exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-11-02

Samhain File Integrity Checker
Posted Nov 2, 2000
Authored by Rainer Wichmann | Site samhain.sourceforge.net

samhain is a distributed host integrity monitoring system. It consists of monitoring agents running on individual hosts, and a central log server collecting reports from these agents via authenticated TCP/IP connections. On single hosts, it is possible to run a standalone monitoring agent. Currently, agents may monitor the integrity of files and directories, and watch for login/logout events. In addition to forwarding reports to the log server, other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. samhain has been tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Bug fix release which includes enhancments!
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | d9ed906ca9c641206d8da7958e625115650b13d904f827efaab285b62ff78ec0
dump-exp.sh
Posted Nov 2, 2000
Authored by Fish Stiqz

Dump v0.4b15 for Linux on Redhat and others contains a trivial local root vulnerability.

tags | exploit, local, root
systems | linux, redhat
SHA-256 | 1cc730edaf82d8cf8af5f2a4f514fb02bdc686371b3f7ccea5653645df6e3c84
dump.sh
Posted Nov 2, 2000
Authored by JW Oh

Dump v0.4b15 and below for Linux contains a trivial local root vulnerability. Includes proof of concept exploit tested on Redhat 6.2.

tags | exploit, local, root, proof of concept
systems | linux, redhat
SHA-256 | 619ad6db79eab76deef0e838677432fc6d3bd08d012469e9ae413de13b917212
0010-exploits.tgz
Posted Nov 2, 2000
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for October, 2000.

tags | exploit
SHA-256 | f1145b6d659bf5ec559a08dd9096cf689913972f0351e3538d9060762579d13c
StJudeModel.pdf
Posted Nov 2, 2000
Authored by Tim Lawless | Site sourceforge.net

This paper describes how the StJude kernel module stops local and remote exploits from being successful. The Saint Jude model for improper privilege transitions terminates program execution when it is exploited even if the exploit is unknown.

tags | paper, remote, kernel, local
systems | unix
SHA-256 | 32a264782ffbeb3b1d5ac2fe7295419e164d7bcced7404713c2fa709c85c1ee7
StJude_LKM-0.04.tar.gz
Posted Nov 2, 2000
Authored by Tim Lawless | Site sourceforge.net

Saint Jude LKM is a Linux Kernel Module for 2.2.11 and greater kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occuring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.

Changes: Fixed bugs, added a Makefile, hid the old execve better, added a homepage.
tags | remote, kernel, local, root
systems | linux
SHA-256 | 37643ba93bc57afffa0b2696e08bb971606429da0f856cdd4260620c42f1b387
iss.00-11-01.netmon
Posted Nov 2, 2000
Site xforce.iss.net

ISS Security Advisory - An exploitable buffer overflow has been found in Microsoft's Network Monitor utility. The vulnerability allows code to be executed on the remote computer with the privilege levels of the administrator. Windows NT, 2000, and SMS 1.2 and 2.0 are affected.

tags | remote, overflow
systems | windows
SHA-256 | 62cd0a353baa2b76a80fd2668586982a383c7b7773616bd881ac0df773aaa1f1
ms00-083
Posted Nov 2, 2000

Microsoft has released a patch that eliminates the "Netmon Protocol Parsing" vulnerability in Microsoft Windows NT and 2000 server and SMS which allows remote users to gain control of an affected server. Protocol parsers in Network Monitor (Netmon) contain unchecked buffers which allow malicious users to execute arbitrary code by sending a malformed frame to a server which is monitoring traffic. Microsoft FAQ on this issue available here.

tags | remote, arbitrary, protocol
systems | windows
SHA-256 | 631236ac7c0e16c53931fdfc3f74466ee5528d93d9b6d8b318260308729b617b
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close