exploit the possibilities
Showing 1 - 25 of 135 RSS Feed

Files Date: 2001-05-01 to 2001-05-31

Posted May 30, 2001
Authored by Duane Dunston | Site linuxsecurity.com

Network Monitoring with Dsniff - This is a practical step by step guide showing how to use Dsniff, MRTG, IP Flow Meter, Tcpdump, NTOP, and Ngrep, and others. It also provides a discussion of how and why we should monitor network traffic.

tags | paper
MD5 | 7aef6c3ab9be70806f9c0895d74a0a5d
Posted May 30, 2001
Authored by Duane Dunston | Site linuxsecurity.com

Encrypted Tunnels using SSH and MindTerm - This paper will discuss using Secure Shell (SSH) and MindTerm to secure organizational communication across the Internet. Easy to setup and reliable software need to be used in order to allow the inexperienced users the ability to quickly establish secure communication channels.

tags | paper, shell
MD5 | c6f772e94054386472ab1a226d50571d
Posted May 30, 2001
Site cert.org

CERT Quarterly Summary for May, 2001. Since the last regularly scheduled CERT summary, issued in February 2001 (CS-2001-01), we have seen a significant increase in reconnaissance activity, a number of self-propagating worms, and active exploitation of vulnerabilities in snmpxdmid, BIND and IIS by intruders.

tags | worm, vulnerability
MD5 | 5d87c650c2e77430cb65ed75827a652b
Posted May 30, 2001
Authored by Renato Turini

Cool2 is a perl script which checks a list of hosts for IIS servers which are vulnerable to the decode bug and the old unicode bug.

tags | exploit, perl
MD5 | 964b2c769f3959df27d30da320cb6260
Posted May 30, 2001
Authored by Incubus | Site securax.org

Securax Security Advisory #20 - The 1st Up Mail Server version 4.1.6a and below contains a remote denial of service vulnerability. Fix available here.

tags | exploit, remote, denial of service
MD5 | 3701c3ea0da5d59d6240277e61e3cf52
Posted May 30, 2001
Authored by venomous | Site rdcrew.com.ar

SF (securefiles) is a local intrusion detection system (IDS) which will get the hashes for the specified files and create a database which is then then it is encrypted with AES. The executable checks itself, and a phrase is displayed (we select it on the installation) every time the program run successfully.

tags | tool, local, intrusion detection
systems | unix
MD5 | e0f5bf109f1be32e108aa722ff74d60d
Posted May 30, 2001
Authored by Speedy | Site dutchriot.com

Omnised.pl is an exploit for Omnihttpd v2.08 for Windows 98/me/nt/2000 which lets you dump the source of php perl and other files to a txt file. These files may contain passwords.

tags | exploit, perl, php
systems | windows, 9x
MD5 | c7e9d7db73478899dc769bed4cf3135f
Posted May 30, 2001
Authored by Dart, Wanderlus7

Macromedia Decryptor is a utility which decrypts the the website password stored in the registry by all the macromedia dreamweaver (tested on ultradev 3 and 4).

tags | registry
MD5 | c835b124eb456bdb9d472e7c1cd42fb2
Posted May 30, 2001
Authored by synnergy, Dethy | Site synnergy.net

Local vulnerability in Solaris mailtool(1) - /usr/openwin/bin/mailtool on Solaris 8 (x86 and sparc) contains a local buffer overflow vulnerability. By specifying a long environment buffer containing machine executable code, it is possible to execute arbitrary command(s) as gid mail.

tags | overflow, arbitrary, x86, local
systems | solaris
MD5 | 1e5e671cf9f5a6ad579331d3e7053810
Posted May 30, 2001
Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex.

Changes: Bug fixes, a tool to ARP ping using ARP request/reply, a tool to sniff network and deduce the Ethernet addresses associated to an IP address, a tool to sniff and print listening TCP/UDP servers on the LAN, and much more.
tags | udp, spoof, tcp, protocol, library
systems | linux, solaris, freebsd
MD5 | 893b3ff73d15088dd2ce6b2558dfd0a2
Posted May 30, 2001

Decrypts Fortress 101 2.51 or 3.0 passwords from the fset (2.51) or the default.fg3 (3.0).

MD5 | 90924b1f55c64c422206871e0a249e1f
Posted May 30, 2001

Bdgen generates temp passwords for Fortres 101.

MD5 | 7d9a30012fcfdb9e9444fb8ab2a9a651
Posted May 30, 2001
Authored by Dead Sector

Brutal.pl v0.5 is a perl program that will try to get valid accounts on the remote server using a POP3 brute force method thru wordlist files.

tags | remote, cracker, perl
MD5 | d0715be5489bf637b1f3248a558c57d5
Posted May 30, 2001
Authored by teso, scut | Site team-teso.net

Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.

Changes: Bugfixes, new fingerprints, and an auto-update facility to get new fingerprints.
systems | linux, unix, bsd
MD5 | b346840d28141773178c81fd900b2fad
Posted May 30, 2001
Authored by EF | Site ccitt5.net

Tcsh-bofh is a patch to provide true BOFH log functions to tcsh 6.10. Features the ability to log all commands to syslog.

Changes: Loglevel and logfacility configurable through --with-bofh-loglevel and --with-bofh-logfacility. split-userlog utility included to split the generated logfile into $USERNAME.log files for each user.
tags | overflow, patch
systems | unix
MD5 | e76964a6bf0144666179eca94ef2623d
Posted May 30, 2001
Authored by EF | Site ccitt5.net

Bash-bofh is a patch to provide true BOFH log functions to bash 2.05. Features the ability to log all commands to syslog.

Changes: Loglevel and logfacility configurable through --with-bofh-loglevel and --with-bofh-logfacility. split-userlog utility included to split the generated logfile into $USERNAME.log files for each user.
tags | overflow, patch, bash
systems | unix
MD5 | c12e922de63d450b15d2e26d2987beb2
Posted May 30, 2001
Authored by xPoison

Xintruder is a utility for cracking password protected Windows 95/98/ME shares. xIntruder exploits vulnerability in SMB implementation on these operating systems, which allows for very effective collection of passwords (any password in local network less than one minute, in the internet less than 10 minutes), originally discovered by www.nsfocus.com. xIntruder was created in the development possess of the project xSHaReZ 2 and is recommended to be used in conjunction with xSHaReZ 2. Tested on Windows 95/98/NT/2000.

tags | local
systems | windows, 9x
MD5 | 12d71376f18f967e4f4ac4eb03d31ebf
Posted May 30, 2001
Authored by Ben Crackel | Site og.chickenz.net

Og-Brute is a perl package to brute force pop3 and ftp account passwords and probe smtp for valid logins with wingate support.

tags | cracker, perl
MD5 | d8750b961a874271b9121c425f1107b8
Posted May 30, 2001
Authored by Ben-z | Site og.chickenz.net

Tyrone is a difficult to trace DoS tool for Linux which uses Back Orifice servers.

tags | denial of service
systems | linux
MD5 | 961010df84bc39209d1c4655100ec5e3
Posted May 30, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection. LIDS FAQ available here.

Changes: This is a stable version of LIDS. It contains a sent mail alert compatible with qmail. There are many code cleanups, and many typos have been fixed. An added return character in do_execve() has been fixed.
tags | kernel, root
systems | linux
MD5 | 89ea35c3c57ba8297f676b61f87c9ee4
Posted May 29, 2001
Site jsmoriss.dyndns.org

Rc.firewall is an ipchains based firewall setup script with easy support for many network services, masquerading, port forwarding, and IP accounting. Protections include spoofing, stuffed routing / masquerading, DoS, smurf attacks, outgoing port scans, and much more.

Changes: New stable release. Now compatible with the Linux Router Project (LRP). The DMZprivate & mzmz forwarding rules have been fixed. The iana reserved networks group has been updated. Several service modules have been added and/or modified.
tags | tool, spoof, firewall
systems | unix
MD5 | 99ac50013e28d39ec022162f826b9c4c
Posted May 29, 2001
Site scaramanga.co.uk

Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.

Changes: This release allows rule criteria to be negated, includes a string/content matcher, support for bidirectional snort rules, a TTL matcher, an IP ID matcher, and lots of other little fixes.
tags | tool, intrusion detection
systems | unix
MD5 | bc70351bf359f52a926f0e8273d12701
Posted May 25, 2001
Authored by Dart

Nwkill is a simple shell script which kills Netware 5.0 by using netcat to send /dev/random to tcp port 40193.

tags | denial of service, shell, tcp
MD5 | 1b08033500fee127ed749c5830e97f9b
Posted May 25, 2001
Authored by Digital Vampire

A beginners introductory model into Cross platform open source trojans. Currently only Win32 code implemented. Written in rapid-q. No longer supported by author. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows
MD5 | 617c5ddccf4ba142887e7ca8a261c517
Posted May 25, 2001
Authored by Sector X | Site crosswinds.net

X-Chat v1.2.x format string bug exploit. Tested against x-chat v1.2.1 on Slackware 7.1.

tags | exploit
systems | linux, slackware
MD5 | 4f9aa0075b3dc87c65ead96a596e4d0f
Page 1 of 6

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    1 Files
  • 29
    Nov 29th
    11 Files
  • 30
    Nov 30th
    7 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By