | Site 1337.tsx.org

md5bd.c is a shell server/backdoor that uses a md5 encrypted password to authenticate, therefore the password cannot be retrieved from the server.

tags | shell
SHA-256 | a4877757ba86f16bd156b9e926a303adac81bca585de68a7f81d07662984df4f
pop2d.fold.txt
Posted Jul 15, 2000
Authored by Dotslash

Pop2d any file on the system can be read remotely on a pop2 server with a valid pop account due to a bug in the fold command.

tags | exploit
SHA-256 | bc54f3402bf663746da58c8465528b13c145566b70abf99486edc76930e03c5c
portcatch10.zip
Posted Jul 15, 2000
Authored by Nate D

Portcatch listens on a TCP port and records the addresses of people who connect.

tags | tcp
SHA-256 | 990ac0e1ded4af0dbef5fd4af8912d202fbaac313ff4fb0ef2a8195c3f8b9510
Directory-URL.prediction.doc
Posted Jul 15, 2000
Authored by Revelation D'Soul

Directory and URL Prediction Vulnerabilities - Many websites, most notably adult-related websites offering pictures and files, leave their data open for others to see. These vulnerabilities often go undetected. This, of course may not be an issue to some, but many of these websites obtain their revenue through their sponsors, banners and membership fees. These types of vulnerabilities bypass sponsors, banners, membership sign-in areas, and most adult verification systems. For lack of better wording I have titled these types of vulnerabilities "Directory and URL Prediction". In reality, this is what it comes down to. There are many methods of exploiting these vulnerabilities, and only a few will be covered in this document. Please keep in mind that the effectiveness of these tactics depends heavily on the ineffectiveness of the website's security and design layout. I know some of you may have known these for years, but many have not. These vulnerabilities still exist today on the Internet.

tags | paper, web, vulnerability
SHA-256 | d8ef59420a33e0a2d9f221128fa959272146d784f7508d8012ab1e9d158382ad
FreeBSD Security Advisory 2000.23
Posted Jul 15, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:23 - There are several bugs in the processing of IP options in the FreeBSD IP stack, which fail to correctly bounds-check arguments and contain other coding errors leading to the possibility of data corruption and a kernel panic upon reception of certain invalid IP packets. Patch included.

tags | kernel
systems | freebsd
SHA-256 | 3052d0a143c61fc8a86ab5e3ab43f9d0ab18e5978918a4144eb90891788886b7
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close