what you don't know can hurt you
Showing 1 - 15 of 15 RSS Feed

Files Date: 2000-09-18

Posted Sep 18, 2000
Authored by Vigilante | Site vigilante.com

Vigilante Advisory #12 - Mdaemon 3.1.1 for Windows NT includes Webconfig and Worldclient which listen to TCP port 3000 and 3001. They both are vulnerable to a heap overflow vulnerability which could be used to execute arbitrary code. Fix available here.

tags | exploit, overflow, arbitrary, tcp
systems | windows, nt
MD5 | ab809f86579337656179b5655cd5e60d
Posted Sep 18, 2000
Site redhat.com

Red Hat Security Advisory - Various format string vulnerabilities have been found in syslogd and klogd. When exploiting these vulnerabilities, it could be possible for local users to gain root access.

tags | local, root, vulnerability
systems | linux, redhat
MD5 | a8da4cebb9fd02bf9afebcedeb0e82e2
Posted Sep 18, 2000
Authored by Johnny7

Torn Kit is a linux rootkit which has been optimized for linux/x86 mass installation. It is the first rootkit which uses precompiled binaries yet still allows a user defined password. This code is being widely used to automatically compromise hosts which have the wu.ftpd and rpc.statd vulnerabilities, and was mentioned in CERT's recent Incident Note IN-2000-10 advisory.

tags | tool, x86, vulnerability, rootkit
systems | linux, unix
MD5 | 2332de2af78eca68542fa30fb2d37283
Posted Sep 18, 2000
Authored by oblivion, Cyber0ptix | Site 0blivion.org

Oblivion Magazine Issue #7 - Contains articles on Voice over IP, An Introduction to IPSec, Virtual Router Redundancy Protocol (VRRP), ADSL, Firewall-1 + Firewalls Rant, and security news.

tags | protocol, magazine
MD5 | 871f9ce229b2b25526c4f4368f6c29ad
Posted Sep 18, 2000
Authored by Steve Sanders

Namezero apparently allows people to change other peoples pages. Simple exploit details included in this Microsoft Word document.

tags | paper
MD5 | 84a1f5ee3525bda2c15c2e74e85e3676
Posted Sep 18, 2000
Site videotron.ca

This regedit registry patch will tighten down security on a Microsoft NT v4.0 (sp3 and sp6 or 6a) machine. Changes about 55 registry entries.

tags | registry
MD5 | 8aee0e196433ad892287ceda0f69dd3c
Posted Sep 18, 2000
Site wwdsi.com

SAINT (Security Administrator's Integrated Network Tool) is a security assessment tool based on SATAN. Features include scanning through a firewall, updated security checks from CERT & CIAC bulletins, 4 levels of severity (red, yellow, brown, & green) and a feature rich HTML interface.

Changes: This version features an RPM for Linux users, GUI support for SAINTwriter, a new man page, and a new configuration script based on GNU Autoconf. Also includes check for Qaz trojan/worm, backdoors on 9704/TCP and 1524/TCP, checks for new CGI vulnerabilities including YaBB, scohelphttp, MultiHTTP, and Mobius DocumentDirect for Internet, and adjusted timing for better scanning.
tags | tool, scanner
systems | unix
MD5 | a122604bc137e107d96598eaa362786a
Posted Sep 18, 2000
Authored by Samy Kamkar | Site pdump.lucidx.com

Pdump is a sniffer written in perl which dumps, greps, monitors, creates, and modifies traffic on a network. It combines features from tcpdump, tcpkill, ngrep, tcptrace, dsniff (and its webspy and urlsnarf), pfilt, macof, and xpy. It is able to do passive operating system detection/fingerprinting and can also watch packet streams and then create it's own spoofed packets to hijack or kill TCP connections. It understands tcpdump-like and perl-like syntax and allows easy modifications via a plug-in system. The packet display is easily configurable. Readme available here.

Changes: Passive operating system detection/fingerprinting similar to siphon has been added, added recognition of df (don't fragment) and tos flags, added an implementation tcpkill from dsniff which is able to kill any open TCP connection, non-promiscuous mode sniffing, and now uses the pdump::Sniff module for packet creation and sniffing.
tags | tool, perl, spoof, sniffer, tcp
MD5 | 3fb1ffdd008eafd9ba2d258621666319
Posted Sep 18, 2000
Site bitchx.com

BitchX is the premiere IRC (Internet Relay Chat) client. It is a modified clone of the popular ircII client, and is available for almost all UNIX OS's as well as Win95/NT and OS/2.

Changes: This release features various new features and bugfixes.
systems | windows, unix
MD5 | 4ab094ae58f0bacb14c3e480404215fd
Posted Sep 18, 2000
Authored by Bart Timmermans, Filip Sneppe | Site hammer.prohosting.com

HardenNT (Beta 0917) is a tool created to automate the task of securing one or more Microsoft Windows based computers. It is specifically aimed at securing Windows NT 4.0 machines, although some of the functionality could also be used on Windows 9x or even Windows 2000 networks. HardenNT is not a tool that is to be installed or even run on a computer that one wants to secure. It merely creates a number of batch files that run standard NT (and NT resource kit) tools. This means that the batch files created by HardenNT are to be copied and run on the host you want to secure. Updates frequently, newest version available here.

systems | windows, 2k, 9x, nt
MD5 | f164511277411f00b7beb96d53f46750
Posted Sep 18, 2000
Authored by Robert Salizar | Site energymech.net

Stealth IP Stack is a kernel patch for Linux 2.2.17 which makes your machine almost invisable on the network without impeding normal network operation. Many denial of service attacks, such as stream, are much less effective with this patch installed, and port scanners slow to a crawl. It works by restricting TCP RST packets (no "Connection Refused"), restricting ICMP_UNREACH on udp (Prevents UDP portscans), restricting all ICMP and IGMP requests. A sysctl interface is used so these features can be turned on ande off on the fly.

tags | denial of service, kernel, udp, tcp
systems | linux
MD5 | 0372ec661f9d9bcf82f9185203c75632
Posted Sep 18, 2000
Authored by Cyber_Bob

Ploits.c v1.95 integrates stuff.c, ath0.c, and banner.c into one attack tool.

tags | denial of service
MD5 | cc6ecc3f1ecc2a9621257b584f1a7e70
Nmap Scanning Utility 2.54 BETA 5
Posted Sep 18, 2000
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: Fixed bugs on FreeBSD and platforms that dislike division by zero. Revamped the 'compatability libraries' subsystem for more portability.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | b6392daa07abcf9b307d3e6a856ee016
Posted Sep 18, 2000
Authored by FX | Site phenoelit.de

vnx4.c is a VNC attack program ported to Windows. Features cracking of the password in the registry, online brute force against VNC server or cracking a sniffed challange/response handshake.

tags | cracker, registry
systems | windows
MD5 | 12f343be3878ca5fa0d1fe3f07fb29b1
Posted Sep 18, 2000
Site xato.net

Snort Panel is a front-end control panel for the win32 port of snort. It allows you to set command-line options via dialog box settings and it monitors the alerts file for new alerts.

tags | tool, sniffer
systems | windows
MD5 | 9e10fc1cf66c88e46c9dd724b1971b99
Page 1 of 1

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    17 Files
  • 23
    Mar 23rd
    1 Files
  • 24
    Mar 24th
    1 Files
  • 25
    Mar 25th
    16 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By