exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2001-02-16

Posted Feb 16, 2001
Site suse.de

SuSE Security Advisory SuSE-SA:2001:04 - SSH1 allows remote users to brute-force passwords without getting noticed or logged, SSH session key recovery, and remote root compromise. Switch to openssh.

tags | remote, root
systems | linux, suse
MD5 | 530084336eedabe30d2d04bac3df3d64
Posted Feb 16, 2001
Authored by Slinkai

Rampage.c reads from a list of routers and uses them to ping-flood a single host. Logs into the routers and uses the ping command.

tags | denial of service
MD5 | 29036e5d0b92747471de954073b9f706
Posted Feb 16, 2001
Authored by Unregistered

The Ultimate Bulletin Board System allows remote users to get the username and pass of anyone that is a registered user of a ubb forum that has html enabled and uses cookies to store the username and passwords of the users.

tags | exploit, remote
MD5 | 828aa040cb14cedf7cc184ea53596262
Posted Feb 16, 2001
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for February 15, 2001. In this issue: Hard-Drive-Embedded Copy Protection, An Intentional Backdoor, The Doghouse: NASA and eTrue, A Semantic Attack on URLs, E-mail Filter Idiocy, Air Gaps, and Internet Voting vs. Large-Value e-Commerce.

tags | crypto, magazine
MD5 | c2aff2c70c0f3ab1fea1400b16d8131d
Posted Feb 16, 2001

Microsoft Security Advisory MS01-009 - The PPTP service in Windows NT 4.0 has a flaw which allows remote attackers to crash the service via a malformed packet. Microsoft FAQ on this issue available here.

tags | remote
systems | windows
MD5 | 268ca57ee4da909ca64adf7c1ab56433
Posted Feb 16, 2001
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

Crypto-gram for January 15, 2001. In this issue: A Cyber UL?, Solution in Search of a Problem: SafeMessage, A Social Engineering Example, The Doghouse: Gianus Technologies, NIST Crypto Update, Code Signing in Microsoft Windows, and PGP Broken with keystroke recorder.

tags | crypto, magazine
systems | windows
MD5 | 9e14041566089c87a4a5bc846f1d6d11
Posted Feb 16, 2001
Authored by Marco Ivaldi | Site raptor.antifork.org

Autoscan scans for valid NUAs using the autonet x25pad gateway, logging valid NUAs that refuse connection (requiring a valid NUI to connect), freely available NUAs (accepting reverse charging) and Calls Cleared 0-67 (DTE, subaddress specification needed).

tags | tool, scanner
systems | unix
MD5 | 21af9288325fd6466ecef86879653818
Posted Feb 16, 2001
Authored by Moofz | Site big.badlink.net

Winject is a low-level packet builder/injector for win9x dialup users. It allows you to create custom packets with real or spoofed IP addresses.

tags | spoof
systems | windows
MD5 | 1080620a17a024797819ed18cea3adcc
Posted Feb 16, 2001
Site kapheine.hypa.net

Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.

Changes: This release includes internationalization support, authconf/automake support, and some fixes for compiling on various distributions.
tags | web, cracker
MD5 | bd2eb39eafa00990b403dd3746dc4893
Posted Feb 16, 2001
Site strange.nsk.yi.org

RootJail is a small program designed help run dangerous or unreliable services more securely. It works like init in that it spawns processes and watches for them, respawning them upon death. If the child is misbehaving, in that it's dieing repeatedly, it is then disabled. In addition, it uses chroot to prevent the service from accessing files outside its directory.

systems | unix
MD5 | 5cd058119410bccaec0590d5f29526b4
Posted Feb 16, 2001
Site sans.org

Ramenfind v0.4 is a local Ramen worm detection and removal tool. Final release unless problems are found.

Changes: Ramenfind now handles a new ramen variant, which creates /usr/sbin/update.
tags | worm, denial of service, local
MD5 | 47ec41edc981a66df35e1dcaec2fa47c
Posted Feb 16, 2001

Microsoft Security Advisory MS01-010 - Windows Media Player 7 has a vulnerability in the skins feature which manifests itself when a Windows Media Player skin (.WMZ) file is downloaded from an untrusted website. Java code can be used to read and browse files on a local machine. The vulnerability stems from the fact that "skins" are downloaded to a known location on a victim's computer and are stored in a .zip package. If the .zip package contained a Java class (.class) file, any Java code in this class can be executed under the local computer security zone, taking arbitrary action on the user's machine. Microsoft FAQ on this issue available here.

tags | java, arbitrary, local
systems | windows
MD5 | 33501d3ba371bc0d3d6e28654cda6bfb
FreeBSD Security Advisory 2001.25
Posted Feb 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:25 - Systems which have installed the optional Kerberos IV distribution are vulnerable to attacks via the telnet daemon due to an overflow in the libkrb KerberosIV authentication library and improper filtering of environmental variables by the KerberosIV-adapted telnet daemon.

tags | overflow
systems | freebsd
MD5 | 12e298711b3565cf86c2c893dd40ff8c
Page 1 of 1

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By