exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2000-12-27

netsec43.txt
Posted Dec 27, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the News the past week. In this issue: Laptop encryption and international travel, and much more.

SHA-256 | 942f2773e759562a9809329ed469a6366c25804fdcdd69b1e47abad7a1f95e7e
chkrootkit-0.19.tar.gz
Posted Dec 27, 2000
Authored by Nelson Murilo

chkrootkit locally checks for signs of a rootkit. Includes detection of LKM rootkits, ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux, FreeBSD, Solaris, and OpenBSD.

Changes: Ambient's Rootkit for Linux (ARK) detection, OpenBSD support, xinetd support, new command line options, and bug fixes.
tags | tool, integrity, rootkit
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | afe99cb3dadecbc1cdf1ac56fab17283b5c7eca9640f4798fd3ff404e05b2234
debian.gpg.txt
Posted Dec 27, 2000
Site debian.org

Debian Security Advisory - There is a problem in the way gpg checks detached signatures which can lead to false positives. Also it was discovered that gpg would import secret keys from key-servers, circumventing the web of trust. GnuPG homepage here.

tags | web
systems | linux, debian
SHA-256 | 5d14e9537651bbc63698a8574da5f9f191cba27896ffb7f45b4cb6d6b2e12a34
heh-5.tar.gz
Posted Dec 27, 2000
Authored by heh | Site dtmf.com.ar

HEH! Magazine Issue #5 (In Spanish). In this issue: Free Calling in Argentina, Accessing Milicom Modems (Breeze Com), Wireless info, 6 year old cryptography, Semipublic Telephones, Disturbing a StarTac, Hacking Cuspide, and more.

tags | telephony, magazine
SHA-256 | 09a68469031fafff5f58e2c56104afae70a992a4fd50ad3b12999524f1d27b3b
labs58.txt
Posted Dec 27, 2000
Site ussrback.com

USSR Advisory #58 - The 1st Up Mail Server v4.1 contains a buffer overflow in a long "mail from:" tag which can result in denial of service. Fix available here.

tags | denial of service, overflow
SHA-256 | b3f2abaf7829914bb59b16a6596355c2829b25a197a106b1184540398916f867
spoofW.c
Posted Dec 27, 2000

SpoofW.c "spoofs" messages from any user on the system (can only be used as root, or as normal user on very old systems). Re-written by Root-Dude

tags | root, spoof
systems | unix
SHA-256 | 4a5e56e60655e168369f38dd84cc5052a91abd3ee503bc5cc47330ac24ff1cba
ummmm.c
Posted Dec 27, 2000
Authored by Incubus, R00T-dude | Site securax.org

ummmm.c v2.1 is a URL obfuscation tool which converts something like /cgi-bin/some.cgi into %2f%63%67%69%2d%62%69%6e%2f%73%6f%6d%65%2e%63%67%69. It might be used in cgi scanners which require an input file with cgi requests.

tags | cgi
systems | unix
SHA-256 | 4968493ed605717ad8e51ff70428152b2255e6ab112c2e87c121f76b07e16000
Page 1 of 1
Back1Next

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close