exploit the possibilities
Showing 1 - 14 of 14 RSS Feed

Files Date: 2000-09-27

Posted Sep 27, 2000
Authored by Barak Weichselbaum | Site komodia.com

Tcpip_lib V2 is a library for Windows 2000 which allows arbitrary packet creation. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.

Changes: now works also with NT (regular async sockets), supports regular sockets (async and blocked) and added ICMP. (samples like traceroute, ping, TCP server, simple attacker).
tags | arbitrary, spoof, protocol
systems | windows, 2k
MD5 | bad93d8385ce011dece39cbad3f694eb
Posted Sep 27, 2000
Site xforce.iss.net

ISS Security Advisory - Multiple vulnerabilities on all platforms and versions of Check Point FireWall-1. Follow-up to the July 26, 2000 Black Hat briefings presentation by Thomas Lopatic, John McDonald, and Dug Song.

tags | vulnerability
MD5 | 17c9e5528333af366a2e2e60ca498cec
Posted Sep 27, 2000
Authored by Dimitri

Batchfile for Windows NT with Internet Information Server. This script automates jobs. If there is an attack on your server, starting this script manually enables you to see if something has happened.

systems | windows, nt
MD5 | b63d3c72c3d0154a22cf68f1759e87d2
Posted Sep 27, 2000
Authored by Xaphan

Sqlpoke is a NT based tool that locates MSSQL servers and tries to connect with the default sa account. A list of SQL commands is executed if the connection is successful. Win32 source included.

systems | windows
MD5 | a4f3749f32c8b2d7a9ef6a5c248b8a69
Posted Sep 27, 2000
Site ussrback.com

USSR Advisory #53 - Malformed Embedded Windows Media Player 7 "OCX Attachment" Vulnerability. The USSR Team has found a problem in the Windows Media Player 7 ActiveX control, which could be used in a denial of service attack against RTF-enabled e-mail clients such as Outlook 2000 and Outlook Express.

tags | denial of service, activex
systems | windows
MD5 | 06dfbf213f68be2321c46e728d82b239
Posted Sep 27, 2000
Site microsoft.com

Microsoft Security Bulletin (MS00-068) - Patch Available for "OCX Attachment" Vulnerability. Microsoft has released a patch for a security vulnerability in Microsoft Windows Media Player (WMP) 7 but primarily affects e-mail applications. This vulnerability would enable a malicious user to create an e-mail that, when closed after being read, would cause the e-mail application to fail. A FAQ regarding this vulnerability is available here.

systems | windows
MD5 | ac2edef4c56fdee27b21b0d2a513191b
Posted Sep 27, 2000
Authored by Incubus | Site securax.org

Denial of service for NetcPlus BrowseGate 2.80 for Windows NT and 2000 when you sned more than 8000 characters in a GET / http-request, causing the system to crash.

tags | exploit, web, denial of service
systems | windows, nt
MD5 | a2100c2a0c80d3fcea1fabfd6045a871
Posted Sep 27, 2000
Authored by Arkane

Proof of Concept. There exists a vulnerability in Pine 4.21 involving the portion of code in charge of peroidically checking email when a pine client is open.

tags | exploit, proof of concept
MD5 | b7115bbb7e207427f5ee4e871fc64243
Posted Sep 27, 2000
Authored by Weihan Leow

This hole is for the control panel of all Alabanza based resellers/hosts. There could be more bugs. This is serious enough since you can delete all resold domains for a particulr webhosting company. You can also change the default MX and CNAME records of all associated domains.

tags | exploit
MD5 | 8954700dd8b0841c63a25bde1ce7c323
Posted Sep 27, 2000

A problem lies in that there is a Java SNMP MIB Browser Object ID parsing problem which can cause a Denial of Service. Platforms affected are: HP9000 Series 700/800 running HP-UX releases 10.XX and 11.XX, Sun Microsystems SOLARIS releases 2.X, plus under Microsoft Windows NT4.X/ Windows 2000 running NNM 6.1, NNM 5.01, and NNM 4.11.

tags | java, denial of service
systems | windows, 2k, solaris, hpux
MD5 | e32f3a8daf4f641f23ef28f9a0cc3f49
Posted Sep 27, 2000
Authored by Esa Etelavuori | Site iki.fi

Klogd Local Exploit. Envcheck is a Linux/x86 kernel module which strips dangerous environment variables before executing a new program, and which can be used to log these probably threatening events. However, a recent format string handling bug in klogd allows an attacker to overflow its buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary, x86, kernel, local
systems | linux
MD5 | ae1866895abb656a027e84a2cb34fb67
Posted Sep 27, 2000

Caldera Advisory - There is a format bug in the LPRng printer daemon that could possibly be exploited to obtain root privilege. This problem is particulary severe because it can be exercised remotely.

tags | root
MD5 | 26cd8be0af17378747b6027a9f5f7674
Posted Sep 27, 2000
Authored by Paul Ritchey | Site snorticus.baysoft.net

Snorticus is a collection of shell scripts designed to allow easy managment of Snort sensors. It allows you to routinely collect Snort sensor data, analyze the data via SnortSnarf, and easily maintain rule files.

tags | tool, shell, sniffer
MD5 | 89cca73c48f8b2da94bfbba6ca02c400
Posted Sep 27, 2000
Authored by satya

A simple ICMP Source Address spoofing utility. A smurfing utility that also comes with log parsers, etc.

tags | denial of service, spoof
MD5 | c57805d12736bf818de591baab2714fe
Page 1 of 1

File Archive:

February 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    22 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    2 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    50 Files
  • 6
    Feb 6th
    24 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    6 Files
  • 9
    Feb 9th
    1 Files
  • 10
    Feb 10th
    1 Files
  • 11
    Feb 11th
    22 Files
  • 12
    Feb 12th
    25 Files
  • 13
    Feb 13th
    16 Files
  • 14
    Feb 14th
    32 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    10 Files
  • 17
    Feb 17th
    2 Files
  • 18
    Feb 18th
    27 Files
  • 19
    Feb 19th
    32 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By