what you don't know can hurt you
Showing 1 - 8 of 8 RSS Feed

Files Date: 2001-05-25

nwkill.tar.gz
Posted May 25, 2001
Authored by Dart

Nwkill is a simple shell script which kills Netware 5.0 by using netcat to send /dev/random to tcp port 40193.

tags | denial of service, shell, tcp
MD5 | 1b08033500fee127ed749c5830e97f9b
ra1d.bas.txt
Posted May 25, 2001
Authored by Digital Vampire

A beginners introductory model into Cross platform open source trojans. Currently only Win32 code implemented. Written in rapid-q. No longer supported by author. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows
MD5 | 617c5ddccf4ba142887e7ca8a261c517
xchat.c
Posted May 25, 2001
Authored by Sector X | Site crosswinds.net

X-Chat v1.2.x format string bug exploit. Tested against x-chat v1.2.1 on Slackware 7.1.

tags | exploit
systems | linux, slackware
MD5 | 4f9aa0075b3dc87c65ead96a596e4d0f
adorebsd-0.34.tar.gz
Posted May 25, 2001
Authored by teso, Bind | Site team-teso.net

AdoreBSD 0.34 - Based off Linux Adore by Stealth. Features hiding files and directories from view, makes processes invisible, hides promiscuous flag and syslog messages, execute as root, hides sysctl mib entries, netstat service hiding, authentication, and module hiding. Developed on FreeBSD 4.3-STABLE.

tags | root
systems | linux, freebsd
MD5 | f98864a4f927e04d6f66a010934a08a0
adore-0.38.tar.gz
Posted May 25, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Added 64bit FS support, now fools protection modules as StMichael, and minor fixes.
systems | linux
MD5 | 72e80f9fa6ebe9358f7fd0358c8e959f
ms00-079
Posted May 25, 2001

Microsoft Security Bulletin (MS00-079) - Microsoft has released a patch that eliminates the "HyperTerminal Buffer Overflow" which allows malicious users to execute arbitrary code on another users system by sending a long telnet:// URL in a HTML mail message. HyperTerminal is the default Telnet client on Windows 98, 98SE and ME, but not Windows 2000. Updated hyperterminal available here.

tags | overflow, arbitrary
systems | windows, 2k, 9x
MD5 | 58b0f160c77f032ee1d3fb26543bb4a2
base64.htm
Posted May 25, 2001

No information is available for this file.

tags | paper
MD5 | 5d8c198ddb6c3ccd188b2d3415344454
ms01-029
Posted May 25, 2001

Microsoft Security Advisory MS01-029 - Two separate vulnerabilities have been found in Windows Media Player. The first is a buffer overflow in the parsing of Active Stream Redirector (.ASX) files which allows attackers to run arbitrary code on the users machine. The vulnerability can be exploited via a malicious website. The second vulnerability is a bug in the handling of shortcuts which allows attackers to read any file on the users system. Microsoft FAQ on this issue available here.

tags | overflow, arbitrary, vulnerability
systems | windows
MD5 | 3cfbf9e187a73682778161e229332f34
Page 1 of 1
Back1Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    5 Files
  • 21
    Apr 21st
    1 Files
  • 22
    Apr 22nd
    10 Files
  • 23
    Apr 23rd
    22 Files
  • 24
    Apr 24th
    4 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close