exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2001-03-15

Rkit-1.01.tgz
Posted Mar 15, 2001
Authored by TBob

RKit is a Linux LKM backdoor/rootkit which intercepts the SYS_setuid call and ups a specified UID to 0 when that user logs in thereby successfully (and covertly) backdooring the root account.

tags | tool, root, rootkit
systems | linux, unix
SHA-256 | 9e0558a46516706382a2647e56185358b0531f40282626e1c0cbf6705a4a05d2
sqlping.c
Posted Mar 15, 2001
Authored by Fyodor | Site relaygroup.com

Sqlping v1.1 (unix port) is a tool which sends a specially crafted UDP packet to port 1434 to SQL Server 2000 which will return gobs of useful info including SQL version and service pack. Based on SQLping from http://www.sqlsecurity.com.

tags | tool, web, udp, scanner
systems | unix
SHA-256 | 05a1be726607efbcb157f03dc375f6e2e53bd8ce933f93a6dc180bd70d37eaf7
sqlping.zip
Posted Mar 15, 2001
Authored by Chip Andrews | Site sqlsecurity.com

Sqlping v1.2 is a tool which sends a specially crafted UDP packet to port 1434 on SQL Server 2000 which will return gobs of useful info including SQL version and service pack. Features the ability to send broadcast queries. Released at Black Hat Windows 2000 Feb 14th and 15th.

tags | udp
systems | windows
SHA-256 | 55222ecc8d6707ba80fdc70f94f75b0c659234cf866a6db70c7971c3d37a276a
debian.zope.txt
Posted Mar 15, 2001
Site debian.org

Debian Security Advisory - On versions of Zope prior to 2.2beta1 it was possible for a user with the ability to edit DTML can gain unauthorized access to extra roles during a request.

systems | linux, debian
SHA-256 | e59e84ea5add01b5cbf3c7251d060ddd800507723217e66b84e417e02472ca4b
debian.xemacs.txt
Posted Mar 15, 2001
Site debian.org

Debian Security Advisory DSA-042-1 - Gnuserv, a remote control facility for Emacsen which is available as standalone program as well as included in XEmacs21, has a buffer overflow which can be exploited to make the cookie comparison always succeed.

tags | remote, overflow
systems | linux, debian
SHA-256 | 9ed783e0c6abaf46763de9ff4df5c7e63418c4cad78d6fe51f25bf934992f3cc
Nmap Scanning Utility 2.54 BETA 22
Posted Mar 15, 2001
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: Added TCP Timestamp sequence checking for OS detection and Netcraft-style uptime tests. Apple Darwin (Mac OS X) 1.2 now supported, and SPARC64 errors fixed. Added IPID sequence number predictability report (also now used in OS detection).
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 2daefb4ffb47bf34b2d5a8e52abb432d5c8e3cf93a7f96aea425cdea97acad99
downloadF_cpp.cpp
Posted Mar 15, 2001
Authored by Orange Remote

Downloads a file via ftp. Executes it. Removes it. Easy to hide. Easy to bind. C++ source. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | 135eed4a33cd7b8f95b4c8864e0e61c5ce1f793d3aca1b36baaa24ba58add957
mdcrack-0.6.tar.gz
Posted Mar 15, 2001
Authored by Gregory Duchemin | Site mdcrack.multimania.com

MDcrack is a brute forcer for MD5 hashes. Many programs send MD5 hashes of passwords over the wire for security, not realizing that brute forcing MD5 hashes is as simple as brute forcing our old UNIX DES password. MDcrack has been built with performance in mind, and is capable of breaking up to 6 characters in length hashes in hours, 8 character passwords can be cracked in a couple days.

Changes: It is now possible to simulate a complete authentication process using a server side pseudo-random key. Two options '-e' (end) and '-b' (beginning) concatenate the server static string to the password being cracked. Hashes are now rightly displayed during a verbose session.
systems | unix
SHA-256 | 781feb57179e68b95e8c36683c6db09e1e322cff17f77a37cc7bb27bb0c0b78c
hjksuite-0.1b.tar.gz
Posted Mar 15, 2001
Authored by Cyrax | Site pkcrew.org

Hjksuite is a collection of programs for hijacking. First of all it contains hjklib, a library for hijacking. It contains also some programs like hjkbnc which allows irc hijackinig directly with your client, hjkhttpd for hijacking HTTP sessions, and hjknetcat, for hijacking text connections.

tags | web
systems | unix
SHA-256 | 7b6ab15cef86c5f16b73f1372efc23c3e83b1f2519a626d3d96766fc5a7f1bf2
debian.joerc.txt
Posted Mar 15, 2001
Site debian.org

Debian Security Advisory DSA-041-1 - The text editor joe attempts to read .joerc from the current directory, allowing malicious local users to execute commands as other users if they use joe in writable directories.

tags | local
systems | linux, debian
SHA-256 | 4ef5818fa6e26bbf695f6491af29bc7ea87e73bc75e7017b3f7c54fb5ddf63e4
spc001.zip
Posted Mar 15, 2001
Authored by Temeran | Site securityfriday.com

Share Password Checker acquires the list of shared folders of a Windows 95/98/Me machine on the network and shows you those folders' passwords. This tool acquires the list of the shared folders also for Windows NT/2000 machines, but it only distinguishes folders who have no password. "Share Password Checker" uses the"Share Level Password" Vulnerability. And "Share Password Checker" aims to check whether the patch for this vulnerability has been applied to the target host. Please see the topic Reveal Windows9x Share Password for more detail.

systems | windows
SHA-256 | d5d2e100d87bc2cf813e6fdcad9ee4ecf21325a738cafc3098786628e219f861
debian.slrn.txt
Posted Mar 15, 2001
Site debian.org

Debian Security Advisory DSA-040-1 - The slrn newsreader has remotely exploitable buffer overflows if the wrapping/unwrapping functions are enabled.

tags | overflow
systems | linux, debian
SHA-256 | d550a54801dcd1426379ea887a12f79fc2fb115ab5b9502b594ec7acd26d94d9
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close