exploit the possibilities
Showing 1 - 25 of 32 RSS Feed

Files Date: 2001-06-01 to 2001-06-30

Posted Jun 9, 2001
Authored by Nelson Murilo | Site chkrootkit.org

chkrootkit locally checks for signs of a rootkit. Includes detection of LKM rootkits, ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux, FreeBSD, Solaris, and OpenBSD.

Changes: New tests added - amd, named, egrep, slogin. Detects more works, including ShitC, Omega, Wormkit, dsc-rootkit, and Maniak. A bug in chklastlog was fixed, as were some other misc bugs.
tags | tool, integrity, rootkit
systems | linux, unix, solaris, freebsd, openbsd
MD5 | 95302616bae6811f5e9eb02afdbdbe13
Posted Jun 8, 2001
Authored by Milo Van Der Zee

HP Openview NNM6.1 and earlier running on unix contains a remote vulnerability in the suid bin executable overactiond. Any program can be started remotely by sending a SNMP trap to the server. Exploit details included.

tags | exploit, remote
systems | unix
MD5 | cbb6e5495aa3d1b8af6375409b149752
Posted Jun 8, 2001
Authored by Michal Zalewski | Site razor.bindview.com

Razor / Bindview Advisory - There is a buffer size checking related fault condition in Microsoft Windows 2000 telnet server. This vulnerability is present only if telnet service is running and plain-text logins are allowed. If there are already 4300 characters in the buffer, username length range checking does not work. Perl exploit included.

tags | perl
systems | windows, 2k
MD5 | 6ee028c03f526273bad46c971bb256b8
Posted Jun 8, 2001

Microsoft Security Advisory MS01-031 - This bulletin discusses seven new vulnerabilities affecting the Windows 2000 Telnet service. The vulnerabilities fall into three broad categories: privilege elevation, denial of service and information disclosure. Two of the vulnerabilities allow privilege elevation and four are denial of service attacks. Microsoft FAQ on this issue available here.

tags | denial of service, vulnerability, info disclosure
systems | windows, 2k
MD5 | 95bd9c018828ae3994f004d19d258581
Posted Jun 8, 2001
Authored by Emilie Chang

Cue.sh exploits an old hp/ux local root vulnerability which remains unpatched on most systems. Tested on HP.UX 10.20 v899. /usr/bin/cue exists on 800 models.

tags | exploit, local, root
systems | hpux
MD5 | 90bbd4ddb85767d4598a8994dfaed28e
Posted Jun 8, 2001

Passlogd is a sniffer which logs traffic on the UDP syslog port, allowing a syslog receiver to have no open ports.

Changes: Fixed parser.
tags | udp
systems | unix
MD5 | 8daf2d86ce9b7a319ae48ab1158375e8
Posted Jun 7, 2001

Passlogd is a sniffer which logs traffic on the UDP syslog port, allowing a syslog receiver to have no open ports.

tags | udp
systems | unix
MD5 | 292f484a37e05dc8cf38c8e0e0b51bd6
Posted Jun 7, 2001
Site scaramanga.co.uk

Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.

Changes: New TCP flags, ICMP sequence, and ID matchers, bugfixes, a more verbose alert target, and improved documentation.
tags | tool, intrusion detection
systems | unix
MD5 | 6535757480bdcaca23579488b294503a
Posted Jun 7, 2001

Microsoft Security Advisory MS01-030 - Exchange 2000's web access (OWA) has a vulnerability which allows an attacker to send script code to users which can take action against the user's mailbox as if it were the user, including, under certain circumstances, manipulation of messages or folders. Microsoft FAQ on this issue available here.

tags | web
MD5 | d1e00e389b7c9427fa7e3cd3c70a349f
Posted Jun 7, 2001
Authored by Dex | Site raza-mexicana.org

Su-wrapper v1.1.1 local root exploit for Linux/x86.

tags | exploit, x86, local, root
systems | linux
MD5 | 90df033d56dc85b7713a3852178226ab
Posted Jun 7, 2001
Site appgate.com

MindTerm is a complete ssh-client in pure java which can be used either as a standalone java-application or as a java-applet. Includes a vt102/xterm-terminal with the ssh protocol and also "drop-in" socket replacements to use ssh tunnels transparently from a java application/applet.

Changes: Fixed scp bug. All sources are now available.
tags | java, protocol
MD5 | f641fe70d40fdb757a2de2893a1c3671
Posted Jun 7, 2001
Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: New --neverignore option.
systems | unix
MD5 | 1b78f9519313232071a0d25cb82e9f73
Posted Jun 7, 2001
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: The -R switch for alternative raw output has been added.
tags | tool
systems | unix
MD5 | 561c9b6ba785c72de865c1bb5334b22b
Posted Jun 6, 2001
Authored by Paul Starzetz | Site ihaquer.com

RSX is a Linux LKM which stops most buffer overflow attacks. It is a Runtime addressSpace eXtender providing on the fly code remapping of existing Linux binaries in order to implement non-executable stack as well as non-exec short/long heap areas. RSX targets common buffer-overflow problems preventing code execution in mapped data-only areas. Currently a 2.4.x version of the kernel module is available.

tags | overflow, kernel, code execution
systems | linux
MD5 | ca73f0cf8a75d55e1c127d88b96e0f8c
Posted Jun 6, 2001
Authored by qitest1 | Site qitest1.cjb.net

Tiatunnel.c is a Linux/x86 remote exploit for TIAtunnel-0.9alpha2, an IRC bouncer. Tested on RedHat 6.2 with TIAtunnel-0.9alpha2 from tar.gz. Binds a shell to port 30464.

tags | exploit, remote, shell, x86
systems | linux, redhat
MD5 | 806b38eb96baac01be27ce096fae9989
Posted Jun 6, 2001
Authored by Michel MaXX Kaempf | Site synnergy.net

Vudo.c is a Sudo-1.6.3p5 and below local root exploit. Tested on Red Hat 6.2 with sudo-1.6.1-1.

tags | exploit, local, root
systems | linux, redhat
MD5 | a223d049daea0c009c41ef4a02237f0e
Posted Jun 6, 2001
Authored by Alt3kx | Site raza-mexicana.org

The QVT/NET 4.3 FTP Server and the Shambala FTP Server for Windows 9x/NT/2000 contains remote vulnerabilities which allow users to see and retrieve any file on the server. Exploit information included.

tags | exploit, remote, vulnerability
systems | windows, 9x
MD5 | f31b863e65cf4e42820d482689e3046f
Posted Jun 5, 2001
Authored by Silvio Cesare | Site big.net.au

Stealth Syscall Redirection - This article describes a technique of redirecting system calls without modifying the sys call table (implemented in Linux). This can be used to evade intrusion detection systems that use the sys call table to register redirected or trojaned system calls. The basic premise behind this attack is to modify the old system call code to jump to the new system call, thus control is transferred to the replacement system call and the sys call table is left untouched.

tags | paper, trojan
systems | linux, unix
MD5 | 917c0100d90f45ce4ca2c1e021da1f6d
Posted Jun 5, 2001
Authored by Tim Lawless | Site sourceforge.net

StMichael is a LKM that attempts to detect and divert attempts to install a kernel-module backdoor into a running linux system. This is done by monitoring the init_module and delete_module process for changes in the system call table. This is a experimental version, and a spin off from the Saint Jude Project.

Changes: Added md5 checksums to the contents of system calls, added cloaking to hide the presence of StMichael, and its symbols. Since StMichael cause the rootkits to not work as expected, we do not want to give away any useful debugging information.
tags | kernel
systems | linux
MD5 | 5b4c791c22c5fa58c904835a96f0389e
Posted Jun 5, 2001
Authored by Ofir Arkin | Site sys-security.com

ICMP Usage in Scanning v3.0 - This paper outlines what can be done with the ICMP protocol regarding scanning. Although it may seem harmless at first glance, this paper includes details on plain Host Detection techniques, Advanced Host Detection techniques, Inverse Mapping, Trace routing, OS fingerprinting methods with ICMP, and which ICMP traffic should be filtered on a Filtering Device.

Changes: Version 3.0 introduces significant changes made to the text. Includes some host based security measures available with Linux based on Kernel 2.4.x and with Sun Solaris 8 and a snort rule base for dealing with the ICMP tricks illustrated within the text.
tags | paper, protocol
MD5 | f60a05e7802e4364c022896d78730665
Posted Jun 4, 2001
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #46, 2001 - There is a buffer overflow in SunOS 5.8 x86 with $HOME and /usr/bin/mail leading to egid=mail. Includes exploit.

tags | exploit, overflow, x86
systems | solaris
MD5 | c001290c85b9715cba2645cb81f2c3f6
Posted Jun 4, 2001
Authored by Todd J.

Packet Storm new exploits for May, 2001.

tags | exploit
MD5 | c5aff02f19eb6b0d6609b6f1a24ed2fb
Posted Jun 4, 2001
Authored by Thomas Linden | Site nabou.org

nabou is a Perl script which can be used to monitor changes to your system. It provides file integrity checking, and can also watch crontabs, suid files and user accounts for changes. It stores all data in standard dbm databases.

Changes: While 1.7 fixed many bugs, it included some new ones. Everybody who has 1.7 in use is urged to upgrade to 1.8. Directory recursion and some other ugly bugs have been fixed. Two new statements are available, and all features of the program have been tested before release.
tags | tool, perl, intrusion detection
systems | unix
MD5 | 943b114cfbbbb3476bbecf7339401589
Posted Jun 4, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection. LIDS FAQ available here.

Changes: Ported to kernel v2.4.5, bugfixes, fixes for qmail, restrictions for LIDS mode switching on specified terminals, and adds code cleanups.
tags | kernel, root
systems | linux
MD5 | be4b57bd2ce6f2f85264af1cb8940e67
Posted Jun 4, 2001
Authored by Paul L Daniels | Site inflex.co.za

Inflex is an email scanner which encapsulates your existing sendmail server setup. It scans both incoming and outgoing email and it does not alter your current /etc/sendmail.cf file. It can scan for email viruses, unwanted file types (eg. EXE, BMP, MPEG) and file names (eg. prettypark.exe). It can also be used to scan for text snippets within emails.

Changes: Updating the ripMIME codebase to 1.0.2; existing users of Inflex can simply upgrade ripMIME.
systems | unix
MD5 | 5fa0e17e31b2df7864dff969d9ad3b42
Page 1 of 2

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    1 Files
  • 29
    Nov 29th
    11 Files
  • 30
    Nov 30th
    7 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By