exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2000-10-21

redhat.lpr.txt
Posted Oct 21, 2000
Authored by Zen-Parse

Lpr lpr-0.50-4 and below contains vulnerabilities which allow local users to access other accounts, and sometimes root.

tags | exploit, local, root, vulnerability
MD5 | 2352a031e9126567695f639dfe2904c8
rhsa.2000-084-04.gnupg
Posted Oct 21, 2000
Site redhat.com

Red Hat Security Advisory - A problem has been found in GnuPG versions (up to and including 1.0.3). Due to this problem, GnuPG may report files which have been signed with multiple keys (one or more of which may be incorrect) to be valid even if one of the signatures is invalid.

systems | linux, redhat
MD5 | 777b2e39581de7908a86e308049993e7
vlad-0.7.4.tgz
Posted Oct 21, 2000
Authored by Bindview Vlad Team | Site razor.bindview.com

VLAD the Scanner - A freeware, open-source scanner that checks for the common security problems referenced in the SANS Top Ten list of common security problems. While freeware scanners are not neccessarily unique, VLAD is rather unique because of the amount of vulnerable CGI programs it checks for, and its comprehensive account/password checks (seven different protocols).

Changes: Added htr, webhits, and the new iis-unicode checks to the CGI scanner database.
tags | tool, cgi, scanner, protocol
systems | unix
MD5 | 520331dd74fbb1bb062aa98a429153cf
check-ps-1.3.1.tar.gz
Posted Oct 21, 2000
Authored by Duncan Simpson | Site checkps.alcom.co.uk

Check ps is a simple program that runs ps and compares it with its own list. It currently requires /proc but other scanning methods can be implemented. The program will run in the background or one-shot mode. Check-ps has grown rather to better resist increasingly sophisticated attacks, generate more useful reports, and implement more detection methods.

Changes: Better reporting, bug fixes, more resistant to attack.
tags | tool, intrusion detection
systems | unix
MD5 | 229ea770193b6247a854097ab1dfed00
shoki-0.08.2.tar.gz
Posted Oct 21, 2000
Site meshuggeneh.net

Shoki is a collection of IDS tools, scripts, and so forth. All the bits together can collect data from sensors, schlep it to a central location for storage, run signature-based and statistical analysis on the data, and load the data into a SQL database. Shoki provides a framework for a distributed system for network traffic analysis among untrusted peers.

tags | tool, intrusion detection
systems | unix
MD5 | 20d43922b0415cedf1de6af12fbbeca6
exiscan-0.7.tar.gz
Posted Oct 21, 2000
Site duncanthrax.net

Exiscan is an email virus scanner which works together with the Exim MTA and McAffee's uvscan or Trend Micro's vscan. It is written in Perl and is designed to be as subtle and lightweight as possible. The special thing about exiscan is that is does not resend messages after scanning them, so that the process is fully transparent to the MTA and requires only minimal reconfiguration of Exim.

Changes: The reformime MIME decoder can now be used instead of metamail, a configurable sender and receiver notification has been added, as well as better security against fake X-Scanner header lines.
tags | perl, virus
systems | unix
MD5 | 341f1d92693a0e94d9bf8156f02bdb1c
xzarch.c
Posted Oct 21, 2000
Authored by vade79, realhalo | Site realhalo.org

Linux /usr/games/zarch v.92 local root buffer overflow exploit.

tags | exploit, overflow, local, root
systems | linux
MD5 | e4b8a65eb01c952a88aa9f45824a4c9e
GNU Privacy Guard
Posted Oct 21, 2000
Site gnupg.org

GnuPG is a complete and free replacement for PGP. Because it does not use IDEA it can be used without any restrictions. GnuPG is a RFC2440 (OpenPGP) compliant application. Features RSA support.

Changes: A security fix which causes gnupg to report files which have been signed with multiple keys to be valid even if just one of the signatures is in fact valid, new utility gpgv to validate signatures, AES encryption added.
tags | encryption
MD5 | bef2267bfe9b74a00906a78db34437f9
ip_scfw-0.9.1.tar.gz
Posted Oct 21, 2000
Site bronzesoft.org

The SYN cookie firewall implements syn cookie syn flood protection on all hosts behind it. Contains a patch to Linux kernel 2.2.17 and an administration tool.

tags | kernel
systems | linux
MD5 | 35b808ade7e0faa9571b7feb2fb0c5c4
oracle-815.c
Posted Oct 21, 2000
Authored by Kim Yong-jun | Site hackerslab.org

Oracle 8.1.5 local buffer overflow exploit for Linux.

tags | exploit, overflow, local
systems | linux
MD5 | d529954e32f7d3ccdfd831d3eacc8c0b
pdump-0.782-2.tar.gz
Posted Oct 21, 2000
Authored by Samy Kamkar | Site pdump.lucidx.com

Pdump is a sniffer written in perl which dumps, greps, monitors, creates, and modifies traffic on a network. It combines features from tcpdump, tcpkill, ngrep, tcptrace, dsniff (and its webspy and urlsnarf), pfilt, macof, and xpy. It is able to do passive operating system detection/fingerprinting and can also watch packet streams and then create it's own spoofed packets to hijack or kill TCP connections. It understands tcpdump-like and perl-like syntax and allows easy modifications via a plug-in system. The packet display is easily configurable. Readme available here.

Changes: The packet injection tool has been updated, updated documentation, and Makefile fixes.
tags | tool, perl, spoof, sniffer, tcp
MD5 | c69b97a9666af130614fa6d1785c6ab9
decoyblues.pl
Posted Oct 21, 2000
Authored by Roelof Temmingh | Site sensepost.com

decoyblues.pl is a denial of service attack against active firewalls. Works by basically creating a lot of decoys with nmap. Router/firewall will try to block all the (decoyed) IP numbers, eventually running out of access list/packetfilters, and possibly crashing, or overwriting access lists.

tags | denial of service
MD5 | b775b42865b17628b85c373ae67fbb99
webevent.txt
Posted Oct 21, 2000

Webevent v3.3.3 (webevent.pl) is an online calendar which contains a remote cgi vulnerability which allows administrative access.

tags | exploit, remote, cgi
MD5 | 4a602b2cb9647896d04f006c4a292fd7
cst.tar.gz
Posted Oct 21, 2000
Authored by Toxic Ocean | Site blackhat.be

The Cum Security Toolkit v1.2 is a cgi/port scanner which checks for over 350 vulnerable CGI scripts and can implement 5 different Anti-IDS tactics. Features support for vhosts, wait times, fake X-forwarded-for: headers, and much more.

tags | cgi
systems | unix
MD5 | 855b5e362bcab249f0fe7fe823608081
xsplumber.c
Posted Oct 21, 2000
Authored by vade79, realhalo | Site realhalo.org

Linux space plumber (/usr/games/splumber) local buffer overflow exploit.

tags | exploit, overflow, local
systems | linux
MD5 | 58f5df89319698f357778a70e2ffd86d
sara-3.2.3.tar.gz
Posted Oct 21, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Improved tcp wrapper detection, Added http tests for Web Shopper, Shopping Cart, PHP, and PUT, and fixed bugs.
tags | tool, cgi, scanner
systems | unix
MD5 | 9678ba4a0af52964ae1477140f72615f
unicode.pl
Posted Oct 21, 2000
Authored by SteeLe

Unicde.pl exploits vulnerable IIS servers which allow remote command execition, as described in iis-unicode.txt.

tags | exploit, remote
MD5 | 804a40c9118e14b9459ec105b11b75d8
iisscan.pl
Posted Oct 21, 2000
Authored by Piffy

iisscan.pl scans for vulnerable IIS servers which allow remote command execition, as described in iis-unicode.txt.

tags | tool, remote, scanner
systems | unix
MD5 | 1e8d93c965466d30fadb8c34f2963bc1
Page 1 of 1
Back1Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close