exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-08-02

Posted Aug 2, 2000
Authored by Mixter | Site 1337.tsx.org

Introduction to programming in C - Written with the goal of letting people get the most knowledge as fast as possible from it.

SHA-256 | 9439ef84c7e9724856d38b8067ccdb5e81490db2fac03db7cd2b1ac0b573b0fd
Posted Aug 2, 2000
Authored by Averk | Site nscan.hypermart.net

NScan is a very fast portscanner for Windows (up to 200 ports per second) for both hosts and large networks with numerous features: it scans not only address ranges, but also files with host lists (e.g. proxy list, domain zone or old log), writes logs at the different detail levels, has speed limits, pre-defined service sets and so on. It includes a set of additional tools: whois client, that supports automatic information recognition and fetch, has query history and other features; traceroute, that traces all the way to the host at once in one or two seconds, making route discovery tenth times faster; TCP-based DNS client that supports most of the available options, including AXFR zone transfer.

Changes: Serious bugfixes, whois improvment.
tags | tcp
systems | windows
SHA-256 | d0249cf95a04dbcfe4c567d947beec59bdbc4ac21b4dd999816394b4683a9c9e
Posted Aug 2, 2000
Authored by Robert Bihlmeyer | Site vibe.at

Secret Agent keeps passphrases and passwords in memory for a configurable timespan. Various applications can be made to cooperate with the agent; support for PGP 2 and GnuPG is provided out of the box, so you do not have to enter your pass phrase every time you sign an email.

tags | encryption
SHA-256 | 77d90114502eb6d37ba85f7d701d359d5f4754253d40a13931b139f6b615e7c3
Posted Aug 2, 2000
Authored by Suid | Site suid.kg

Pgxconfig is a Raptor graphics card configuration tool for Solaris which has multiple local vulnerabilities. The environment is not sanitized and root privileges are not dropped, allowing commands to be run as root. Local root exploit included.

tags | exploit, local, root, vulnerability
systems | solaris
SHA-256 | c672d208fcfc0115d16c23ed363ad4e7466f870b510a0b15f6d338ba4c585b0c
Posted Aug 2, 2000
Authored by b0g, K-Rad Bob | Site b0g.org

B0g Issue 7 - In this issue: Defcon review, How to own ttysnoop, Taxonomy of Communications Intelligence, Hacking Pine, Paytel Canada payphones, A guide to daemons, Hacking Hotmail, and more.

tags | magazine
SHA-256 | e7b1fa44f23ed000e666ee7acfbae063c970503697538787259e6bf61dc3dbce
Posted Aug 2, 2000
Authored by Doing

Linux/x86 rpc.statd remote root exploit.

tags | exploit, remote, x86, root
systems | linux
SHA-256 | 5de64344dc9bb15b3f44b3de59e2f7aae939ea8399dc44a04ff687b5de770027
Posted Aug 2, 2000
Authored by Cho Kyong-won | Site hackerslab.org

Ntop -w allows remote users who have permission to view traffic stats to view any file on the system as root.

tags | exploit, remote, root
SHA-256 | 9de1e58ef979bce83a724e3f9cce6f8179d09e842ccb1ec0db735e19f848fdb3
Posted Aug 2, 2000
Authored by Sectorx

genocide.c is a dos attack which affects many different web proxies by making multiple connections which tie up all the sockets.

tags | web, denial of service
SHA-256 | 9e065b8db3803c90b6a5c38e2cba0481dce096b68143e275d1d627f37235f6ce
Posted Aug 2, 2000
Authored by Sectorx | Site xorteam.cjb.net

Many HTTP proxies are vulnerable to a denial of service attack because they do not timeout connections to a remote host, causing the proxy to run out of available sockets and start refusing connections. Tested against Delegate 6.1.13. Exploit code included.

tags | exploit, remote, web, denial of service
SHA-256 | a9552173fc6e379e7810ac0699fb84188c3ccbf628f94952e2b66c5ae4c71603
Posted Aug 2, 2000
Authored by Shreeraj Shah | Site foundstone.com

Foundstone Security Advisory FS-073100-10-BEA - It is possible to compile and execute any arbitrary file within the web document root directory of the WebLogic server as if it were a JSP/JHTML file, even if the file type is not .jsp or .jhtml. If applications residing on the WebLogic server write to files within the web document root directory, it is possible to insert executable code in the form of JSP or JHTML tags and have the code compiled and executed using WebLogic's handlers. This can potentially cause an attacker to gain administrative control of the underlying operating systems.

tags | exploit, web, arbitrary, root
SHA-256 | efe85f651d73615fb6cff13785c85e629c1d6000de550891afe91b7b8b3f8677
Posted Aug 2, 2000

Microsoft Security Bulletin (MS00-053) - Patch Available for "Service Control Manager Named Pipe Impersonation" vulnerability. Microsoft has released a patch for a security vulnerability in Windows 2000 which allows a user logged onto a Windows 2000 machine from the keyboard to become an administrator on the machine. Microsoft FAQ on this issue available here.

systems | windows
SHA-256 | 811816b8f54eeecb668d50e232369f06161a4a18095012a0f9bdfe2c5c4a09aa
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By