Exploit the possiblities
Showing 1 - 25 of 217 RSS Feed

Files Date: 2000-11-01 to 2000-11-30

wap-nmap-1.0.0.tar.gz
Posted Nov 29, 2000
Site hackinthebox.org

Wap-nmap enables an nmap scan from a WAP enabled device and pumps the results back to the device.

tags | tool, nmap
systems | unix
MD5 | a327ede0366163613e7d8bc320935f36
netsec39.txt
Posted Nov 29, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Guide to linux kernel compilation including iptables firewalling, and more.

tags | kernel
systems | linux
MD5 | 34c380f4981cd91a2245338e7dcab5fe
free-cellcalls.txt
Posted Nov 29, 2000
Authored by Zion | Site fuxx0rs.cjb.net

How to get free cellphone calls in Germany by using a free 800 number.

tags | telephony
MD5 | 6269a845457758ccbcc376886744ea7b
winupw.zip
Posted Nov 29, 2000
Authored by Nu Omega Tau | Site nuomegatau.com

The WinU password cracker v0.7b decrypts WinU's stored passwords from the registry. Versions 2.0-5.2 are supported.

tags | registry
MD5 | c4ef64d2ba8ca9b0101fff563d9a19a6
bsdi_inc.c
Posted Nov 29, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 /usr/contrib/mh/bin/inc local root exploit.

tags | exploit, local, root
MD5 | 46db6094aa575402f671da8c14887aef
debian.ghostscript.txt
Posted Nov 29, 2000
Site debian.org

Debian Security Advisory - ghostscript uses temporary files to do some of its work. Unfortunately the method used to create those files wasn't secure: mktemp was used to create a name for a temporary file, but the file was not opened safely. A second problem is that during build the LD_RUN_PATH environment variable was set to the empty string, which causes the dynamic linker to look in the current directory for shared libraries.

systems | linux, debian
MD5 | 1af88d155bd6d5fb83c959c03555f6e0
ms00-090
Posted Nov 29, 2000

Microsoft Security Bulletin (MS00-090) - Microsoft has released a patch that eliminates two unrelated serious security vulnerabilities in Microsoft Windows Media Player. These vulnerabilities allow a malicious user to cause a program of his choice to run on another user's computer. Microsoft FAQ on this issue available here.

tags | vulnerability
systems | windows
MD5 | 81d1001e6537d6a50fca59fd9c2b2ff9
anger-1.33.tgz
Posted Nov 29, 2000
Authored by Aleph One | Site securityfocus.com

Anger v1.33 implements a PPTP challenge/response sniffer. These c/r can be input into L0phtcrack to obtain the password, and b) An active attack on PPTP logons via the MS-CHAP vulnerability to obtain the users password hashes. Notice that this also generates the password hashes of the new password the user wanted to use, which can be put into L0phtcrack to get passwords, into a modified smbclient to logon onto a SMB sever, or into a modified PPP client for use with the Linux PPTP client.

tags | tool, sniffer
systems | linux
MD5 | 3b7bc29328e437c8ba2b02a9985b6c89
syslog-ng-1.4.9a.tar.gz
Posted Nov 29, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng is a multi-platform syslogd replacement, with lots of new functionality. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: New stable release - Adds fixes for a remote denial of service attack. Requires libol-0.2.20.
tags | system logging
systems | unix
MD5 | efe22378eb3888ad55e8ddfb49c3f804
pakemon-0.3.0.tar.gz
Posted Nov 29, 2000
Site sfc.keio.ac.jp

pakemon has been developed to share IDS components based on the open source model. Current version of pakemon monitors all traffic on a network, search given data patterns in the traffic and output session logs and summary logs of matched traffic. Tested on RedHat Linux 6.2j, OpenBSD2.7, FreeBSD 3.3, and NetBSD 1.4.

tags | tool, intrusion detection
systems | linux, redhat, netbsd, unix, freebsd
MD5 | 27e99d6a8e76d6b18741e19625018f6c
listsyscalls-1.0.tar.gz
Posted Nov 29, 2000
Site low-level.net

Listsyscalls is a tool for listing contents of the syscall table on a running Solaris kernel. Has various uses, including being able to check if a syscall function has been patched or redirected.

tags | tool, kernel
systems | unix, solaris
MD5 | 1dd18d7d2e332b2fb9e23f57fedabbd4
solpromisc-1.0.tar.gz
Posted Nov 29, 2000
Site low-level.net

Solpromisc is a kernel module which you can load to detect attempts to put devices into promiscuous mode from user space via DLPI (e.g. solsniff, tcpdump, anything pcap based). It dumps the cred struct for the process, and the driver responsible, to the dmesg output buffer for collection by syslog. You are advised to read the source.

tags | tool, kernel
systems | unix
MD5 | ad65a0649c67f1a7357b5d13dd220aed
sendip-1.2.tar.gz
Posted Nov 29, 2000
Authored by Mike Ricketts | Site earth.li

SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, or raw IP packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.

Changes: IPv6 support, TCP options support, and lots of bugfixes!
tags | tool, arbitrary, udp, tcp
systems | unix
MD5 | ea3607a0d21906c545eec0c2459aecb1
firedaemon-1.0.tgz
Posted Nov 29, 2000
Site speakeasy.org

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

tags | tool, firewall, protocol
systems | linux
MD5 | 07213b5d3ed4702696b55d2c136c5a00
rpm2tar-1.0.0.tar.gz
Posted Nov 29, 2000

Converts RPMs to tar files. Very useful archive tool!

tags | tool
systems | unix
MD5 | de6aae87eb128eb9763e81b01a2357a2
NIT_UNICODE.zip
Posted Nov 29, 2000
Authored by Stealthmode316

Microsoft IIS Unicode remote exploit which uses tftp to obtain code to run.

tags | exploit, remote
MD5 | e96d45812c527f6782da9b8023411b96
cryptdata.pl
Posted Nov 29, 2000
Authored by Zorgon

Cryptdata.pl encrypts/decrypts files with Crypt::Blowfish perl module. It is useful to encrypt home directories.

tags | perl, encryption
MD5 | c65eafc2e2c4ede67891c40db509dbfc
sinto.c
Posted Nov 29, 2000
Authored by s0ftpj, vecna | Site s0ftpj.org

Sinto.c is an interactive tty hijacker for Linux.

systems | linux
MD5 | a74319ef64630e2a3d3494dcd6f96e72
mmcrackz.zip
Posted Nov 29, 2000
Authored by Eric D

MMCrack is a Netbus 1.6 client installer. Attempts to avoid AV software. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
MD5 | 71c95e5d0b61dffd7a6c7967c56cf826
SUPassConvert.tgz
Posted Nov 26, 2000
Authored by J Noonan | Site 2cic.com

The following is a utility I wrote to quickly convert the unix style passwords in a Serv-U.ini file into standard unix password style for cracking. Serv-U Ftp uses standard unix password encryption which can be cracked with most unix password crackers. I have included a java class file and a windows executable.

tags | java, cracker
systems | windows, unix
MD5 | f895b9862423c3c111fdcbbb42ff0a5e
firestarter-0.5.1.tar.gz
Posted Nov 26, 2000
Authored by Tomas Junnonen | Site firestarter.sourceforge.net

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: Bug fixes and small improvements.
tags | tool, firewall
systems | linux
MD5 | 30a669535d13cce991b76729327b1d29
ms00-080
Posted Nov 26, 2000

Microsoft Security Bulletin (MS00-080) - Microsoft has released a patch that eliminates the "Session ID Cookie Marking" vulnerability in IIS which allows malicious users who can sniff network traffic to hijack another users's secure web session. Microsoft FAQ on this issue available here.

tags | web
MD5 | 20efbbf3818f6bc0c6264045dd71adc8
avx4icq.exe
Posted Nov 26, 2000
Site avx.com

AVX for ICQ is a FREE utility which uses new technology to intercept; filter, and virus scan all files sent during an ICQ chat session. The new proprietary technology incorporates features found on enterprise-class corporate firewalls. AVX for ICQ uses the same powerful virus protection scan engine incorporated into the AntiVirus eXpert Professional (AVX), a full-featured virus protection application for desktops. If you are an ICQ user this utility is highly recommended.

tags | virus
MD5 | 29fce2702d019af5cea0d7a9f5ae8d8d
FreeBSD Security Advisory 2000.76
Posted Nov 26, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:76 - The csh and tcsh code creates temporary files when the double less than operator is used, however these are created insecurely and use a predictable filename based on the process ID of the shell. An attacker can exploit this vulnerability to overwrite an arbitrary file writable by the user running the shell. The contents of the file are overwritten with the text being entered using the double less than operator, so it will usually not be under the control of the attacker, limiting the scope of this vulnerability to denial of service.

tags | denial of service, arbitrary, shell
systems | freebsd
MD5 | cfa8155a8788755b09c66be7885c154d
FreeBSD Security Advisory 2000.68
Posted Nov 26, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory - The ncurses library, which comes with the base install of FreeBSD, contains exploitable buffer overflows. /usr/sbin/lpc, /usr/bin/top, and /usr/bin/systat link against ncurses and may be exploitable.

tags | overflow
systems | freebsd
MD5 | c6a83bae017fe6df2f11cd3a306ac122
Page 1 of 9
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    3 Files
  • 17
    Dec 17th
    13 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close