what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-11-19

oracle.security.txt
Posted Nov 19, 2000
Authored by Daemon Root

Lots of good information on Oracle Database security. From the packet storm forums.

tags | paper
SHA-256 | 9c21cda33e2fe82137f1e4b5cf476e37e568b8ae5be7497d8dae89cdc093a286
shellinabox.tar.gz
Posted Nov 19, 2000
Site shellinabox.com

Shell In A Box provides shell access to a server from within any Java-enabled Web browser. Requests are tunneled over HTTP using the same proxy settings that the browser uses. On the server, it installs as a CGI program, and there is no client-side installation necessary. It sports full VT102 emulation with Unicode support, international font files, ANSI colors, a scrollback buffer, mouse position reporting, clipboard support, and user-configurable emulation modes. All user preferences are stored as cookies in the client's browser.

tags | java, web, shell, cgi
SHA-256 | bab597954c3f02125d4b13bcb88954599602b33329b4ce52df6299fcffb5f9ea
sping-1.1.tar.gz
Posted Nov 19, 2000
Authored by Tim J Robbins | Site box3n.gumbynet.org

sping sends ICMP ECHO requests to network hosts to determine whether they are 'alive'. It is a small and hopefully secure implementation of the common ping utility that offers far less control over the packet options that may be specified (packet size, delay between packets, etc.) - this is a feature, for both security and bandwidth reasons. sping has been tested on Linux 2.4.0-test8 but should work on other operating systems.

Changes: Drops privileges, checks packet source, and adds improved docs.
tags | tool
systems | linux, unix
SHA-256 | 5d18db6fc500692b383fc05fbd67e5b833897c35d8f847c4b2f4fe0487aa229b
tetrinet-1.13.dos.txt
Posted Nov 19, 2000
Site m4dskill.org

Tetrinet v1.13 has a denial of service vulnerability which is caused by telnetting to the tetrinet port and pressing enter once, freezing the game.

tags | exploit, denial of service
SHA-256 | ed11e968ca11f1ec388ea80f84379db00319fe1bf75648088cf4b43c2f6bc74f
iis4_nt4sec.txt
Posted Nov 19, 2000
Site shebeen.com

IIS and NTS 4.0 Hardening Guide v1.1 - Detailed instructions on tightening down the security on an IIS 4.0 web server. Includes install and setup details, server configuration, hardening, registry edits, securing permissions, firewall ACL's, and SSHD. This hardening procedure should NOT be used on general-purpose NT servers on an internal LAN as it removes several of the services that NT uses for default functionality.

tags | paper, web, registry
SHA-256 | 6a460f07556c6f4e9eb5683f3c5badc17be689e406aa0c961ddd5f0fc7a47cc9
srm-1.2.2.tar.gz
Posted Nov 19, 2000
Authored by Matthew Gauthier | Site srm.sourceforge.net

secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Changes: Minor bug fixes, -f now really does ignore nonexistent files now.
systems | unix
SHA-256 | 08c177f1c5eba6e4857fb8a5a55d96687448658c9bafbac14c6c38b672e4428d
sbo_ethereal.c
Posted Nov 19, 2000
Authored by JW Oh | Site hacksware.com

Ethereal v0.8.13 advisory and remote exploit for Linux x86. A stack overflow in the AFS packet parsing routine allows a spoofed packet to start a root shell bound to TCP port 36864.

tags | exploit, remote, overflow, shell, x86, root, spoof, tcp
systems | linux
SHA-256 | 5849011e1fbedaeca9f6469317a94d0d5df77b160e51dc2cfaf731ba6fdbc8e5
debian.cron.txt
Posted Nov 19, 2000
Site debian.org

Debian Security Advisory - The version of Vixie Cron shipped with Debian GNU/Linux 2.2 is vulnerable to a local attack, discovered by Michal Zalewski. Several problems, including insecure permissions on temporary files and race conditions in their deletion, allowed attacks from a denial of service (preventing the editing of crontabs) to an escalation of privilege (when another user edited their crontab). As a temporary fix, "chmod go-rx /var/spool/cron/crontabs" prevents the only available exploit; however, it does not address the problem - upgrade is needed.

tags | denial of service, local
systems | linux, debian
SHA-256 | 45066b5be833b8794dd17760df1ec1d6a414c23ede771168906f53a3c837a917
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close