exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2000-08-21

winfingerprint-227.zip
Posted Aug 21, 2000
Authored by Vacuum | Site technotronic.com

Winfingerprint 227: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQLSERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, E numerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes.

Changes: Better error reporting, implemented Global FILE descriptors, Windows 9x machines will now enumerate Date & Time too. Fixed: Various HTML additions/cleanups.bug fixes.
tags | remote, registry
systems | windows
SHA-256 | 872e4aedf64c2ed56aeee1a2c908b456a1666b115776f44f8b3542a2fe59709c
PHP-Nuke.c
Posted Aug 21, 2000
Authored by Fabian Clone

A vulnerability in the way PHP-Nuke, a news site administrative tool, authenticates administrative accounts, allows a remote attacker to gain administrative access to the application. Attacker could edit users, articles, topics, banners, assign authors, etc

tags | exploit, remote, php
SHA-256 | eca37faae9a6a2eeba44799294fae819f847c9d8cb2db5b49509a50b9b29c9ac
debian.zope.abridged
Posted Aug 21, 2000
Site debian.org

Debian Security Advisory - On versions of Zope prior to 2.2.1 it was possible for a user with the ability to edit DTML can gain unauthorized access to extra roles during a request. Previous announcement and fix did not fully address the issues.

systems | linux, debian
SHA-256 | 2d9b0e6f767a17c5b8a9b5386622e6b946a343abb9eea2336759a4c1f4dcd2bc
htgrep.c
Posted Aug 21, 2000
Authored by n30

Htgrep has a vulnerability which allows a remote user to read arbitrary files on the system with the priviledge of the user running the program.

tags | exploit, remote, arbitrary
SHA-256 | c01230dec2a91deb2f424d3380ac2843757db64552164f3d93bd6365f519b20b
CA-2000-17.rpc.statd
Posted Aug 21, 2000
Site cert.org

Cert Advisory CA-2000-17 - There is an input validation vulnerability in rpc.statd where the program passes user-supplied data to the syslog() function as a format string. Exploit allows user to execute arbitrary commands with the priviledges of the rpc.statd process, typically root.

tags | arbitrary, root
SHA-256 | e2c09423cd8b0c12f2ae82818c51410ae6fd13469ee6114738f0d90c8cc320bb
RNmap 0.2 Beta
Posted Aug 21, 2000
Authored by Tuomo Makinen | Site sourceforge.net

Remote Nmap is a python client/server package which allows many clients to connect to a centralized nmap server to do their port scanning. This could be useful for security companies who want to have all thier scans come from a dedicated machine.

Changes: Fixed NameError: check in newconnection() which occured when filtering was turned off. Fixed --help commandline option and added --version and --nofilter options.
tags | tool, remote, nmap, python
systems | unix
SHA-256 | 3089d834efd2e8436c61bf935b2ebfc501efb336a6ad166ab8fc8605642789f9
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close