Twenty Year Anniversary
Showing 1 - 25 of 217 RSS Feed

Files Date: 2000-11-01 to 2000-11-30

Posted Nov 29, 2000

Wap-nmap enables an nmap scan from a WAP enabled device and pumps the results back to the device.

tags | tool, nmap
systems | unix
MD5 | a327ede0366163613e7d8bc320935f36
Posted Nov 29, 2000

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Guide to linux kernel compilation including iptables firewalling, and more.

tags | kernel
systems | linux
MD5 | 34c380f4981cd91a2245338e7dcab5fe
Posted Nov 29, 2000
Authored by Zion | Site

How to get free cellphone calls in Germany by using a free 800 number.

tags | telephony
MD5 | 6269a845457758ccbcc376886744ea7b
Posted Nov 29, 2000
Authored by Nu Omega Tau | Site

The WinU password cracker v0.7b decrypts WinU's stored passwords from the registry. Versions 2.0-5.2 are supported.

tags | registry
MD5 | c4ef64d2ba8ca9b0101fff563d9a19a6
Posted Nov 29, 2000
Authored by vade79, realhalo | Site

BSDI 3.0 /usr/contrib/mh/bin/inc local root exploit.

tags | exploit, local, root
MD5 | 46db6094aa575402f671da8c14887aef
Posted Nov 29, 2000

Debian Security Advisory - ghostscript uses temporary files to do some of its work. Unfortunately the method used to create those files wasn't secure: mktemp was used to create a name for a temporary file, but the file was not opened safely. A second problem is that during build the LD_RUN_PATH environment variable was set to the empty string, which causes the dynamic linker to look in the current directory for shared libraries.

systems | linux, debian
MD5 | 1af88d155bd6d5fb83c959c03555f6e0
Posted Nov 29, 2000

Microsoft Security Bulletin (MS00-090) - Microsoft has released a patch that eliminates two unrelated serious security vulnerabilities in Microsoft Windows Media Player. These vulnerabilities allow a malicious user to cause a program of his choice to run on another user's computer. Microsoft FAQ on this issue available here.

tags | vulnerability
systems | windows
MD5 | 81d1001e6537d6a50fca59fd9c2b2ff9
Posted Nov 29, 2000
Authored by Aleph One | Site

Anger v1.33 implements a PPTP challenge/response sniffer. These c/r can be input into L0phtcrack to obtain the password, and b) An active attack on PPTP logons via the MS-CHAP vulnerability to obtain the users password hashes. Notice that this also generates the password hashes of the new password the user wanted to use, which can be put into L0phtcrack to get passwords, into a modified smbclient to logon onto a SMB sever, or into a modified PPP client for use with the Linux PPTP client.

tags | tool, sniffer
systems | linux
MD5 | 3b7bc29328e437c8ba2b02a9985b6c89
Posted Nov 29, 2000
Authored by Balazs Scheidler | Site

syslog-ng is a multi-platform syslogd replacement, with lots of new functionality. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: New stable release - Adds fixes for a remote denial of service attack. Requires libol-0.2.20.
tags | system logging
systems | unix
MD5 | efe22378eb3888ad55e8ddfb49c3f804
Posted Nov 29, 2000

pakemon has been developed to share IDS components based on the open source model. Current version of pakemon monitors all traffic on a network, search given data patterns in the traffic and output session logs and summary logs of matched traffic. Tested on RedHat Linux 6.2j, OpenBSD2.7, FreeBSD 3.3, and NetBSD 1.4.

tags | tool, intrusion detection
systems | linux, redhat, netbsd, unix, freebsd
MD5 | 27e99d6a8e76d6b18741e19625018f6c
Posted Nov 29, 2000

Listsyscalls is a tool for listing contents of the syscall table on a running Solaris kernel. Has various uses, including being able to check if a syscall function has been patched or redirected.

tags | tool, kernel
systems | unix, solaris
MD5 | 1dd18d7d2e332b2fb9e23f57fedabbd4
Posted Nov 29, 2000

Solpromisc is a kernel module which you can load to detect attempts to put devices into promiscuous mode from user space via DLPI (e.g. solsniff, tcpdump, anything pcap based). It dumps the cred struct for the process, and the driver responsible, to the dmesg output buffer for collection by syslog. You are advised to read the source.

tags | tool, kernel
systems | unix
MD5 | ad65a0649c67f1a7357b5d13dd220aed
Posted Nov 29, 2000
Authored by Mike Ricketts | Site

SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, or raw IP packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.

Changes: IPv6 support, TCP options support, and lots of bugfixes!
tags | tool, arbitrary, udp, tcp
systems | unix
MD5 | ea3607a0d21906c545eec0c2459aecb1
Posted Nov 29, 2000

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

tags | tool, firewall, protocol
systems | linux
MD5 | 07213b5d3ed4702696b55d2c136c5a00
Posted Nov 29, 2000

Converts RPMs to tar files. Very useful archive tool!

tags | tool
systems | unix
MD5 | de6aae87eb128eb9763e81b01a2357a2
Posted Nov 29, 2000
Authored by Stealthmode316

Microsoft IIS Unicode remote exploit which uses tftp to obtain code to run.

tags | exploit, remote
MD5 | e96d45812c527f6782da9b8023411b96
Posted Nov 29, 2000
Authored by Zorgon encrypts/decrypts files with Crypt::Blowfish perl module. It is useful to encrypt home directories.

tags | perl, encryption
MD5 | c65eafc2e2c4ede67891c40db509dbfc
Posted Nov 29, 2000
Authored by s0ftpj, vecna | Site

Sinto.c is an interactive tty hijacker for Linux.

systems | linux
MD5 | a74319ef64630e2a3d3494dcd6f96e72
Posted Nov 29, 2000
Authored by Eric D

MMCrack is a Netbus 1.6 client installer. Attempts to avoid AV software. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
MD5 | 71c95e5d0b61dffd7a6c7967c56cf826
Posted Nov 26, 2000
Authored by J Noonan | Site

The following is a utility I wrote to quickly convert the unix style passwords in a Serv-U.ini file into standard unix password style for cracking. Serv-U Ftp uses standard unix password encryption which can be cracked with most unix password crackers. I have included a java class file and a windows executable.

tags | java, cracker
systems | windows, unix
MD5 | f895b9862423c3c111fdcbbb42ff0a5e
Posted Nov 26, 2000
Authored by Tomas Junnonen | Site

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: Bug fixes and small improvements.
tags | tool, firewall
systems | linux
MD5 | 30a669535d13cce991b76729327b1d29
Posted Nov 26, 2000

Microsoft Security Bulletin (MS00-080) - Microsoft has released a patch that eliminates the "Session ID Cookie Marking" vulnerability in IIS which allows malicious users who can sniff network traffic to hijack another users's secure web session. Microsoft FAQ on this issue available here.

tags | web
MD5 | 20efbbf3818f6bc0c6264045dd71adc8
Posted Nov 26, 2000

AVX for ICQ is a FREE utility which uses new technology to intercept; filter, and virus scan all files sent during an ICQ chat session. The new proprietary technology incorporates features found on enterprise-class corporate firewalls. AVX for ICQ uses the same powerful virus protection scan engine incorporated into the AntiVirus eXpert Professional (AVX), a full-featured virus protection application for desktops. If you are an ICQ user this utility is highly recommended.

tags | virus
MD5 | 29fce2702d019af5cea0d7a9f5ae8d8d
FreeBSD Security Advisory 2000.76
Posted Nov 26, 2000
Authored by The FreeBSD Project | Site

FreeBSD Security Advisory FreeBSD-SA-00:76 - The csh and tcsh code creates temporary files when the double less than operator is used, however these are created insecurely and use a predictable filename based on the process ID of the shell. An attacker can exploit this vulnerability to overwrite an arbitrary file writable by the user running the shell. The contents of the file are overwritten with the text being entered using the double less than operator, so it will usually not be under the control of the attacker, limiting the scope of this vulnerability to denial of service.

tags | denial of service, arbitrary, shell
systems | freebsd
MD5 | cfa8155a8788755b09c66be7885c154d
FreeBSD Security Advisory 2000.68
Posted Nov 26, 2000
Authored by The FreeBSD Project | Site

FreeBSD Security Advisory - The ncurses library, which comes with the base install of FreeBSD, contains exploitable buffer overflows. /usr/sbin/lpc, /usr/bin/top, and /usr/bin/systat link against ncurses and may be exploitable.

tags | overflow
systems | freebsd
MD5 | c6a83bae017fe6df2f11cd3a306ac122
Page 1 of 9

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

May 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    17 Files
  • 3
    May 3rd
    30 Files
  • 4
    May 4th
    29 Files
  • 5
    May 5th
    2 Files
  • 6
    May 6th
    3 Files
  • 7
    May 7th
    13 Files
  • 8
    May 8th
    27 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    15 Files
  • 11
    May 11th
    8 Files
  • 12
    May 12th
    2 Files
  • 13
    May 13th
    8 Files
  • 14
    May 14th
    7 Files
  • 15
    May 15th
    43 Files
  • 16
    May 16th
    19 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    3 Files
  • 20
    May 20th
    6 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    3 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By