exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2001-09-27

Posted Sep 27, 2001
Site cisco.com

Cisco Security Advisory - The Cisco Secure PIX firewall feature "mailguard" which limits SMTP commands to a specified minimum set of commands can be bypassed. To exploit this vulnerability, attackers must be able to make connections to an SMTP mail server protected by the PIX Firewall. All users of Cisco Secure PIX Firewalls with software versions 6.0(1), 5.2(5) and 5.2(4) that provide access to SMTP Mail services are at risk.

systems | cisco
SHA-256 | 844d365f0b47bcd0fed7bc74723706ea4c035e7ea51e5d953adcdb2706897b20
Posted Sep 27, 2001
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Fixes a weakness in OpenSSH's source IP based access control for SSH protocol v2 public key authentication (more information here.
tags | encryption
systems | linux, openbsd
SHA-256 | 3dd87a3456ea61151d0bd2287b3d8b9e9371d8472d0f756b9fe3ac2800478e1a
Posted Sep 27, 2001
Authored by thc | Site thc.org

THC-RUT (aRe yoU There) is a local network discovery tool developed to brute force its way into wvlan access points. It offers arp-request on ip-ranges and identifies the vendor of the NIC, spoofed DHCP, BOOTP and RARP requests, icmp-address mask request and router discovery techniques. This tool should be 'your first knife' on a foreign network.

tags | tool, local, spoof, wireless
SHA-256 | 57ed9bd93003205ae3738dab5fe7d6c2d887404f5fcbc0a7ef08c05f22715a55
Posted Sep 27, 2001
Authored by thc | Site thc.org

Hydra v1.4 is the world's first parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, etc).

tags | web, cracker, imap
SHA-256 | 1e7c26a3b9c5840830cbfe4b20c5f8dc16d52e1db7dc42711e493c8035da5d70
Posted Sep 27, 2001
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.0 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

tags | tool, wireless
systems | linux
SHA-256 | 867fdb212fef9c2ee86ba52fd23b7ca63a5d5187f61ddb0c34345adb112a82cf
Linux IPTables Firewall
Posted Sep 27, 2001
Site iptables.org

iptables is the new packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.

Changes: Fixes for IPv6, a fix for a possible string overflow in psd match, and incremental checksumming when changing TTL in TTL target.
tags | tool, firewall
systems | linux
SHA-256 | 565eabdc7cea7f1203810b37c30dfedc37fb979e145ffa30b7c25d5a9c21d48a
Posted Sep 27, 2001
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to Linux kernel v2.4 which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Ported to kernel v2.4.10, some bugs were fixed, and a "make config" warning when packet socket is modular has been added.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | a73ebf143d0739e1eb292453bf559c1f9cdec32058f30c2394eb8715caa2e556
Posted Sep 27, 2001
Site scaramanga.co.uk

Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.

Changes: Many snort compatibility fixes were made. All the snort 1.7 rules work. Most of the snort 1.8 rules work. Lots of bugs were fixed.
tags | tool, intrusion detection
systems | unix
SHA-256 | 25d1a40d6e0adbf5ed62b143d1f7a0e416617b5b67d9c4f0e55d11e094db97b4
Posted Sep 27, 2001
Site sourceforge.net

802.11b Network Discovery Tools is a gtk tool to scan for 802.11b networks using wavelan/aironet hardware and Linux wireless extensions. It includes the ability to log coordinates of found networks from a NMEA compatible GPS device, and can be linked to a serial port.

tags | tool, wireless
systems | linux
SHA-256 | 1fd449b3cfcfecf2aff18bf6d9c0c6c0363c62e10cd530785328adb191408365
Posted Sep 27, 2001
Authored by Toxic Ocean | Site blackhat.be

Proxy Toolkit is coded in Java and checks to see what information a web proxy forwards.

tags | java, web
SHA-256 | 29df10b97dc837a93d9fbf6d310c5ccfc8236ae4560a8bdac470fa265c494422
Posted Sep 27, 2001

Microsoft Security Advisory MS01-049 - A security vulnerability exists in Exchange 2000 Outlook Web Access, because it will accept and process a request for an item in an authenticated user's mailbox without verifying first that the folder structure is valid. An attacker can mount a denial of service attack by repeatedly levying a request for a non-existent but deeply nested folder in his own mailbox. Microsoft FAQ on this issue available here.

tags | web, denial of service
SHA-256 | 94946005340865173ae7c47cce980ae07ca0a2c50db2342cc2005aa10fb1d1f3
FreeBSD Security Advisory 2001.60
Posted Sep 27, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:60 - Procmail versions prior to procmail 3.20 performed unsafe actions while in the signal handlers. If a signal is delivered while procmail is already in an unsafe signal handler, undefined behavior may result, possibly leading to the ability to perform actions as the superuser under unprivileged local user control.

tags | local
systems | freebsd
SHA-256 | a15e547ec286cb5b926fcb77bad3b9f6485a830f74e96e8d626520438447fb28
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By