ignore security and it'll go away
Showing 1 - 25 of 139 RSS Feed

Files Date: 2001-07-01 to 2001-07-31

microsoft.codered.txt
Posted Jul 30, 2001

The Code Red worm is likely to start spreading again on July 31, 2001 at 8:00 EDT. All IIS 4 and 5 users MUST upgrade immediately! Fix for NT 4.0 available here.

tags | worm
MD5 | 8a4fe36d9058a9fa39660a647ae05fa7
lcrzosrc-3.15.tgz
Posted Jul 30, 2001
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex.

Changes: Creation of lcrzo_portlist, lcrzo_iplist and lcrzo_ethlist which allow the user of lists of ports, ip addresses, and ethernet addresses. Contains some bug fixes and code improvements.
tags | udp, spoof, tcp, protocol, library
systems | linux, solaris, freebsd
MD5 | 91564afc067006c1a54e70e95642ae4a
spadv03.txt
Posted Jul 30, 2001
Authored by SecPoint | Site secpoint.com

The Windows 2000 telnetd service is vulnerable to a remote denial of service attack. The service crashes when scanned for the recent AYT telnetd vulnerability discovered by Scut. Includes SPtelnetAYT.c, a scanner for the AYT vulnerability in telnet daemons build upon the BSD source.

tags | exploit, remote, denial of service
systems | windows, 2k, bsd
MD5 | 34db49ab75ca4fc3edbb7aa09d278554
StJude_LKM-0.20.tar.gz
Posted Jul 30, 2001
Authored by Tim Lawless | Site sourceforge.net

Saint Jude LKM is a Linux Kernel Module for the 2.2.0 and 2.4.0 series of kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local and remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.

Changes: Introduced kernel integrity checking, and module support on systems that require module support. Added Read-Only /dev/kmem support. Eliminated the double-execve problem. New configuration script simplifies platform identification, and selection of compile-time options. Updated checks, verified compatibility with 2.4.7, and updated documentation. Changed license to GNU.
tags | remote, kernel, local, root
systems | linux
MD5 | 82af381dcf19fd6d6ab29092dc9709d5
pileup-xpl.c
Posted Jul 29, 2001
Authored by Charles Stevenson

/usr/bin/pileup local root exploit. Tested against Debian 2.2.

tags | exploit, local, root
systems | linux, debian
MD5 | 7db2fa47bb548a4281aad6708c157b54
squidmap.pl
Posted Jul 29, 2001
Authored by Paul Nasrat

Squid can be used to port scan if set up as a httpd accelerator (reverse proxy). Tested on Redhat 7.0.

tags | exploit
systems | linux, redhat
MD5 | 3072c26d039e563fde8246ed1e61f590
teso-advisory-011.txt
Posted Jul 29, 2001
Authored by teso, scut | Site team-teso.net

TESO Security Advisory #11 - Multiple vendor Telnet Daemon vulnerability. Most current telnet daemons in use today contain a buffer overflow in the telnet option handling. Under certain circumstances it may be possible to exploit it to gain root privileges remotely. Affected systems include BSDI 4.x, FreeBSD, IRIX, Linux with netkit-telnetd < 0.14, NetBSD, OpenBSD 2.x, and Solaris.

tags | overflow, root
systems | linux, netbsd, solaris, freebsd, irix, openbsd
MD5 | 56fb4e5983fdf5c58663113d30bc8c33
adore-0.39b4.tgz
Posted Jul 29, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Now includes open()/stat() redirection and improved netstat hiding. Removed execution redirection.
systems | linux
MD5 | 777cbd2a59268b394b79da2bda910a40
DEStroy-0.6.pl
Posted Jul 29, 2001
Authored by Plastek

DEStroy-0.6.pl is a perl script which uses DES to encrypt files and makes an attempt to securely remove the plaintext. Works with ASCII and binary files.

tags | perl, encryption
MD5 | 78c7805ff62557e5be7e13d3408c8346
ibm-db2.c
Posted Jul 29, 2001
Authored by Honoriak

IBM DB2 (which works under W98/NT/2000) Proof of concept Denial of Service. Sending 1 byte to port 6789 or 6790 IBM DB2 crashes, as described in ibm.db2.dos.txt.

tags | exploit, denial of service, proof of concept
MD5 | 3de9be6028bd648021d753ebaaf12c72
Stealth-1.0-b30.zip
Posted Jul 29, 2001
Authored by Felipe Moniz | Site hideaway.net

The Stealth HTTP Security Scanner v1.0b30 provides more than 12000 http vulnerability checks. Runs on Win32 and Linux under Wine. Free.

Changes: New holes added: IDA "Code Red" Vulnerability and IIS Double Decode. Added Scan List and German language support.
tags | web
systems | linux, windows, 32
MD5 | 75e04c3946ce2203ce59ac1ca9a63f12
ippersonality-20010724-2.4.7.tar.gz
Posted Jul 29, 2001
Authored by Gael Roualland, Jean-Marc Saffroy | Site ippersonality.sourceforge.net

The IP Personality project is a patch to Linux 2.4 kernels that adds netfilter features: it enables the emulation of other OSes at network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting. The characteristics that can be changed are TCP Initial Sequence Number (ISN), TCP initial window size, TCP options (their types, values and order in the packet), IP ID numbers, answers to some pathological TCP packets, and answers to some UDP packets.

Changes: This release adds new manglings to fool latest versions of nmap (2.54BETA), and has lots of code improvement. Ported to kernel v2.4.7.
tags | remote, kernel, udp, tcp
systems | linux
MD5 | 47004368805cffd9ff53ac4079961c9b
_root_040.zip
Posted Jul 29, 2001
Site rootkit.com

Windows NT Rootkit v0.04 alpha - Hides processes, files, directories, has k-mode shell using TCP/IP - you can telnet into rootkit from remote. Hides registry keys - (keyboard patch disabled in this build.) Includes execution redirection.

tags | remote, shell, registry, tcp
systems | windows, nt
MD5 | 12487fc88e78176f582cbbdbd45f2575
asmcodes-1.0.2.tar.gz
Posted Jul 29, 2001
Authored by The Last Stage of Delirium | Site lsd-pl.net

This package contains all codes prepared for technical paper - UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes. For every discussed processor architecture samples of various assembly components are included.

tags | paper, vulnerability
systems | unix
MD5 | 3f31db7d6cb75525ecf87fdec3047b10
asmcodes-1.0.2.pdf
Posted Jul 29, 2001
Authored by The Last Stage of Delerium | Site lsd-pl.net

Unix Assembly Code Development for Vulnerabilities Illustration Purposes v1.02 - Covers IRIX / MIPS, Solaris, HP-UX, AIX, Ultrix, Linux, BeOS, and BSD. Includes system call invocation information, code specifics, "Zero free" code, ASM functionality, and examples.

tags | paper, vulnerability
systems | linux, unix, solaris, irix, bsd, aix, hpux, beos
MD5 | 024ff88ab975a35c795a04c9db0f0576
ms01-041
Posted Jul 27, 2001

Microsoft Security Advisory MS01-041 - Several of the RPC servers associated with system services in Microsoft Exchange, SQL Server, Windows NT 4.0 and Windows 2000 do not adequately validate inputs, and are vulnerable to a remote denial of service attack. Microsoft FAQ on this issue available here.

tags | remote, denial of service
systems | windows, 2k, nt
MD5 | 2dbadf85c2999484c24b1f032a0cc16c
ms01-042
Posted Jul 27, 2001

Microsoft Security Advisory MS01-042 - Windows Media Player v6.4, 7, and 7.1 contains a buffer overflow which allows remote code execution through opening an email or visiting a malicious web site. Microsoft FAQ on this issue available here.

tags | remote, web, overflow, code execution
systems | windows
MD5 | ec64a8bdb548a28058c843b26e73629d
pic-lpr-remote.c
Posted Jul 27, 2001
Authored by Zen-Parse

Pic / LPRng format string remote exploit. Pic is part of the groff package. It is used by troff-to-ps.fpi as uid lp when perl, troff and LPRng are installed. Tested against Redhat 7.0 (groff-1.16-7).

tags | exploit, remote, perl
systems | linux, redhat
MD5 | b872ac8b739399184c12ab501762793c
Firewall Builder With GUI
Posted Jul 27, 2001
Site fwbuilder.org

Firewall Builder consists of object-oriented GUI and set of policy compilers for various firewall platforms. In Firewall Builder, firewall policy is a set of rules, each rule consists of abstract objects which represent real network objects and services (hosts, routers, firewalls, networks, protocols). Firewall Builder helps user maintain database of objects and allows policy editing using simple drag-and-drop operations. Firewall Builder can be used to manage firewalls built on variety of platforms including, but not limited to, Linux running iptables and FreeBSD or Solaris running ipfilter.

tags | tool, firewall, protocol
systems | linux, solaris, freebsd
MD5 | 72ca573e84fe8e31d1216c22e7bb3e7d
jail_1.7.tar.gz
Posted Jul 27, 2001
Site gsyc.inf.uc3m.es

Jail Chroot Project is an attempt of write a tool that builds a chrooted environment. The main goal of Jail is to be as simple as possible, and highly portable. The most difficult step when building a chrooted environment is to set up the right libraries and files. Here, Jail comes to the rescue with a tool to automatically configures & builds all the required files, directories and libraries.

Changes: The perl scripts in 1.6 were missing the -w flag, causing some bugs to go undetected. The strace module had its argument parsing code fixed.
systems | unix
MD5 | 92978ee3cf9fec7d69da88800d07bfb4
mambo_advisorie.txt
Posted Jul 26, 2001
Site reverseonline.com

The Mambo Site Server v3.0.0 - 3.0.5 contains a vulnerability which allows users to gain administrative privileges by changing global variables via URL parsing.

tags | exploit
MD5 | 407a1020f4107e848ced585227bc294c
ettercap-0.5.4.tar.gz
Posted Jul 26, 2001
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
MD5 | 78d9581a18854ea5cdd9688f654bbb5e
jail_1.6.tar.gz
Posted Jul 25, 2001
Site gsyc.inf.uc3m.es

Jail Chroot Project is an attempt of write a tool that builds a chrooted environment. The main goal of Jail is to be as simple as possible, and highly portable. The most difficult step when building a chrooted environment is to set up the right libraries and files. Here, Jail comes to the rescue with a tool to automagically configures & builds all the required files, directories and libraries.

Changes: Mkenv.sh and addjailuser.sh have bee rewritten in perl for greater portability. A new application, called addjailsw.pl, has been written to allow insertion of software into the chrooted environment, providing more flexibility.
systems | unix
MD5 | 90cc9f516266237abf600c0cda27d5d0
insidethreat.txt
Posted Jul 25, 2001
Authored by Reflux

Protecting Corporate and Enterprise Networks Against Insider Threats - The aim of this text is to provide a basic understanding of how important it is to maintain security within the corporate network, and to offer some theory and technique that the Hacker (The insider) may use or may be using to penetrate vital systems within your organization.

tags | paper
MD5 | 5b492c808a0e767a4868c29d6c156796
firestorm-0.2.0.tar.gz
Posted Jul 25, 2001
Site scaramanga.co.uk

Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.

Changes: Re-Designed packet encode engine which supports encapsulation. A final few issues in the snort parser have been resolved. A log target (logs to tcpdump files) was added. Bugs were fixed,
tags | tool, intrusion detection
systems | unix
MD5 | f48dd7f1d7ff24f5fd12b76f3c91b160
Page 1 of 6
Back12345Next

File Archive:

September 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    5 Files
  • 2
    Sep 2nd
    5 Files
  • 3
    Sep 3rd
    3 Files
  • 4
    Sep 4th
    13 Files
  • 5
    Sep 5th
    16 Files
  • 6
    Sep 6th
    15 Files
  • 7
    Sep 7th
    20 Files
  • 8
    Sep 8th
    16 Files
  • 9
    Sep 9th
    4 Files
  • 10
    Sep 10th
    2 Files
  • 11
    Sep 11th
    15 Files
  • 12
    Sep 12th
    19 Files
  • 13
    Sep 13th
    20 Files
  • 14
    Sep 14th
    38 Files
  • 15
    Sep 15th
    31 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    7 Files
  • 18
    Sep 18th
    15 Files
  • 19
    Sep 19th
    40 Files
  • 20
    Sep 20th
    8 Files
  • 21
    Sep 21st
    1 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close