what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-10-27

ipac-1.10.tar.gz
Posted Oct 27, 2000
Authored by Moritz Both | Site comlink.apc.org

ipac is an IP accounting package for Linux which collects, summarizes, and nicely displays IP accounting data. The output of ipac can be a simple ASCII table, an ASCII graph, or even images with graphs showing traffic progression. ipac can be used for IP traffic analysis and for accounting purposes.

Changes: ipac now allows the generation of png images with a new libgd. There are several small bugfixes in this release.
systems | linux
SHA-256 | a6f62d6aa0e7b07dcb2ab92217170a7b58d4cfcf0f45f323683cdc5a61a31d71
ethereal-0.8.13.tar.gz
Posted Oct 27, 2000
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: New home page, New dissectors include H.261, TPKT, and IGRP. RTP and RTCP were re-written, and many other dissectors were updated and improved. The wiretap library enables Ethereal to read Nokia-firewall tcpdump files, Shomiti Surveyor 3.x files, pppd log files (pppdump format), and NetXRay ATM files.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 05c361000494e7c814b3487515841ea9474cc7e29134d3ebbbf528b150cce3d2
ms00-081
Posted Oct 27, 2000

Microsoft Security Bulletin (MS00-081) - Microsoft has released a patch that eliminates a security vulnerability in the Microsoft virtual machine (Microsoft VM) that originally was discussed in Microsoft Security Bulletin MS00-011. Like the original vulnerability, the new variant enables malicious web site operators to read files from the computer of a person who visited his site or read web content from inside an intranet. Microsoft FAQ on this issue available here.

tags | web
SHA-256 | 53bcca2df1f42da2a54f88ae83696eb750ff3c84cd952521ddb5b5711ddc32fb
godmessageIV.zip
Posted Oct 27, 2000
Authored by The Pull

Godmessage 4 Revision 5 is an implementation of Georgi Guninski's recent ActiveX exploit for Internet Explorer which attempts to install a trojan on any machine which views the included HTML.

Changes: Revision 5 has all of the rest of the bug updates, plus includes an encrypted version, and denial of service versions (to force the user to reboot and shut down the server). It also includes an important hints section, and generally has been the work of the three developer's and a ton of testers. Warning: Do not view the included HTML files with an unpatched browser if you run Windows.
tags | exploit, trojan, activex
SHA-256 | 4169810d4b2ebb4d39ec0d7dcc8a86bacb18f9009719e1fafc944364097eda78
inbusdos.c
Posted Oct 27, 2000
Authored by Incubus | Site securax.org

Denial of Service attack against an Intel InBusiness eMail Station. Will send a 630 char buffer to the pop server as argument of a USER command. The little box needs to be "powered off" and -on again.

tags | exploit, denial of service
SHA-256 | 097d217d961c8d8bf396fe40cca2df3a255ed805abb39c1fe873baf76da9a46a
ntop-src-Oct-26-2000.tar.gz
Posted Oct 27, 2000
Site www-serra.unipi.it

Ntop is a very useful Unix / Windows network sniffing tool that shows the network usage, similar to what the popular top Unix command does. Has an interactive mode and a web mode for greater functionality and options, shows network traffic sorted according to various criteria, displays traffic statistics, shows IP traffic distribution among the various protocols, analyses IP traffic and sorts it according to the source/destination, displays IP Traffic Subnet matrix (who's talking to who?), reports IP protocol usage sorted by protocol type.

Changes: Fixed a remotely exploitable stack overflow in ntop -w. New interactive command shell!
tags | tool, web, sniffer, protocol
systems | windows, unix
SHA-256 | 68f68ac1624813bc5785e9933a7196661afd840f0d98d27e7588fb330bf8e72b
ntop-w-exp.c
Posted Oct 27, 2000
Authored by JW Oh

Ntop -w v1.2a1 remote stack overflow exploit. Ntop in web mode (-w) contains an overflow when a long filename is requested. Fix available here.

tags | exploit, remote, web, overflow
SHA-256 | ce04a0904b889efb589dd7afd4461f07739d833d857e3149af3cf2126d26ec8e
iss.00-10-25.oracle
Posted Oct 27, 2000
Authored by Ben Layer, Aaron Newman | Site xforce.iss.net

ISS Security Advisory - Oracle listener program releases 7.3.4, 8.0.6, and 8.1.6 on all platforms contains remote vulnerabilities which allow an attacker to gain access to an operating system account. Fix available here.

tags | remote, vulnerability
SHA-256 | 56a9846b839261c36ea3bf7d4d00b3a6525142283821baca682d5ef473d0d305
riven-1.0.1.tar.gz
Posted Oct 27, 2000
Authored by Zorgon

Riven is a CGI scanner which uses RFP anti-IDS tactics, flase browser / referer, and a perl/GTK interface.

tags | cgi, perl
systems | unix
SHA-256 | 019a8748eaa49d241b60bb6fe6e9a2db8eba78d1cebf024f19f604827be4eb21
sms.198.certificate
Posted Oct 27, 2000
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #198 - A specific web browser certificate from Sun may have received outside exposure and needs to be removed if it has been accepted.

tags | web
SHA-256 | ac5a483433c40d7b7830bdbf1e5be780f67892c00ad1b278e4bacbe27f5f7062
syswatch-1.4.3.tar.gz
Posted Oct 27, 2000
Authored by Chris Martino | Site smirks.org

SysWatch is a perl / cgi script that allows you to view current system information, disk utilization, resource utilization all in your web browser.

Changes: Bug fixes and enhancments.
tags | tool, web, cgi, perl
systems | unix
SHA-256 | f574e4230b263c4a6f91e5e6e427e4305fd263cec5bc31fa8c687cd738348f32
core-sdi.mysql
Posted Oct 27, 2000
Site core-sdi.com

Core SDI Advisory CORE-20001023 - The "MySQL Database Engine" uses an authentication scheme designed to prevent the flow of plaintext passwords over the network and the storage of them in plaintext. For that purpose a challenge-response mechanism for authentication has been implemented on all versions of MySQL. The authentication mechanism is not cryptographically strong. Each time a user executes this mechanism, information allowing an attacker to recover this user's password is leaked. Fix available here.

tags | sql injection
SHA-256 | 0da0ee191f40700e2b923a6e12d334f1e0e930fd9cb2f89a2bfd92adeafda30e
Page 1 of 1
Back1Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    20 Files
  • 29
    Nov 29th
    9 Files
  • 30
    Nov 30th
    21 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close