accept no compromises
Showing 1 - 14 of 14 RSS Feed

Files Date: 2001-02-21

openssh-2.5.1p1.tar.gz
Posted Feb 21, 2001
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Added support for RSA pubkeys, Agent forwarding, remote forwarding, and SFTP. Also includes many bug fixes. Full changelog available here.
tags | encryption
systems | linux, openbsd
MD5 | 3f1b92058f0ff58ff13c3c2f127fc012
hap-linux-2.0.38-5.diff.gz
Posted Feb 21, 2001
Site doutlets.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories iff they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: Minor security fixes - ioctl protections in chroot, and other bug fixes.
tags | root, patch
systems | linux, unix
MD5 | e3fe345fa59e5f5835a785154ce25880
hap-linux-2.2.18-4.diff.gz
Posted Feb 21, 2001
Site doutlets.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories iff they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: Minor security fixes - ioctl protections in chroot, and other bug fixes.
tags | root, patch
systems | linux, unix
MD5 | bec6b72aff70d0ac802b89a593af4ea5
cobull.c
Posted Feb 21, 2001
Authored by Sagi | Site idiotbox.co.il

Merant Micro Focus Cobol 4.1 local root exploit - Writes to /var/mfaslmf/nolicense.

tags | exploit, local, root
MD5 | cda9670c0ba5d6b9f1195c7b8e3fa2e4
exklock.c
Posted Feb 21, 2001
Authored by synnergy, Dethy | Site synnergy.net

FreeBSD X key lock (xklock) v2.7.1 and below local root exploit - Tested on FreeBSD ports collection v3.5.1 and v4.2.

tags | exploit, local, root
systems | freebsd
MD5 | c5a5aabc95055e9049edae3b5c5de143
ms01-011
Posted Feb 21, 2001

Microsoft Security Advisory MS01-011 - A core service running on all Windows 2000 domain controllers contains a flaw in the processing of requests which allows remote attackers to use up most of the CPU, limiting the number of logins the machine can process. Microsoft FAQ on this issue available here.

tags | remote
systems | windows, 2k
MD5 | ea4684541115a82d388a6a5a4771a3df
RHSA-2001:014-03.vixie-cron
Posted Feb 21, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:014-03 - A locally exploitable buffer overflow was found in the crontab command in the handling of long usernames - If the system administrator has created usernames 20 characters long, it is possible for those users to gain elevated privileges.

tags | overflow
systems | linux, redhat
MD5 | 3e26bb037146419fd787606322eadf0f
sigscr100.htm
Posted Feb 21, 2001
Authored by Data Wizard

Securing IGS Cisco Routers v1.00 - This paper will describe how you should obtain remote and local, information about an IGS Cisco Router. After we have collected some information that is useful to us, we'll try to secure the router as much as possible.

tags | paper, remote, local
systems | cisco
MD5 | f0010cc64dc3c641610c64ec68846d59
cbd.c.txt
Posted Feb 21, 2001
Authored by Wouter ter Maat | Site digit-labs.or

CBD.c is a simple backdoor which allows machines behind firewalls to be controlled via outgoing connections.

tags | tool, rootkit
systems | unix
MD5 | 85c194f62635a80b322a0566ac30942e
DoorWatch.zip
Posted Feb 21, 2001
Site cyberarmy.co.kr

Doorwatch is a tool for Windows 95/98/ME/NT/2000 which does IP scanning, port scanning, NetBios scanning, Trojan scanning, and more. Documentation in Korean - English here..

tags | trojan
systems | windows, 9x
MD5 | 2df0ac7df4a710cbef98074523da8d00
twwwscan12.zip
Posted Feb 21, 2001
Authored by Pilot | Site search.iland.co.kr

TWWWscan is a Windows based www vulnerability scanner which looks for 400 www/cgi vulnerabilities . Displays http header, server info, and tries for accurate results. Now features anti-IDS url encoding and passive mode scan. Tested on win95 osr2 win98,win98se,win nt4,win 2k/Me.

Changes: Major update - Added virtual host scan, GET method, http request injection, blowfish support, and bug fixes.
tags | web, cgi, vulnerability
systems | windows, 9x, unix
MD5 | e2d407b2dd2b84f3ce234dd3cacebe61
lpdfp.tar.gz
Posted Feb 21, 2001
Authored by Fobic | Site low-level.net

Lpdfp is a perl script which sends a malformed query to TCP port 515 in an attempt to determine the remote OS. Whitepaper available here.

tags | remote, perl, tcp
systems | unix
MD5 | 5710a72f6248610a48a6e7ffda60f133
osdetect-lpd.txt
Posted Feb 21, 2001
Authored by Fobic | Site low-level.net

Remote OS Detection using LPD Querying - Line printer daemons listening on TCP port 515 can give away information about which OS is running. Proof of concept code which contains a database of LPD returned messages and OS matches here.

tags | paper, remote, tcp, proof of concept
MD5 | 4e667a19a6fc4fd69e37e0ce2175a2da
Nmap Scanning Utility 2.54 BETA 19
Posted Feb 21, 2001
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: Ported NmapFE to Windows, added random data length feature, bug fixes, and capitalized all references to God in error messages.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 1aba0a85432648565558d3b89a6a013e
Page 1 of 1
Back1Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    15 Files
  • 19
    Oct 19th
    10 Files
  • 20
    Oct 20th
    7 Files
  • 21
    Oct 21st
    4 Files
  • 22
    Oct 22nd
    2 Files
  • 23
    Oct 23rd
    10 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close