exploit the possibilities
Showing 1 - 25 of 215 RSS Feed

Files Date: 2001-04-01 to 2001-04-30

Posted Apr 28, 2001
Authored by faith | Site f41th.org

Faith Issue 14 - Digital Multiplexing System, Meridian 1 PBX Admin: Part II, Telewest VoIP, Modem Brown-Box, Time-Division Multiplexing, and Trunking Network Primer.

tags | magazine
MD5 | 9d14c96df976cc4e9cdd02db9d802d2f
Posted Apr 28, 2001
Site dive.to

Khe Sanh is a remote administration tool. Features include: automated search for server in a class C subnet, Explorer-like browsing through directories, local network resources and registry, maintainig subnet list, autoscan and more. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, local, trojan, registry
MD5 | 0d92307e25504aeeb8d16257c23b88f0
Posted Apr 28, 2001
Site dive.to

Assault Hackworks is a security scanning tool which features include subnet management, exploiting NBT security hole with easy access to remote files via Explorer-like interface, and scanning for Khe Sanh servers.

tags | remote
MD5 | 4a898f3dc17dce2ded28b6125e415c5c
Posted Apr 27, 2001
Authored by Barak Weichselbaum | Site komodia.com

Tcpip_lib V3.1 is a library for Windows 2000 which allows constructing IP's, IP spoofing, attacks, and more. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.

Changes: Major OOD redesign, added new UDP/TCP functionality, enhanced documentation, support for multithreading and added new samples.
tags | spoof, protocol
systems | windows
MD5 | 5e459f49dcda3ccff6718578c4d69749
Posted Apr 27, 2001
Authored by Andris K

A bug in FTP server v0.25 for Windows 9x/NT has a bug which allows remote users to download and view any file on the system.

tags | exploit, remote
systems | windows
MD5 | c4ecb3963a8feb4c516a70dac3768fed
Posted Apr 27, 2001
Authored by Tim J Robbins | Site box3n.gumbynet.org

tcpspy is a linux administrator's tool that logs information about incoming and outgoing TCP/IP connections: local address, remote address and, probably the most useful feature, the user name. The current version allows you to include and exclude certain users from logging - this may be useful if you suspect one of the users on your system is up to no good but do not want to violate the privacy of the other users.

Changes: Rules can now be read from a file. Also includes code cleanup and optimizations.
tags | remote, local, tcp
systems | linux
MD5 | a8338ef64c32e16054457b47c91b9a49
Posted Apr 27, 2001
Site poseidon.pspt.fi

It is a well known fact that electrical devices and, in this case, specifically computers generate electromagnetic radiation which causes the device to interfere with radio reception. Tempest-AM generates AM radio signal on your monitor in the form of patterns. This pattern causes high resolution monitors to transmit the AM signal. This signal can be picked up by simple handheld radio from a distance. Tempest-AM can be set to transmit on any carrier, but not on high frequencies like FM. Tempest-AM is not a useful utility but merely an example for anyone who is interested in Tempest and is able to test the program.

Changes: New Makefile and configure scripts.
systems | unix
MD5 | 22f5d82b546105216b6869790e4262d7
Posted Apr 26, 2001
Site azstarnet.com

Serial Line Sniffer is a serial port logging utility. It listens to the specified serial port and logs all data going through this port in both directions.

Changes: A fix for an infinite loop generated by searching for the next available pty.
tags | tool, sniffer
MD5 | 9a12d565bbc7de487fc4647260c1a625
Posted Apr 25, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Several run-time options added: gShield can now add clienthosts, highport access clients and blacklisted clients directly to the current ruleset and the permanent configuration. Security warnings added for recent FTP/RELATED issue, NOLOG now quietly drops broadcasts automatically, some kernel-specific ip-sysctl options are now configurable via gShield.conf (including ECN), documentation updated for new run-time options.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | f5bbd405970898a737a8cc84f457677c
Posted Apr 25, 2001
Site azstarnet.com

Serial Line Sniffer is a serial port logging utility. It listens to the specified serial port and logs all data going through this port in both directions.

Changes: Options to timestamp output and to print number of bytes transmitted added.
tags | tool, sniffer
MD5 | 5020a8eb85b96d7ea3f645e29f5f4339
Posted Apr 25, 2001
Site sourceforge.net

fwmon is a firewall monitor for Linux which integrates with ipchains to give you realtime notification of firewall events. It has fairly customizable output, allowing you to display a packet summary, hex, and ascii data dumps to stdout, a logfile, or tcpdump-style capture files. It also boasts some simple security features such as the ability to chroot itself, and does not need to run as root.

Changes: Lots of bugfixes were made, as well as some documentation fixes. Plenty of testing was done. This version is stable.
tags | tool, root, firewall
systems | linux
MD5 | 5044b299ece9db7f5689744c8021d769
Posted Apr 25, 2001
Authored by Telehor | Site teleh0r.cjb.net

Hylafax (/usr/libexec/fax/hfaxd) format string local root exploit. Tested on hylafax-4.0pl2-2.

tags | exploit, local, root
MD5 | 58b40d4fd0e65019435163abc426cf3b
Posted Apr 25, 2001
Site zurk.sourceforge.net

Sentinel is a fast file integrity checker similar to Tripwire or ViperDB with built in authentication using the RIPEMD 160 bit MAC hashing function. It uses a single database similar to Tripwire, maintains file integrity using the RIPEMD algorithm and also produces secure, signed logfiles. Its main design goal is to detect intruders modifying files. It also prevents intruders with root/superuser permissions from tampering with its log files and database.

Changes: Sentinel-user for individual users has been added. The copyright has been changed to the FSF. This release also contains minor makefile updates.
tags | tool, root, intrusion detection
systems | unix
MD5 | 87a55fcb020303d4d8efe60317948c3a
Posted Apr 25, 2001
Site omniti.com

This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.

Changes: This release includes fixes for next token handling code. The patch is for OpenSSH 2.5.2p2.
tags | patch
systems | unix
MD5 | 82009d8962cffb0484ca6ba6fb992261
Posted Apr 25, 2001
Authored by John McLeod | Site incident-response.org

IRCR is a collection of tools that gathers and/or analyzes forensic data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. It is similar to TCT by Dan Farmer and Wietse Venema, as most of the tools are oriented towards data collection rather than analysis. The idea of IRCR is that anyone could run the tool and send the output to a skilled Windows forensic security person for further analysis.

systems | windows
MD5 | 59c334066248e963dc735f43cbbd76dd
Posted Apr 25, 2001
Authored by DarkWizard&Drakaz

IIS Unicode graphical exploit for Windows. This is an updated version of Unisploit1.0-FireLust which has more cool stuff.

tags | exploit
systems | windows
MD5 | 4ca0e18dabb297eb8a393895fadd22ce
Posted Apr 25, 2001
Authored by G0ne | Site scrypt.net

Ubt-Scan is a simple extensible vulnerability scanner written in perl. Includes some external exploits.

tags | tool, scanner, perl
systems | unix
MD5 | 73109ddc04d70e1cfa8a1e4753f014ff
Posted Apr 25, 2001
Authored by ADM


MD5 | 87d71e26f7b5caca49a5f709d10a9fb0
FreeBSD Security Advisory 2001.38
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:38.sudo - The sudo port, versions prior to sudo-, contains a local command-line buffer overflow allowing local users to gain root privileges on the local system.

tags | overflow, local, root
systems | freebsd
MD5 | 16516985b9f52c388032d3954420c5ff
FreeBSD Security Advisory 2001.37
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:37.slrn - The slrn port, versions prior to slrn-, contains a buffer overflow in the wrapping/unwrapping functions of message header parsing. If a sufficiently long header is parsed, a buffer may overflow allowing the execution of arbitrary code contained in a message header as the user running the slrn program.

tags | overflow, arbitrary
systems | freebsd
MD5 | 853d7a9ed7e8eed16729277939c48a7b
FreeBSD Security Advisory 2001.36
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:36.samba - The samba ports, versions prior to samba-2.0.8 and samba-devel-2.2.0, contain /tmp races that may allow local users to cause arbitrary files and devices to be overwritten. Due to easily predictable printer queue cache file names, local users may create symbolic links to any file or device causing it to be corrupted when a remote user accesses a printer. In addition, the file will be left with world writable permission allowing any user to enter their own data.

tags | remote, arbitrary, local
systems | freebsd
MD5 | 6e3ceef276318afeaf178ec18d0d80b2
FreeBSD Security Advisory 2001.35
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:35.licq - The licq port, versions prior to 1.0.3, contains a vulnerability in URL parsing. URLs received by the licq program are passed to the web browser using the system() function. Since licq performs no sanity checking, a remote attacker will be able to pipe commands contained in the URL causing the client to execute arbitrary commands.

tags | remote, web, arbitrary
systems | freebsd
MD5 | 20a23af63b1ba9a677c8588d31eb368c
FreeBSD Security Advisory 2001.34
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:34 - The hylafax port, versions prior to hylafax-4.1.b2_2, contains a format string bug in the hfaxd program. A local user may execute the hfaxd program with command-line arguments containing format string characters, gaining root privileges on the local system.

tags | local, root
systems | freebsd
MD5 | 36f4e44196ff626f346ead7a6cccca5b
Posted Apr 25, 2001

NMAP NT - eEye originally developed Nmapnt for Windows NT/2000 and had made it available in the past for download. Recently, eEye security no longer makes this program available and there does not seem to be any mention of anywhere else. No installation needed. Requires packet capture drivers, available here.

tags | tool, nmap
systems | windows, unix
MD5 | 6ab54d3de46863e842a235f300d1460c
Posted Apr 25, 2001

Drivers needed to get Nmap for NT to work.

tags | tool, nmap
systems | unix
MD5 | 5ed1eeb92ec10789d452af9ec1f6d578
Page 1 of 9

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    29 Files
  • 21
    Jan 21st
    12 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By