exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 135 RSS Feed

Files Date: 2001-05-01 to 2001-05-31

dsniff_netmon.txt
Posted May 30, 2001
Authored by Duane Dunston | Site linuxsecurity.com

Network Monitoring with Dsniff - This is a practical step by step guide showing how to use Dsniff, MRTG, IP Flow Meter, Tcpdump, NTOP, and Ngrep, and others. It also provides a discussion of how and why we should monitor network traffic.

tags | paper
SHA-256 | 9c2b884ee4bcdcc32d56cc19e52a212209a75a7a2538c9e712a8aa90c1552e76
ssh_tunnels.txt
Posted May 30, 2001
Authored by Duane Dunston | Site linuxsecurity.com

Encrypted Tunnels using SSH and MindTerm - This paper will discuss using Secure Shell (SSH) and MindTerm to secure organizational communication across the Internet. Easy to setup and reliable software need to be used in order to allow the inexperienced users the ability to quickly establish secure communication channels.

tags | paper, shell
SHA-256 | 2292de3b07ab295d605e82686f4cf1ebd42618ae5f4567c685d501d01d490d35
CS-2001-02
Posted May 30, 2001
Site cert.org

CERT Quarterly Summary for May, 2001. Since the last regularly scheduled CERT summary, issued in February 2001 (CS-2001-01), we have seen a significant increase in reconnaissance activity, a number of self-propagating worms, and active exploitation of vulnerabilities in snmpxdmid, BIND and IIS by intruders.

tags | worm, vulnerability
SHA-256 | 4a4c69c74f9f9dfbf99e62d106c6b336a191d5792a093ca4b01aa1079a25f3c2
cool2
Posted May 30, 2001
Authored by Renato Turini

Cool2 is a perl script which checks a list of hosts for IIS servers which are vulnerable to the decode bug and the old unicode bug.

tags | exploit, perl
SHA-256 | 992e799ee26d6aaa457432a5be7c3db3479c2f5ed9f94b41f92878e2fb8ebdd8
scx-sa-20.txt
Posted May 30, 2001
Authored by Incubus | Site securax.org

Securax Security Advisory #20 - The 1st Up Mail Server version 4.1.6a and below contains a remote denial of service vulnerability. Fix available here.

tags | exploit, remote, denial of service
SHA-256 | c9d3d44add8e60cf5afe922404991f19df0341b12c9296a9ea83fa9b2c70ae33
rdC-sf.1.0.tgz
Posted May 30, 2001
Authored by venomous | Site rdcrew.com.ar

SF (securefiles) is a local intrusion detection system (IDS) which will get the hashes for the specified files and create a database which is then then it is encrypted with AES. The executable checks itself, and a phrase is displayed (we select it on the installation) every time the program run successfully.

tags | tool, local, intrusion detection
systems | unix
SHA-256 | 3149931855b0aa87c4b6852889675d677b6c52f94dc9e41de421798f404d911a
omnised.pl
Posted May 30, 2001
Authored by Speedy | Site dutchriot.com

Omnised.pl is an exploit for Omnihttpd v2.08 for Windows 98/me/nt/2000 which lets you dump the source of php perl and other files to a txt file. These files may contain passwords.

tags | exploit, perl, php
systems | windows
SHA-256 | 9276193adbdd9b969f90b2323644d613d1e30a9bebe9d41fa67790946031064b
macromedia_decrypter.zip
Posted May 30, 2001
Authored by Dart, Wanderlus7

Macromedia Decryptor is a utility which decrypts the the website password stored in the registry by all the macromedia dreamweaver (tested on ultradev 3 and 4).

tags | registry
SHA-256 | 4d4eb49d6ba91d765372afe0e5568d6f750dd5f0ed3a423f5fbcb2e90164d379
mailtool-adv.txt
Posted May 30, 2001
Authored by synnergy, Dethy | Site synnergy.net

Local vulnerability in Solaris mailtool(1) - /usr/openwin/bin/mailtool on Solaris 8 (x86 and sparc) contains a local buffer overflow vulnerability. By specifying a long environment buffer containing machine executable code, it is possible to execute arbitrary command(s) as gid mail.

tags | overflow, arbitrary, x86, local
systems | solaris
SHA-256 | 28123a605ca63233f3753280128acfc9dae8cb526852a55c509794079049a661
lcrzosrc-3.12.tgz
Posted May 30, 2001
Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex.

Changes: Bug fixes, a tool to ARP ping using ARP request/reply, a tool to sniff network and deduce the Ethernet addresses associated to an IP address, a tool to sniff and print listening TCP/UDP servers on the LAN, and much more.
tags | udp, spoof, tcp, protocol, library
systems | linux, solaris, freebsd
SHA-256 | 08571b697c35febfb97344a8d42357253a3fc6c3d40e124d6e65099e4f68ba05
fg3decoder.zip
Posted May 30, 2001

Decrypts Fortress 101 2.51 or 3.0 passwords from the fset (2.51) or the default.fg3 (3.0).

SHA-256 | 819da6c65b969157a629ecc784140fe0fe1792fb306f099e7ee9ab0e58f78431
bdgen.zip
Posted May 30, 2001

Bdgen generates temp passwords for Fortres 101.

SHA-256 | ebd378d05bfe0170073c32b824e49f305ad8f009ceca8492fce760424e671eca
rm-brutal.tar.gz
Posted May 30, 2001
Authored by Dead Sector

Brutal.pl v0.5 is a perl program that will try to get valid accounts on the remote server using a POP3 brute force method thru wordlist files.

tags | remote, cracker, perl
SHA-256 | 7cda4f6da32eeb905bde37a7b6ed50f90c7dc2c7841db77b72dc9dbed6f745bf
ldistfp-0.1.4.tar.gz
Posted May 30, 2001
Authored by teso, scut | Site team-teso.net

Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.

Changes: Bugfixes, new fingerprints, and an auto-update facility to get new fingerprints.
systems | linux, unix, bsd
SHA-256 | 2a08fdfb2ef25619d4dea35c00c18c685ae1ce253062aac1ea47fecf74f5383e
tcsh-bofh-6.10-0.0.1.tar.gz
Posted May 30, 2001
Authored by EF | Site ccitt5.net

Tcsh-bofh is a patch to provide true BOFH log functions to tcsh 6.10. Features the ability to log all commands to syslog.

Changes: Loglevel and logfacility configurable through --with-bofh-loglevel and --with-bofh-logfacility. split-userlog utility included to split the generated logfile into $USERNAME.log files for each user.
tags | overflow, patch
systems | unix
SHA-256 | 9a430fbdd06f07dddf076ade9186d519ba356273ad7bdb3d82ea6e4f6ab4ff3d
bash-bofh-2.05-0.0.1.tar.gz
Posted May 30, 2001
Authored by EF | Site ccitt5.net

Bash-bofh is a patch to provide true BOFH log functions to bash 2.05. Features the ability to log all commands to syslog.

Changes: Loglevel and logfacility configurable through --with-bofh-loglevel and --with-bofh-logfacility. split-userlog utility included to split the generated logfile into $USERNAME.log files for each user.
tags | overflow, patch, bash
systems | unix
SHA-256 | 88fadfee33ae4d400518edde9f3e7d4ecc31a9e24905944ada156fc4cfdf76d4
xintruder.zip
Posted May 30, 2001
Authored by xPoison

Xintruder is a utility for cracking password protected Windows 95/98/ME shares. xIntruder exploits vulnerability in SMB implementation on these operating systems, which allows for very effective collection of passwords (any password in local network less than one minute, in the internet less than 10 minutes), originally discovered by www.nsfocus.com. xIntruder was created in the development possess of the project xSHaReZ 2 and is recommended to be used in conjunction with xSHaReZ 2. Tested on Windows 95/98/NT/2000.

tags | local
systems | windows
SHA-256 | 49c9392823e6ff9d0e8537adaf4c50d9814b364b986186fae0bac417d3b7a316
og-brute101.tgz
Posted May 30, 2001
Authored by Ben Crackel | Site og.chickenz.net

Og-Brute is a perl package to brute force pop3 and ftp account passwords and probe smtp for valid logins with wingate support.

tags | cracker, perl
SHA-256 | 3d8556641b28804c415bb096bac918f0b0d135a0ed4a6efa0e2d0c555d36fdb7
tyrone1.tgz
Posted May 30, 2001
Authored by Ben-z | Site og.chickenz.net

Tyrone is a difficult to trace DoS tool for Linux which uses Back Orifice servers.

tags | denial of service
systems | linux
SHA-256 | a681fc113a8a1846f8afc61b05d832a7392968c7ec8999f6404693bd5e02ebcc
lids-0.10-2.2.19.tar.gz
Posted May 30, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection. LIDS FAQ available here.

Changes: This is a stable version of LIDS. It contains a sent mail alert compatible with qmail. There are many code cleanups, and many typos have been fixed. An added return character in do_execve() has been fixed.
tags | kernel, root
systems | linux
SHA-256 | 2a2630b8d0ab5101fb7173cc11f937ba8d4ca96414efde327e0bdee62d6c9a0a
rcf-5.2.tar.gz
Posted May 29, 2001
Site jsmoriss.dyndns.org

Rc.firewall is an ipchains based firewall setup script with easy support for many network services, masquerading, port forwarding, and IP accounting. Protections include spoofing, stuffed routing / masquerading, DoS, smurf attacks, outgoing port scans, and much more.

Changes: New stable release. Now compatible with the Linux Router Project (LRP). The DMZprivate & mzmz forwarding rules have been fixed. The iana reserved networks group has been updated. Several service modules have been added and/or modified.
tags | tool, spoof, firewall
systems | unix
SHA-256 | bba6a794a62716a5fdb22c6a0bdb44e511a07465a780d73c0779acbd1150cece
firestorm-0.1.2.tar.gz
Posted May 29, 2001
Site scaramanga.co.uk

Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.

Changes: This release allows rule criteria to be negated, includes a string/content matcher, support for bidirectional snort rules, a TTL matcher, an IP ID matcher, and lots of other little fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 14bfbb77c591e461df226ab6cf3bf3e88bb05b6b3ae04d348f44d007fd0bf10c
nwkill.tar.gz
Posted May 25, 2001
Authored by Dart

Nwkill is a simple shell script which kills Netware 5.0 by using netcat to send /dev/random to tcp port 40193.

tags | denial of service, shell, tcp
SHA-256 | 97eb772389ccf50550b76c384134e7cdefed0c78d4a4144f1301a4cd0cdff19b
ra1d.bas.txt
Posted May 25, 2001
Authored by Digital Vampire

A beginners introductory model into Cross platform open source trojans. Currently only Win32 code implemented. Written in rapid-q. No longer supported by author. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows
SHA-256 | ccca3e9dcbafbb3711307eb74d6ff5b086cbdad325e055d3d9632411d0293de5
xchat.c
Posted May 25, 2001
Authored by Sector X | Site crosswinds.net

X-Chat v1.2.x format string bug exploit. Tested against x-chat v1.2.1 on Slackware 7.1.

tags | exploit
systems | linux, slackware
SHA-256 | b469eda18d6e1805cd4e8a0be2fbb3cb43284ad07087b99b32725d1ff02f9fc4
Page 1 of 6
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close