exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2001-03-19

lids-1.0.6-2.4.2.tar.gz
Posted Mar 19, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: This release includes an inheritable level (TTL) feature, modifications to the inheritable routine in do_fork() and do_execve(), updates to the lidsadm and lidsadm man pages, a parent pid in lids security alert message, and some code clean-ups. Changelog available here.
tags | kernel, root
systems | linux
SHA-256 | cbaab72e4f20d696eea4e7251c3a4edfe3d75660587798d51395378d701d87e6
xscreensaver-3.30.tar.gz
Posted Mar 19, 2001
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: New hacks - molecule, dangerball, and rotzoomer, a new version of "gflux", the ability to have "gltext" display the current time, and bug fixes.
tags | root
systems | unix
SHA-256 | 363307e21737a48b4ca59bded453f00008e46fa84e58c6f349f30e4110dcca81
OW-003-ssh-traffic-analysis.txt
Posted Mar 19, 2001
Authored by Solar Designer | Site openwall.com

Openwall Advisory - Passive Analysis of SSH Traffic. This advisory demonstrates several weaknesses in implementations of SSH protocols. When exploited, they let the attacker obtain sensitive information by passively monitoring encrypted SSH sessions. The information can later be used to speed up brute-force attacks on passwords, including the initial login password and other passwords appearing in interactive SSH sessions, such as those used with su(1) and Cisco IOS "enable" passwords. All attacks described in this advisory require the ability to monitor (sniff) network traffic between one or more SSH servers and clients.

tags | paper, protocol
systems | cisco
SHA-256 | bfeb7cdafd8058c9afd04d84449f245f170f6508d8227c5fdcf97b1a9b102c98
vv5.pl
Posted Mar 19, 2001
Authored by Georgi Guninski | Site guninski.com

IIS 5.0 / Windows 2000 WebDAV remote denial of service exploit - Sends a specially crafted request, as described in MS01-016.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 025cc976603fe7243eaee030053fb6e90d63847d20684126b98f538d5ccadbca
freebsd.execve_binsh.c
Posted Mar 19, 2001
Authored by Marcetam

FreeBSD 23 byte execve code.

tags | shellcode
systems | freebsd
SHA-256 | 5297d7b01c14324cdd6cab82dc510abfbfc8418025d9ca092cd05332f6d6e238
n82x.c
Posted Mar 19, 2001
Authored by Ix, Lucysoft

Named v8.2.x remote root exploit - Uses the tsig bug. Only includes linux shellcode.

tags | exploit, remote, root, shellcode
systems | linux
SHA-256 | d5e607468e5db97a21778c60ad95951a67c88c8da40feb92ff587708b01bae99
glob-abuse.c
Posted Mar 19, 2001
Authored by R00T-dude

This code exploits a bug in the glob() function used in some ftpd's (like proftpd, netbsd ftpd, iis ftpd). It sends a 'ls' command for which will take up about 100% of a systems memory, creating a very effective dos.

tags | exploit
systems | netbsd
SHA-256 | 7f1cdb3862da20f5231d975f2a3cbd7fb8960b8beeaf13ca49ae65058f1a1479
apachebd.tgz
Posted Mar 19, 2001
Authored by venomous

Apache backdoor - Backdoors apache 1.3.17 / 1.3.19 to spawn a root shell when a certain page is requested.

tags | tool, shell, root, rootkit
systems | unix
SHA-256 | e698c564d4808ff114e58bf39b34e7af99192e7dd9bcc390a7b4266e71965926
MDCrack.zip
Posted Mar 19, 2001
Authored by Goldie, checksum | Site checksum.org

Win32 port of MD5Crack.

systems | windows
SHA-256 | 0bb1c55e2cdc8f43131518137fdd9b3a519365af7903c0af8020c013deffa344
ftpsed.pl
Posted Mar 19, 2001
Authored by Speedy | Site dutchriot.com

ftpsed.pl is a perl script which exploits a denial of service vulnerability in Proftpd v1.2 and below. Requires a username and password.

tags | exploit, denial of service, perl
SHA-256 | 697c7292c32b0c1b43a2055599df28cd1aac80583e074fdfabc4a4b2853e3725
joe28.c
Posted Mar 19, 2001
Authored by Fides

Joe 2.8 local exploit - Requires sysadmin intervention. Tested on FreeBSD 4.2-Release.

tags | exploit, local
systems | freebsd
SHA-256 | f9e4feab1aeef09555b1b33372679785c883b5a1fe388035f561b68cdbce1373
StJude_LKM-0.10.tar.gz
Posted Mar 19, 2001
Authored by Tim Lawless | Site sourceforge.net

Saint Jude LKM is a Linux Kernel Module for the 2.2.0 and 2.4.0 series of kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.

Changes: This is the most stable version yet. Tested with kernel 2.4. Added Learning Parser to facilitate the generation of the Rulebase from the Learning Mode output. Combined with the Override directive, remote root attacks may be thwarted.
tags | remote, kernel, local, root
systems | linux
SHA-256 | f7f922f8f16946ab95f37c07600d7d52e13c7d3e3b2865374f613ca83947a95c
StJude_LKM-0.07.tar.gz
Posted Mar 19, 2001
Authored by Tim Lawless | Site sourceforge.net

Saint Jude LKM is a Linux Kernel Module for 2.2.0 and greater kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work equally well for both known and unknown exploits.

Changes: Fixes problems on some of the newer Linux distributions. Makefile can now find include files better.
tags | remote, kernel, local, root
systems | linux
SHA-256 | c105819d64f6618d2359f51876d4b6557c65033cc7bb9236e94192f35a1f1e23
logplay-2.0-nosounds.tgz
Posted Mar 19, 2001
Site projects.babblica.net

Logplay is a sound-capable alert system with a modular design. It can monitor system logs, load averages, network connectivity, and is modular to support user-specific monitors. Logplay alerts the user via a sound (using anything Sox's play script understands), an e-mail, or system commands. It should run on almost any *nix system, or any system that has Perl, given that you can run it in the background and you write a module.

Changes: This is the first stable release, featuring a fully rewritten codebase with a modular approach and an extensive reworking of everything. There are currently 3 monitoring and 3 output modules, and even includes instructions on creating your own.
tags | perl, system logging
systems | unix
SHA-256 | 81716dcb4f91ce68a1dbfbeff61585a3fc2553f70d0edda0ffb5643a161688b8
fwipe-0.30.tar.gz
Posted Mar 19, 2001
Authored by Len Budney | Site pobox.com

fwipe overwrites your file a specified number of times (default: 5) and then deletes it. It is extremely secure; it will not be confused by filenames containing special characters, and is suitable for use against law enforcement.

Changes: A new "slowness" feature has been added to ease console "freezing" during large wipes.
systems | unix
SHA-256 | fee232d53a5cc6244852f216e41d1e0b4976221f14a16c93e40c90ae6c7eaf0f
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close