Twenty Year Anniversary
Showing 1 - 9 of 9 RSS Feed

Files Date: 2001-03-27

Posted Mar 27, 2001
Authored by Advanced Research Corporation | Site

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Now detects the SunOS snmpXdmid remote root bug, and te lion worm. We also enhanced our SSH detection logic to address not only the new vulnerabilities but also its use as a backdoor.
tags | tool, cgi, scanner
systems | unix
MD5 | 927099d329810e19a0eaf2432e6381b3
Posted Mar 27, 2001
Authored by Nemes||y

Bind Scan is a perl script which scans for vulnerable BIND servers. Uses dig to get information.

tags | tool, scanner, perl
systems | unix
MD5 | dc636fc6aef159698372708090a6b958
Posted Mar 27, 2001

Apache-SSL is a set of patches for Apache to create a secure Webserver, based on SSLeay/OpenSSL. It is designed to be small, secure, and efficient.

tags | encryption
MD5 | ab733a762102c1bef13d01795f1bdbcf
Posted Mar 27, 2001
Authored by Gregory Duchemin | Site

MDcrack is a brute forcer for MD5 hashes. Many programs send MD5 hashes of passwords over the wire for security, not realizing that brute forcing MD5 hashes is as simple as brute forcing our old UNIX DES password. MDcrack has been built with performance in mind, and is capable of breaking up to 6 characters in length hashes in hours, 8 character passwords can be cracked in a couple days.

Changes: Now includes a human readable form output so grep can be used to search through results, a -F option to write in non-human form speeding up performance by 60%, and bug fixes.
systems | unix
MD5 | ac04a22be0afb437791f49dfcdf07539
Posted Mar 27, 2001
Authored by AleXXL | Site

ICQ MachineGun v1.0b is an ICQ spamer/bomber.The messages send through the ICQ server to any (Online/Offline) users. It's may be normal or uin messages. Tested on Windows 98SR2.

systems | windows
MD5 | d023db4af14bd823c783de2d6c9f735d
Posted Mar 27, 2001
Authored by Nelson Murilo | Site

chkrootkit locally checks for signs of a rootkit. Includes detection of LKM rootkits, ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux, FreeBSD, Solaris, and OpenBSD.

Changes: Now detects RK17 and the lion worm. New tests - Now checks for patched versions of basename, dirname, traceroute, rpcinfo, rexedcs, date, echo, env, timed, identd, pop2, pop3, write, tar, mail, biff, and grep.
tags | tool, integrity, rootkit
systems | linux, unix, solaris, freebsd, openbsd
MD5 | 2f1c9ec3c3bf62d50c70e25a52ddc1d7
Posted Mar 27, 2001
Authored by teso, stealth | Site

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Improved 2.4 support, better authentication checking, permanent PID removal, configure script, experimental exec redirection for i386.
systems | linux
MD5 | 69b3453f1fb1650388fc63297652d221
Posted Mar 27, 2001
Authored by Extirpater

Distributed DNS Flooder v0.1b - A powerful attack against DNS servers.

tags | denial of service
MD5 | 3672dfbec5c48d4a4a8aef930a29c8fa
Posted Mar 27, 2001
Authored by Tack

ASPSeek by SWSoft allows remote users to view any file on the webserver via a /../ bug.

tags | exploit, remote
MD5 | 46cec92ad366b836aa5f1751d55f8f0b
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    9 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    34 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By