exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2001-08-15

lsof_4.57_W.tar.gz
Posted Aug 15, 2001
Authored by Vic Abell

Lsof is an extremely powerful unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It easily pinpoints which process is using each network connection / open port.

Changes: Help now links to the new FAQ, fixed bugs for old linux kernels, improved HP-UX support, added OpenBSD 2.6, 2.9, and FreeBSD 5.0-CURRENT support, and fixed some bugs.
tags | tool, intrusion detection
systems | unix
SHA-256 | 0af199f2e17c821efb6810cf7e3ff308e165e9e3a88dbc63c59e90c2b9093df2
ms01-043
Posted Aug 15, 2001

Microsoft Security Advisory MS01-043 - The NNTP service in Windows NT 4.0 and Windows 2000 contains a memory leak in a routine that processes news postings. Each time such a posting is processed that contains a particular construction, the memory leak causes a small amount of memory to no longer be available for use. If an attacker sent a large number of posts, the server memory could be depleted to the point of crashing. Microsoft FAQ on this issue available here.

tags | memory leak
systems | windows
SHA-256 | dda3214336aa2b8b38f85dc3ac8b2f9efa83fe45b72894061530dc0f802ec8b9
store.cgi.txt
Posted Aug 15, 2001
Authored by Tack

Store.cgi from Key to the Web's ecommerace solution contains a vulnerability which allows web users to read any file on the system. Exploit URL included.

tags | exploit, web, cgi
SHA-256 | 0c35ce0b2d171b46048cd2cee55ae9e0bebb76665535c56dce2ba5fe63c19216
rootscanner.pl
Posted Aug 15, 2001
Authored by Idawson

Rootscanner.pl is a scanner to find root.exe, the backdoor left by the code red II worm. Takes a starting and ending IP as input.

tags | tool, worm, root, scanner
systems | unix
SHA-256 | 21cbf680c0db7d3768a2e3451a2b47859affe8f26026c6864f0328fa8b512f66
Redscan-Beta.zip
Posted Aug 15, 2001
Authored by Felipe Moniz | Site hideaway.net

Code Red II Removal Tool 1.0 Beta - For Windows.

systems | windows
SHA-256 | 150de76011fc309d3b139edd0ae45c4095686761dc20f1bc26675d091a010fc5
cr2_scan.pl
Posted Aug 15, 2001
Authored by Dorkism | Site dorkism.net

Code Red II Class C scanner.

tags | tool, scanner
systems | unix
SHA-256 | 9131112695fe046f5968472ade56091fc7b175ab9e38584dc38f6124fba65fc4
ctrace-0.8.tar.gz
Posted Aug 15, 2001
Authored by Walter Stanish | Site pratyeka.org

Ctrace is a multiprotocol traceroute tool, written in perl.

tags | perl
systems | unix
SHA-256 | acd7d4f609b7d12e077ea2402a3ddc61ffbb5a971ecbf8c7d7d275426788f263
Spoof-icmp.txt
Posted Aug 15, 2001
Authored by Zillion | Site safemode.org

Spoofing tool for ICMP packets - In perl! Able to send any ICMP type. More info on ICMP types available here. Requires the Net::Raw::IP module.

tags | denial of service, perl, spoof
SHA-256 | f09dbd27a1265b34e14ded59d4c3798f44bb6e8a0aa0363cb3444e878bf421a5
tcp-junkie.txt
Posted Aug 15, 2001
Authored by Zillion | Site safemode.org

TCP-Junkie is a random TCP packet generator written in perl. Generates random TCP packets with random source address, source port and random flags. Pretty funny and can be useful for firewall testing.

tags | denial of service, perl, tcp
SHA-256 | 6678d52cad967712c1ca8de71e30b003b57191be15501c38c480b4049ef33f4f
sprint-lite-0.2.tgz
Posted Aug 15, 2001
Authored by Zillion | Site safemode.org

Sprint Lite is an OS fingerprinting tool which is similar to Queso except that it is written in Perl and is still actively being developed. It only sends 1 syn packet, to avoid IDS detection. Requires Net::RawIP.

tags | tool, scanner, perl
systems | unix
SHA-256 | bc8f4c04b3aa25867b3e4c3858fcf3511a579dcc6f68b53b65f78aec83cb8f2c
sprint-0.3.tgz
Posted Aug 15, 2001
Authored by Zillion | Site safemode.org

Sprint is an OS fingerprinting tool which is similar to Queso except that it is written in Perl and is still actively being developed. Requires Net::RawIP.

tags | tool, scanner, perl
systems | unix
SHA-256 | 34856680f6c298699b209d783d24b3d8cc493d72e1a8d188a9b15c5607438ae6
emailkit11.zip
Posted Aug 15, 2001
Authored by Lebedensky

Emailkit is an email bomber/faker for Windows 95/98/NT. It is very fast due to multithreading and has nice features like being able to attach files.

tags | denial of service
systems | windows
SHA-256 | 832d9a5fb27ae02d3f791a0963f4751aa7f48e302d0a0a6c878895a7ef25da5f
ids.html
Posted Aug 15, 2001
Authored by John Kozubik

Structural Versus Operational Intrusion Detection - Intrusion Detection White Paper - short and basic, comments requested.

tags | paper
SHA-256 | cfd5087f398936a2452254bff2bf5e88f99d40c2d03717f3d22bf3650b088a50
hping2.0.0-rc1.tar.gz
Posted Aug 15, 2001
Authored by Antirez | Site hping.org

hping2 is a network tool designed to send custom ICMP/UDP/TCP packets and to display target replies like ping. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under all supported protocols. Using hping2, you can test firewall rules, perform spoofed port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, transfer files (even with really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack. hping2 is very useful for learning TCP/IP.

Changes: Major bugfixes, support for Solaris has been added, BSD port fixes, better interface handling, and random feature enhancements.
tags | tool, remote, arbitrary, udp, scanner, spoof, tcp, protocol
systems | unix
SHA-256 | 5ebd95f69b666490c776e24040bfe8b685881f280965911655abf8766dc7f5a1
jail_1.8.tar.gz
Posted Aug 15, 2001
Site gsyc.inf.uc3m.es

Jail Chroot Project is an attempt of write a tool that builds a chrooted environment. The main goal of Jail is to be as simple as possible, and highly portable. The most difficult step when building a chrooted environment is to set up the right libraries and files. Here, Jail comes to the rescue with a tool to automatically configures & builds all the required files, directories and libraries.

Changes: Argument based bugs have been fixed, allowing programs like ssh and scp which depend on arguments to work. Terminal device files (tty and pts/XX) are now automatically created on startup.
systems | unix
SHA-256 | 89dc3606edee7e9edbf127f80e820d80777734cd0992e2513b6224bf91451fd2
Peep-0.4.3.src.tar.gz
Posted Aug 15, 2001
Site peep.sourceforge.net

Peep the Network Auralizer is a monitoring tool that represents network information via audio output. Network diagnosis with Peep is not only based on singular network events, but also on whether the network as a whole "sounds normal."

Changes: Clients now fit into the CPAN scheme and also now available over CPAN. Code was rewritten and bugfixes were made on the client and the server.
tags | tool, sniffer
SHA-256 | 78dcc12a0fae1eabdfe2a22a6872c0e10c495ffd115b060b2f3e3a7debbb98c6
freevsd-1.4.9-2.tar.gz
Posted Aug 15, 2001
Authored by Mark Sutton | Site freevsd.org

FreeVSD facilitates true Linux Virtual Servers within a 'chroot' environment, allowing Web servers and other applications to be deployed and administered discretely, without compromise to security. Each Virtual Server has its own IP address(es), Apache webserver, and view of the process table. FreeVSD expands the Linux system by creating a pseudo-'super user' (admin) for each Virtual Server. The admin user has the ability to create extra POP3/FTP and Telnet users and also administrate vital services such as the webserver.

Changes: Quotas now work on the 2.4 kernel, fixed procmail recipes and a fixed vm-pop3d are included, and various bugfixes.
tags | web
systems | linux, unix
SHA-256 | acab5db06a9874707b0bcd723e7765318249dec576e53153c7df3ab5b52a14bc
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close