exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 215 RSS Feed

Files Date: 2001-04-01 to 2001-04-30

Posted Apr 28, 2001
Authored by faith | Site f41th.org

Faith Issue 14 - Digital Multiplexing System, Meridian 1 PBX Admin: Part II, Telewest VoIP, Modem Brown-Box, Time-Division Multiplexing, and Trunking Network Primer.

tags | magazine
SHA-256 | 24d83c4f6d787c2224ff613af52dfbccb946d501b4405aeb5496df00de581f1d
Posted Apr 28, 2001
Site dive.to

Khe Sanh is a remote administration tool. Features include: automated search for server in a class C subnet, Explorer-like browsing through directories, local network resources and registry, maintainig subnet list, autoscan and more. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, local, trojan, registry
SHA-256 | 6e23269ad38a051839df0af8c5cb718d24542223da786e9ec0cce287a1c3a0cb
Posted Apr 28, 2001
Site dive.to

Assault Hackworks is a security scanning tool which features include subnet management, exploiting NBT security hole with easy access to remote files via Explorer-like interface, and scanning for Khe Sanh servers.

tags | remote
SHA-256 | dad2fb58708d79a0f6107f20dce0bfed92c4e0f0dbf09ca1a9a30a6fb0c80f54
Posted Apr 27, 2001
Authored by Barak Weichselbaum | Site komodia.com

Tcpip_lib V3.1 is a library for Windows 2000 which allows constructing IP's, IP spoofing, attacks, and more. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.

Changes: Major OOD redesign, added new UDP/TCP functionality, enhanced documentation, support for multithreading and added new samples.
tags | spoof, protocol
systems | windows
SHA-256 | be71ac0a5f69d3cdef6daebb877ca726b7f27213ad5e8c3f114280f07a3a8402
Posted Apr 27, 2001
Authored by Andris K

A bug in FTP server v0.25 for Windows 9x/NT has a bug which allows remote users to download and view any file on the system.

tags | exploit, remote
systems | windows
SHA-256 | 910a99610a7baee20dce791605ca8060728ec4d8313637c82ca433e38c3120c8
Posted Apr 27, 2001
Authored by Tim J Robbins | Site box3n.gumbynet.org

tcpspy is a linux administrator's tool that logs information about incoming and outgoing TCP/IP connections: local address, remote address and, probably the most useful feature, the user name. The current version allows you to include and exclude certain users from logging - this may be useful if you suspect one of the users on your system is up to no good but do not want to violate the privacy of the other users.

Changes: Rules can now be read from a file. Also includes code cleanup and optimizations.
tags | remote, local, tcp
systems | linux
SHA-256 | 35e843e70de4f19aae44758037ad49b60bf7c99ab004be549d8dc7d5ac95345b
Posted Apr 27, 2001
Site poseidon.pspt.fi

It is a well known fact that electrical devices and, in this case, specifically computers generate electromagnetic radiation which causes the device to interfere with radio reception. Tempest-AM generates AM radio signal on your monitor in the form of patterns. This pattern causes high resolution monitors to transmit the AM signal. This signal can be picked up by simple handheld radio from a distance. Tempest-AM can be set to transmit on any carrier, but not on high frequencies like FM. Tempest-AM is not a useful utility but merely an example for anyone who is interested in Tempest and is able to test the program.

Changes: New Makefile and configure scripts.
systems | unix
SHA-256 | 3b1fc7e74f8756949bfcaeed245bb9525b2c212213f27af7a147ada51a08c9ba
Posted Apr 26, 2001
Site azstarnet.com

Serial Line Sniffer is a serial port logging utility. It listens to the specified serial port and logs all data going through this port in both directions.

Changes: A fix for an infinite loop generated by searching for the next available pty.
tags | tool, sniffer
SHA-256 | 8e18f3ccc7730719103ac056def596fd65edb4c64d00e811760536b74d0d17e4
Posted Apr 25, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Several run-time options added: gShield can now add clienthosts, highport access clients and blacklisted clients directly to the current ruleset and the permanent configuration. Security warnings added for recent FTP/RELATED issue, NOLOG now quietly drops broadcasts automatically, some kernel-specific ip-sysctl options are now configurable via gShield.conf (including ECN), documentation updated for new run-time options.
tags | tool, tcp, firewall
systems | linux, bsd
SHA-256 | 6e0b151af609001d14d4d8c76be5d1c72f2dfd20baa39f8b89a53cd1c49026f0
Posted Apr 25, 2001
Site azstarnet.com

Serial Line Sniffer is a serial port logging utility. It listens to the specified serial port and logs all data going through this port in both directions.

Changes: Options to timestamp output and to print number of bytes transmitted added.
tags | tool, sniffer
SHA-256 | 87fe73581a4c74f6b432f345a1eec6e34037c6f08ebd20753a818eed18c92e08
Posted Apr 25, 2001
Site sourceforge.net

fwmon is a firewall monitor for Linux which integrates with ipchains to give you realtime notification of firewall events. It has fairly customizable output, allowing you to display a packet summary, hex, and ascii data dumps to stdout, a logfile, or tcpdump-style capture files. It also boasts some simple security features such as the ability to chroot itself, and does not need to run as root.

Changes: Lots of bugfixes were made, as well as some documentation fixes. Plenty of testing was done. This version is stable.
tags | tool, root, firewall
systems | linux
SHA-256 | 09f707cab121a67dc9422dc939f863acbd2bcc94a414d389b3be0603120b9fb7
Posted Apr 25, 2001
Authored by Telehor | Site teleh0r.cjb.net

Hylafax (/usr/libexec/fax/hfaxd) format string local root exploit. Tested on hylafax-4.0pl2-2.

tags | exploit, local, root
SHA-256 | 27326b522b9dab8a30cd201131238bab6559ce649d75129f48fd4a1556aa0ffe
Posted Apr 25, 2001
Site zurk.sourceforge.net

Sentinel is a fast file integrity checker similar to Tripwire or ViperDB with built in authentication using the RIPEMD 160 bit MAC hashing function. It uses a single database similar to Tripwire, maintains file integrity using the RIPEMD algorithm and also produces secure, signed logfiles. Its main design goal is to detect intruders modifying files. It also prevents intruders with root/superuser permissions from tampering with its log files and database.

Changes: Sentinel-user for individual users has been added. The copyright has been changed to the FSF. This release also contains minor makefile updates.
tags | tool, root, intrusion detection
systems | unix
SHA-256 | 5fd4cedb481fb37ba5e0c4cedf76af09d5bb6fd958d27a817f21132886c5c9a1
Posted Apr 25, 2001
Site omniti.com

This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.

Changes: This release includes fixes for next token handling code. The patch is for OpenSSH 2.5.2p2.
tags | patch
systems | unix
SHA-256 | 8c85de6b8d937a46c60b6fad37711f51d73f43cd096bed407e03d37ddd76ffe9
Posted Apr 25, 2001
Authored by John McLeod | Site incident-response.org

IRCR is a collection of tools that gathers and/or analyzes forensic data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. It is similar to TCT by Dan Farmer and Wietse Venema, as most of the tools are oriented towards data collection rather than analysis. The idea of IRCR is that anyone could run the tool and send the output to a skilled Windows forensic security person for further analysis.

systems | windows
SHA-256 | e0179a471c10435d540525a98e8a6c71a962a84a61aab8615d91c7f78a95e659
Posted Apr 25, 2001
Authored by DarkWizard&Drakaz

IIS Unicode graphical exploit for Windows. This is an updated version of Unisploit1.0-FireLust which has more cool stuff.

tags | exploit
systems | windows
SHA-256 | 7001b497fb792bdfb74ef2a47fefe2e51fb5b4b9c317143fd9521347b0356319
Posted Apr 25, 2001
Authored by G0ne | Site scrypt.net

Ubt-Scan is a simple extensible vulnerability scanner written in perl. Includes some external exploits.

tags | tool, scanner, perl
systems | unix
SHA-256 | 8fceb8d4ce40c0d4ab8ba10ca2da2ac254f05a1b0ad4b76887f1fc8e21a17672
Posted Apr 25, 2001
Authored by ADM


SHA-256 | 4cb93903b49c02f60fab9cba73cbd8b7c9699a172e0b77e39bb982d347b02741
FreeBSD Security Advisory 2001.38
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:38.sudo - The sudo port, versions prior to sudo-, contains a local command-line buffer overflow allowing local users to gain root privileges on the local system.

tags | overflow, local, root
systems | freebsd
SHA-256 | ee17e318cbfabdca5e6419afbcd93bf8c6e4b3fa76924d4ad7175977535f0963
FreeBSD Security Advisory 2001.37
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:37.slrn - The slrn port, versions prior to slrn-, contains a buffer overflow in the wrapping/unwrapping functions of message header parsing. If a sufficiently long header is parsed, a buffer may overflow allowing the execution of arbitrary code contained in a message header as the user running the slrn program.

tags | overflow, arbitrary
systems | freebsd
SHA-256 | 10eadabec9a8b1d16ad4939869c7126222596ddd4abf6d163d490a36532df582
FreeBSD Security Advisory 2001.36
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:36.samba - The samba ports, versions prior to samba-2.0.8 and samba-devel-2.2.0, contain /tmp races that may allow local users to cause arbitrary files and devices to be overwritten. Due to easily predictable printer queue cache file names, local users may create symbolic links to any file or device causing it to be corrupted when a remote user accesses a printer. In addition, the file will be left with world writable permission allowing any user to enter their own data.

tags | remote, arbitrary, local
systems | freebsd
SHA-256 | 83fe638951363ccd0063fc9691856f2ac00bfa75e1104a56acf4148f8d68d5c3
FreeBSD Security Advisory 2001.35
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:35.licq - The licq port, versions prior to 1.0.3, contains a vulnerability in URL parsing. URLs received by the licq program are passed to the web browser using the system() function. Since licq performs no sanity checking, a remote attacker will be able to pipe commands contained in the URL causing the client to execute arbitrary commands.

tags | remote, web, arbitrary
systems | freebsd
SHA-256 | aaa396a811cf768bab9589ce4c8251c23bc9dac97e476c3e35b94efa6a51e522
FreeBSD Security Advisory 2001.34
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:34 - The hylafax port, versions prior to hylafax-4.1.b2_2, contains a format string bug in the hfaxd program. A local user may execute the hfaxd program with command-line arguments containing format string characters, gaining root privileges on the local system.

tags | local, root
systems | freebsd
SHA-256 | e2e3043bd622200fe9ab2ce74472e03447529ab973b612d2bc4f89be0afbfad5
Posted Apr 25, 2001

NMAP NT - eEye originally developed Nmapnt for Windows NT/2000 and had made it available in the past for download. Recently, eEye security no longer makes this program available and there does not seem to be any mention of anywhere else. No installation needed. Requires packet capture drivers, available here.

tags | tool, nmap
systems | windows, unix
SHA-256 | 9ef4874e10534cb7a123df8e2da277b5b26d25f6239b7af35874824068d68b8d
Posted Apr 25, 2001

Drivers needed to get Nmap for NT to work.

tags | tool, nmap
systems | unix
SHA-256 | 9e898fe9fee72f5275627bc4268072d508320b5a6000176d3df7c6bc25d796d8
Page 1 of 9

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    11 Files
  • 30
    May 30th
    46 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By