exploit the possibilities
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-08-02

Posted Aug 2, 2000
Authored by Mixter | Site 1337.tsx.org

Introduction to programming in C - Written with the goal of letting people get the most knowledge as fast as possible from it.

MD5 | 0dfb6b88c529649f6bd66cbaac844772
Posted Aug 2, 2000
Authored by Averk | Site nscan.hypermart.net

NScan is a very fast portscanner for Windows (up to 200 ports per second) for both hosts and large networks with numerous features: it scans not only address ranges, but also files with host lists (e.g. proxy list, domain zone or old log), writes logs at the different detail levels, has speed limits, pre-defined service sets and so on. It includes a set of additional tools: whois client, that supports automatic information recognition and fetch, has query history and other features; traceroute, that traces all the way to the host at once in one or two seconds, making route discovery tenth times faster; TCP-based DNS client that supports most of the available options, including AXFR zone transfer.

Changes: Serious bugfixes, whois improvment.
tags | tcp
systems | windows
MD5 | bf757939b349ee7b65e191b7f859e477
Posted Aug 2, 2000
Authored by Robert Bihlmeyer | Site vibe.at

Secret Agent keeps passphrases and passwords in memory for a configurable timespan. Various applications can be made to cooperate with the agent; support for PGP 2 and GnuPG is provided out of the box, so you do not have to enter your pass phrase every time you sign an email.

tags | encryption
MD5 | 7088889c7ba84a2618ba95f660c3034d
Posted Aug 2, 2000
Authored by Suid | Site suid.kg

Pgxconfig is a Raptor graphics card configuration tool for Solaris which has multiple local vulnerabilities. The environment is not sanitized and root privileges are not dropped, allowing commands to be run as root. Local root exploit included.

tags | exploit, local, root, vulnerability
systems | solaris
MD5 | 6e972f5716c026877853b5cc1c5cc953
Posted Aug 2, 2000
Authored by b0g, K-Rad Bob | Site b0g.org

B0g Issue 7 - In this issue: Defcon review, How to own ttysnoop, Taxonomy of Communications Intelligence, Hacking Pine, Paytel Canada payphones, A guide to daemons, Hacking Hotmail, and more.

tags | magazine
MD5 | b0940be9d051e862bdc3f4040ef3f352
Posted Aug 2, 2000
Authored by Doing

Linux/x86 rpc.statd remote root exploit.

tags | exploit, remote, x86, root
systems | linux
MD5 | 4ae08a9ce1799224f33fc2f26d18f9bd
Posted Aug 2, 2000
Authored by Cho Kyong-won | Site hackerslab.org

Ntop -w allows remote users who have permission to view traffic stats to view any file on the system as root.

tags | exploit, remote, root
MD5 | afe2bd144d58dc5784dbc97357ad5406
Posted Aug 2, 2000
Authored by Sectorx

genocide.c is a dos attack which affects many different web proxies by making multiple connections which tie up all the sockets.

tags | web, denial of service
MD5 | 601ee630b8849a8338ae9eaf7a8ce1fe
Posted Aug 2, 2000
Authored by Sectorx | Site xorteam.cjb.net

Many HTTP proxies are vulnerable to a denial of service attack because they do not timeout connections to a remote host, causing the proxy to run out of available sockets and start refusing connections. Tested against Delegate 6.1.13. Exploit code included.

tags | exploit, remote, web, denial of service
MD5 | 18a3948acd3bf10e08a21b28714394db
Posted Aug 2, 2000
Authored by Shreeraj Shah | Site foundstone.com

Foundstone Security Advisory FS-073100-10-BEA - It is possible to compile and execute any arbitrary file within the web document root directory of the WebLogic server as if it were a JSP/JHTML file, even if the file type is not .jsp or .jhtml. If applications residing on the WebLogic server write to files within the web document root directory, it is possible to insert executable code in the form of JSP or JHTML tags and have the code compiled and executed using WebLogic's handlers. This can potentially cause an attacker to gain administrative control of the underlying operating systems.

tags | exploit, web, arbitrary, root
MD5 | 1dd991014f7279d9d772f52478be66d3
Posted Aug 2, 2000

Microsoft Security Bulletin (MS00-053) - Patch Available for "Service Control Manager Named Pipe Impersonation" vulnerability. Microsoft has released a patch for a security vulnerability in Windows 2000 which allows a user logged onto a Windows 2000 machine from the keyboard to become an administrator on the machine. Microsoft FAQ on this issue available here.

systems | windows, 2k
MD5 | 7383a89cdb95fff2fb2b3f1b103c8308
Page 1 of 1

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By