exploit the possibilities
Showing 1 - 9 of 9 RSS Feed

Files Date: 2001-02-26

Posted Feb 26, 2001
Authored by Krfinisterre

Man-cgi v1.3 and v2.0 contains remote vulnerabilities which allow any file on the web server to be viewed, and some implementations allow remote command execution due to lack of filtering of hex encoded characters. Exploit URL's included.

tags | exploit, remote, web, cgi, vulnerability
MD5 | 3245d6534465bdf950b124781e2eba7f
Posted Feb 26, 2001
Authored by Tomas Junnonen | Site firestarter.sourceforge.net

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: This release includes fixes for some Linux 2.2 machines not being able to connect to the internet at all, fixes for some ToS problems on Linux 2.4 systems, and some minor additions.
tags | tool, firewall
systems | linux
MD5 | 15616618ffbb1ade9a3b8df7530f2809
Posted Feb 26, 2001
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
MD5 | 76b6c89d8ea99f9afb454e37344c5035
Posted Feb 26, 2001
Site imsafe.sourceforge.net

Imsafe is a host-based intrusion detection tool for Linux which does anomaly detection at the process level and tries to detect various type of attacks. Since Imsafe doesn't know anything about specific attacks, it can detect unknown and unpublished attacks or any other form of malicious use of the monitored application. Created for Linux systems but works on almost every UNIX flavor by watching strace outputs.

systems | linux, unix
MD5 | f81f500184bfe3ac5785abd2cf1dd377
Posted Feb 26, 2001
Site cheops-ng.sourceforge.net

Cheops-ng is a graphical network management tool for mapping and monitoring your network. It has host/network discovery functionality, OS detection, and it also does a port scan of each computer to tell what services are running, so you can use or administer them.

tags | tool, scanner
systems | unix
MD5 | 7a45a419fab7e81d7df9be8473e2cd17
Posted Feb 26, 2001
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng is a multi-platform syslogd replacement, with lots of new functionality. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The configuration scheme is both intuitive and powerful.

Changes: New stable release - Fixes a long-standing SIGHUP problem. Requires libol.
tags | system logging
systems | unix
MD5 | 63f863635f74021cf91bae7cac1fe52b
Posted Feb 26, 2001
Authored by Day-Jay

VB Script Creator takes an executable, and stores it in ascii codes into a vb script. When this vb script is executed, it will create a new exe and execute it. It could be useful but it shows how an executable can live dormant inside a vb script. Windows source included.

systems | windows
MD5 | 28517a892e018f0e4b5605b3579da567
Posted Feb 26, 2001
Authored by Okiwan | Site home.dal.net

Dcisco.c reads from a list of routers and uses them to ping-flood a single host. Logs into the routers and uses the ping command. This is an improved version of rampage.c.

tags | denial of service
MD5 | c5198595c942219fe8a2d323fa09ccaa
Posted Feb 26, 2001
Authored by Joe | Site sublimation.org

Scponly is an alternative shell (of sorts) for system administrators who would like to provide file transfer over SSH without providing any remote execution privileges. Functionally, it is best described as a wrapper to the "tried and true" ssh suite of applications. Features extra logging, chroot, file listing, and security checks.

Changes: Fixed wildcard functionality.
tags | remote, shell
systems | unix
MD5 | f7bf7f2ddc1e631e874a3c24823df5df
Page 1 of 1

File Archive:

July 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    13 Files
  • 2
    Jul 2nd
    12 Files
  • 3
    Jul 3rd
    1 Files
  • 4
    Jul 4th
    2 Files
  • 5
    Jul 5th
    34 Files
  • 6
    Jul 6th
    21 Files
  • 7
    Jul 7th
    21 Files
  • 8
    Jul 8th
    13 Files
  • 9
    Jul 9th
    6 Files
  • 10
    Jul 10th
    1 Files
  • 11
    Jul 11th
    3 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    19 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    15 Files
  • 16
    Jul 16th
    9 Files
  • 17
    Jul 17th
    2 Files
  • 18
    Jul 18th
    2 Files
  • 19
    Jul 19th
    19 Files
  • 20
    Jul 20th
    21 Files
  • 21
    Jul 21st
    53 Files
  • 22
    Jul 22nd
    14 Files
  • 23
    Jul 23rd
    14 Files
  • 24
    Jul 24th
    1 Files
  • 25
    Jul 25th
    1 Files
  • 26
    Jul 26th
    21 Files
  • 27
    Jul 27th
    8 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By