what you don't know can hurt you
Showing 1 - 19 of 19 RSS Feed

Files Date: 2000-07-24

Posted Jul 24, 2000
Authored by napalm, Kynik | Site napalm.firest0rm.org

Napalm Magazine issue #6 - In this issue: Security Hole in Veritas Volume Manager, Security Certification (CISSP), IPsec Crash Course (part 1), OS Detection with ARP, UNIX Lesson 1, BBS List, and URL's.

tags | magazine
systems | unix
MD5 | 64d6de2fd1159a5dae8844efc41d584a
Posted Jul 24, 2000
Authored by Mugwump Mugwump

bd.pl is a backdoor written in perl which sits on port 33556 by default, requires a password, and unsets the history environment variables.

tags | tool, perl, rootkit
systems | unix
MD5 | b4aea0b2942de55ca24b6bbe25b467f2
Posted Jul 24, 2000
Authored by Blue Panda | Site bluepanda.box.sk

WFTPD/WFTPD Pro 2.41 RC11 contains four remote denial of service vulnerabilities. Perl proof of concept code included for each.

tags | exploit, remote, denial of service, perl, vulnerability, proof of concept
MD5 | 8ed2c7bb5eec4648fb264eabbac60bda
Posted Jul 24, 2000
Authored by Heeb | Site slacknet.org

fawx2.c sends fragmented junk to port 139, causing a blue screen under Windows 95 / 98 / 2000.

tags | exploit
systems | windows, 9x
MD5 | ad5c8fa7466f3e088f064eb42970726f
Posted Jul 24, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 23 - 24.07.2000 - Covers weekly roundups of security related events. In this issue: Roxen v2.0.68 vulnerability, Local INN vulnerability, Outlook Persistant mail-browser link, Outlook malformed Email header vulnerability, O'Reilly Website Professtional overflow in webfind.exe, Ikey 1000 problems, HP Jetdirect FTP dos, Remotely Exploitable buffer overflow in Outlook, New encryption regulations, ACLU Challenge to Carnivore, First Autocad virus, Linux Distribution Security Report, Passive Fingerprinting, To Build a Honeypot, Auditing your Firewall Setup, and more.

tags | overflow, local, virus
systems | linux
MD5 | 480d71607e4c2a56aa9266b03465c7c4
Posted Jul 24, 2000

Microsoft Security Bulletin (MS00-050) - Patch Available for "Telnet Server Flooding" vulnerability. A remote denial of service vulnerability has been discovered in the Telnet Server that ships with Microsoft Windows 2000. The denial of service can occur when a malicious client sends a particular malformed string to the server. Microsoft FAQ on this issue available here.

tags | remote, denial of service
systems | windows, 2k
MD5 | 934d7c85c27fe4ce653c68b5bc5450b5
Posted Jul 24, 2000
Authored by H D Moore | Site digitaloffense.net

Passive Agression is a perl proof-of-concept exploit for downloading other user's files from FTP servers without needing thier authentication. It works against servers that use passive connections for data transfers and fail to check the incoming address of the data connection. It first attempts to determine the server-side data port incrementation rate and then guesses at the next port, makes a connection, and saves the retrieved data to a file. This does not work against M$ boxen, but is fairly impressive when run against large public FTP servers. A much more sinister purpose would be to snag confidential files being passed between corporate networks at scheduled times, like end of the day batch processing of customer orders, or crontab'd FTP backups.

tags | exploit, perl
MD5 | 40e4c6f40135e9d7fa06da90c1ccab3a
Posted Jul 24, 2000
Authored by H D Moore | Site digitaloffense.net

phpDistributedPortScanner is a Web-based distributed TCP portscanner which uses plain PHP to perform distributed portscans against a single host. You can add new nodes just by uploading a tiny PHP script onto a Web server and adding a line to your master script to use it. Nodes are used in parallel and support multiple "threads" per node to increase your speed. It is portable and doesn't require shell access to use.

tags | tool, web, shell, scanner, php, tcp
systems | unix
MD5 | 855414190bdde2d7e54819e1fadb6474
Posted Jul 24, 2000
Authored by Michael Saarna | Site startuplinux.com

Virtual FTPD v6.4 is a secure FTP daemon which is derived from the OpenBSD ftp daemon and can allows virtual FTP accounts which do not have an /etc/passwd entry.

systems | linux, openbsd
MD5 | 946726205644f0b6a1b6f8c52710e9dd
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

Form Mail v1.0 (form.cgi) remote exploit - spawns an xterm from the victim computer.

tags | exploit, remote, cgi
MD5 | c5d2f7a2b3ce3a62e0264b14bca2da10
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

Click Responder v1.02 remote exploit - spawns an xterm from the victim computer.

tags | exploit, remote
MD5 | 6d00b6696423fcad56ad057857da27ef
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

bulk.cgi is a Bulk Mailer CGI which has remote vulernabilities which allow an attacker to spawn an xterm.

tags | exploit, remote, cgi
MD5 | 1514c36c80d0afe2d5806a1eb2219d5c
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

AlienForm2 remote cgi exploit - Spawns an xterm from target machine.

tags | exploit, remote, cgi
MD5 | 6bc28f67301d57d5da9e5441634a4767
Posted Jul 24, 2000
Authored by Telehor | Site teleh0r.cjb.net

bnbform.cgi v4.0 and below remote exploit - reads any file on the system.

tags | exploit, remote, cgi
MD5 | 23e7199f2af13c5245305c230cc7d928
Posted Jul 24, 2000
Authored by Blazinweed

Plague creates an environment that is capable of effectively coordinating a number of compromised hosts in a distributed attack. The nature of this attack ranges from denial of service to a sophisticated scan of the Internet for potential targets for future compromise.

tags | denial of service
MD5 | aad7a846b6020714a688798eecbc95b1
Posted Jul 24, 2000
Authored by Martin Roesch | Site snort.org

Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture.

Changes: This version has been well tested and contains many fixes. Now compiles on more platforms and can locate libpcap more accurately, fixed ICMP ping packet id/sequence printouts, updated portscan detector, and more. Requires here.
tags | tool, overflow, cgi, sniffer, protocol
MD5 | 5d628b08c0bf42af3affc9fcfca7ea69
Posted Jul 24, 2000
Authored by Frost Byte

UDPer is a logic bomb written in ASM for Windows which floods a victim with packets at a certain date.

tags | denial of service
systems | windows
MD5 | 09825a75cecb5dea72f26eddaa024528
Posted Jul 24, 2000
Authored by Dro

wuscan.c scans machines for wu-ftpd v2.60.

tags | tool, scanner
systems | unix
MD5 | c50a61a1240979284f7f34d9b4e89422
Posted Jul 24, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

SMEGMA is an engine for generating garbled shellcode using several encryption mechanisms and making it self-decryptable by putting an Intel x86 machine-code decryptor in front of it. It uses a hand-written C lexer to grab the shellcode from sourcefiles and try and identify it. Use SMEGMA to modify shellcode in which characters get ruined by regular expressions (often seen in CGI binaries, web applications and webservers).

Changes: Fixed all NULL byte problems - you can now use smegma to rid shellcode of NULL characters, more garbling algorithms, more efficient garbling algorithms, fixed the size problem.
tags | web, x86, cgi, shellcode
MD5 | 651b6173fc24873f8ad4e5f846fba666
Page 1 of 1

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    19 Files
  • 16
    Apr 16th
    7 Files
  • 17
    Apr 17th
    1 Files
  • 18
    Apr 18th
    1 Files
  • 19
    Apr 19th
    19 Files
  • 20
    Apr 20th
    18 Files
  • 21
    Apr 21st
    30 Files
  • 22
    Apr 22nd
    18 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By