exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-10-03

Posted Oct 3, 2000
Authored by Sam Carter | Site linux.rice.edu

Claymore v0.3 is an intrusion detection and integrity monitoring system. To accomplish its task, it runs from cron and reads in a list of files stored in flat ASCII, and uses md5sum to check their integrity against that recorded earlier in a database. If the database is placed on a read-only medium such as a write-protected floppy, then it should provide an infallible record against remotely installed trojan horses.

Changes: This release adds ownership / permission tracking and switches to the Digest::MD5 instead of md5sum.
tags | tool, trojan, intrusion detection
systems | unix
MD5 | 1288658c2152454fa372ceffd319d9fe
Posted Oct 3, 2000
Authored by teso, Sebastian Krahmer | Site team-teso.net

Openssh-Reverse is a patched OpenSSH which goes in reverse, allowing outside users to connect to machines behind NAT firewalls. In reverse mode, sshd acts as a client and brings the connection to a modified ssh server.

MD5 | 942f35d203b1fa524f6a92c140e9c23f
Posted Oct 3, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: New stable release - Fixes memory leaks. Requires libol-0.2.17.
tags | system logging
systems | unix
MD5 | f3b57725842a8a98f8ac5998eff11913
Posted Oct 3, 2000
Authored by Caddis | Site team-teso.net

/usr/bin/chpass local EDITOR variable format string exploit for *BSD. Tested on OpenBSD, FreeBSD, and NetBSD.

tags | exploit, local
systems | netbsd, freebsd, bsd, openbsd
MD5 | c025c1bda4dc505ca81d54f066088915
Posted Oct 3, 2000
Authored by Neon-Lenz

Pcanyscan.exe is a windows tool which uses nc.exe to scan for PC Anywhere hosts.

systems | windows
MD5 | 1818456e0396d33d6798bd2c5e30a10e
Posted Oct 3, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: SCP file transfer hole, Exploitable Netscape Navigator buffer overflow, Local linux traceroute vulnerabilities, Remote horde and imp vulnerabilities, Nmap dos against OpenBSD ipsec, remote format string bug in lprng, Media Player 7 "OCX Attachment" vulnerability, IE5.5/Outlook allows local reading of files, How Slashdot was hacked, Rijndael chosen as new US encryption standard, What are Digital Signatures, Hardening the BIND DNS Server, Carnivore review team exposed, Linux virus scanner placement, Firewall protection against macro viruses, FreeBSD 4.1.1 release, six headed spam monster, Online security breahes increase, and more.

tags | remote, overflow, local, vulnerability, virus
systems | linux, freebsd, openbsd
MD5 | 468e3dada2a69d08aaf68125c5015165
Posted Oct 3, 2000
Authored by synnergy, Scrippie | Site synnergy.net

Inebriation.c is a local linux/x86 /bin/su + locale libc functions exploit which has been written in response to previous unreliable exploits for this vulnerability. It includes a perl wrapper to find the correct offset, can use GOT overwrites to evade stackguard, stackshield, and libsafe, uses clean overflow string creation, and has documentation and several other usability improvements.

tags | exploit, overflow, x86, local, perl
systems | linux
MD5 | a4ea18e81fddb4c040951cf4232de56a
Posted Oct 3, 2000
Authored by synnergy, Dethy | Site synnergy.net

The Importance of Bug Testing - Includes discussion of alpha / beta releases, the importance of bug testing, software development goals, software testing strategies, functional prototypes, designing test sets, defect testing, acceptance testing, and structural prototypes.

MD5 | 93ccf43ca9128f73447bd47fe1fa89f1
Posted Oct 3, 2000
Authored by Laurent Riesterer | Site laurent.riesterer.free.fr

GASP stands for 'Generator and Analyzer System for Protocols'. It allows you to decode and encode any protocols you specify. The main use is to test network applications : you can construct packets by hand and test the behavior of your program when faced with strange packets.

Changes: The network part was fully rewritten to add support for multiple interfaces and asynchronous capture.
tags | tool, protocol
systems | unix
MD5 | 0ca9ab844292442630ab249584d089c5
Posted Oct 3, 2000
Authored by Provos | Site monkey.org

scanssh scans a list of addresses and networks for running SSH servers and their version numbers. scanssh supports random selection of IP addresses from large network ranges and is useful for gathering statistics on the deployment of SSH servers in a company or the Internet as whole.

Changes: Random address generation now always tries to generate as many addresses as requested even if exludes have been encountered, and bug fixes.
tags | tool, scanner
systems | unix
MD5 | 68f8aea9e9dfe0fd10d6391cad88251f
Page 1 of 1

File Archive:

July 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    13 Files
  • 2
    Jul 2nd
    12 Files
  • 3
    Jul 3rd
    1 Files
  • 4
    Jul 4th
    2 Files
  • 5
    Jul 5th
    34 Files
  • 6
    Jul 6th
    21 Files
  • 7
    Jul 7th
    21 Files
  • 8
    Jul 8th
    13 Files
  • 9
    Jul 9th
    6 Files
  • 10
    Jul 10th
    1 Files
  • 11
    Jul 11th
    3 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    19 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    15 Files
  • 16
    Jul 16th
    9 Files
  • 17
    Jul 17th
    2 Files
  • 18
    Jul 18th
    2 Files
  • 19
    Jul 19th
    19 Files
  • 20
    Jul 20th
    21 Files
  • 21
    Jul 21st
    53 Files
  • 22
    Jul 22nd
    14 Files
  • 23
    Jul 23rd
    14 Files
  • 24
    Jul 24th
    1 Files
  • 25
    Jul 25th
    1 Files
  • 26
    Jul 26th
    21 Files
  • 27
    Jul 27th
    8 Files
  • 28
    Jul 28th
    9 Files
  • 29
    Jul 29th
    12 Files
  • 30
    Jul 30th
    9 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By