Twenty Year Anniversary
Showing 1 - 25 of 75 RSS Feed

Files Date: 2001-09-01 to 2001-09-30

Posted Sep 28, 2001
Authored by Truefinder | Site

How to Exploit Format String Vulnerabilities under Alpha Linux. Includes techniques and example code.

tags | paper, vulnerability
systems | linux, unix
MD5 | 77555d54c389c58fc5c52f1ce310a874
Posted Sep 28, 2001
Authored by Nemes||y

Majordomo v1.94.4 local exploit in perl. Binds a shell to port 1234 with uid=Majordomo.

tags | exploit, shell, local, perl
MD5 | 93542c2ce8283244257ff38ed13f553c
Posted Sep 28, 2001
Authored by Marty Schlacter | Site

This howto walks you through building a FreeBSD-STABLE firewall with IPFILTER. This is a checklist that walks you through the entire process from beginning to end: installing FreeBSD-stable, recompiling the kernel, OpenSSH security, TCP-wrappers, VESA video modes, and special syslog logging for your firewall.

Changes: Updated for FreeBSD-4.4-STABLE.
tags | paper, kernel, tcp
systems | freebsd
MD5 | 85a429380d1944e843d563d87426900e
Posted Sep 27, 2001

Cisco Security Advisory - The Cisco Secure PIX firewall feature "mailguard" which limits SMTP commands to a specified minimum set of commands can be bypassed. To exploit this vulnerability, attackers must be able to make connections to an SMTP mail server protected by the PIX Firewall. All users of Cisco Secure PIX Firewalls with software versions 6.0(1), 5.2(5) and 5.2(4) that provide access to SMTP Mail services are at risk.

systems | cisco
MD5 | bd7bb40432ce6ef1c3c4e10f11438049
Posted Sep 27, 2001
Authored by Damien Miller | Site

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Fixes a weakness in OpenSSH's source IP based access control for SSH protocol v2 public key authentication (more information here.
tags | encryption
systems | linux, openbsd
MD5 | 5061e6e0748713bca1b40fc8b13ff5ce
Posted Sep 27, 2001
Authored by thc | Site

THC-RUT (aRe yoU There) is a local network discovery tool developed to brute force its way into wvlan access points. It offers arp-request on ip-ranges and identifies the vendor of the NIC, spoofed DHCP, BOOTP and RARP requests, icmp-address mask request and router discovery techniques. This tool should be 'your first knife' on a foreign network.

tags | tool, local, spoof, wireless
MD5 | 223b9aaf55206f6c981b40ab30ac1b50
Posted Sep 27, 2001
Authored by thc | Site

Hydra v1.4 is the world's first parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, etc).

tags | web, imap
MD5 | 53aae7ecf77d2b48df6b0413cc15fe0c
Posted Sep 27, 2001
Authored by van Hauser, thc | Site

THC-WarDrive v2.0 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

tags | tool, wireless
systems | linux
MD5 | 43736fff1ca1e6a6bda14947e43f6190
Linux IPTables Firewall
Posted Sep 27, 2001

iptables is the new packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.

Changes: Fixes for IPv6, a fix for a possible string overflow in psd match, and incremental checksumming when changing TTL in TTL target.
tags | tool, firewall
systems | linux
MD5 | 68c55130d68a03c451de0ac900c67448
Posted Sep 27, 2001

The Linux Port/Socket Pseudo ACLs project is a patch to Linux kernel v2.4 which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Ported to kernel v2.4.10, some bugs were fixed, and a "make config" warning when packet socket is modular has been added.
tags | denial of service, kernel, root, patch
systems | linux, unix
MD5 | 99b0fe735c0465b02dbca45959674732
Posted Sep 27, 2001

Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.

Changes: Many snort compatibility fixes were made. All the snort 1.7 rules work. Most of the snort 1.8 rules work. Lots of bugs were fixed.
tags | tool, intrusion detection
systems | unix
MD5 | 3d4249dc04cb8ae49d422e4bbcadb656
Posted Sep 27, 2001

802.11b Network Discovery Tools is a gtk tool to scan for 802.11b networks using wavelan/aironet hardware and Linux wireless extensions. It includes the ability to log coordinates of found networks from a NMEA compatible GPS device, and can be linked to a serial port.

tags | tool, wireless
systems | linux
MD5 | deae861038aa166235de7aba77581b06
Posted Sep 27, 2001
Authored by Toxic Ocean | Site

Proxy Toolkit is coded in Java and checks to see what information a web proxy forwards.

tags | java, web
MD5 | 4e1a802f5639dd03e31d7a28712f80e1
Posted Sep 27, 2001

Microsoft Security Advisory MS01-049 - A security vulnerability exists in Exchange 2000 Outlook Web Access, because it will accept and process a request for an item in an authenticated user's mailbox without verifying first that the folder structure is valid. An attacker can mount a denial of service attack by repeatedly levying a request for a non-existent but deeply nested folder in his own mailbox. Microsoft FAQ on this issue available here.

tags | web, denial of service
MD5 | 69a5434332854c456993120acaa83322
FreeBSD Security Advisory 2001.60
Posted Sep 27, 2001
Authored by The FreeBSD Project | Site

FreeBSD Security Advisory FreeBSD-SA-01:60 - Procmail versions prior to procmail 3.20 performed unsafe actions while in the signal handlers. If a signal is delivered while procmail is already in an unsafe signal handler, undefined behavior may result, possibly leading to the ability to perform actions as the superuser under unprivileged local user control.

tags | local
systems | freebsd
MD5 | 380eca29133cf6e85db4ddf85f4cbe35
Posted Sep 22, 2001
Authored by Dianne Skoll | Site

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.10 / 8.11 and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Handles MIME-encoded words in headers correctly.
systems | windows, unix
MD5 | 6839047f41123eb3ef440927ad8d427e
Posted Sep 22, 2001

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: This release includes lots of security and performance issues. The sendmail binary is no longer setuid! There is better memory and thread handling and lots of fixes. Changelog available here.
systems | unix
MD5 | 25ab5737edfae98b12b3071cf6e7cf00
Posted Sep 22, 2001
Authored by Xie Hua Gang | Site

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection. LIDS FAQ available here.

Changes: Fixed inheritance problems including the kernel going into an endless loop and more lidsadm fixes and code cleanup.
tags | kernel, root
systems | linux
MD5 | 0ffdf8255f6c8078f96990ba7cf672c5
Posted Sep 22, 2001

MindTerm is a complete ssh-client in pure java which can be used either as a standalone java-application or as a java-applet. Includes a vt102/xterm-terminal with the ssh protocol and also "drop-in" socket replacements to use ssh tunnels transparently from a java application/applet.

Changes: Changed keypair format to be PEM for key compatibility with OpenSSH, Added a GUI to the SFTP transfer. Fixed lots of bugs.
tags | java, protocol
MD5 | 7cc7cb2e8ae1cb6f08f3361b21317331
RNmap 0.5.3 Beta
Posted Sep 21, 2001
Authored by Tuomo Makinen | Site

Remote Nmap is a python client/server package which allows many authorized clients to connect to a centralized nmap server to do their port scanning. This could be useful for security companies who want to have all their scans come from a dedicated machine.

Changes: A few bugfixes, a workaround to make the nmap multi-portlist feature work, and a few modifications for grnmap.
tags | tool, remote, nmap, python
systems | unix
MD5 | 3cb51fe1639578d43dd1dec4698c692b
Posted Sep 21, 2001
Authored by Whitehat | Site

Ghost Port Scan is an advanced port scanner and a firewall rule disclosure tool. Uses IP & ARP spoofing, sniffing, stealth scanning, arp poisoning, IP fragmentation, and other techniques to perform stealth and untrackable information collection. GPS is especially efficient in LAN pen-testing, due to its ability to disclose the firewall settings of a host.

tags | tool, scanner, spoof
systems | unix
MD5 | 308588021de66b58522b06307151fb15
Posted Sep 21, 2001
Authored by CMN | Site

SADoor is a non-listening remote admin tool for UN*X systems. It sets up a listener in non-promiscuous mode for a specific sequence of packets arriving to the interface before allowing command mode. The commands are sent MIME64 encoded in the TCP payload and decoded and passed on to system(3).

tags | tool, remote, tcp, rootkit
systems | unix
MD5 | cd5507c7d2cdebc30a30ee19977bb14c
Posted Sep 20, 2001
Authored by Curryman | Site

Form Scalpel v1.0.11 for Windows is designed to aid security professionals to assess the resilience of a web sites forms to various forms of attack. Given the growing sophistication and variety of sites and development techniques utilized, a generic tool specifically aimed at making this job easier was required. Thus "Form Scalpel" was born. The tool automatically extracts form/s from a given web page and automatically splits out all fields for editing and manipulation - making it a simple task to formulate detailed GET and POST requests. The application supports HTTP and HTTPS connections and will function over proxy servers.

tags | web
systems | windows
MD5 | cc2ae1b4a6b71dd864d1bab764dc9e8c
Posted Sep 20, 2001
Authored by Graham Ollis | Site

netl v1.09 is a network logger/sniffer suitable for TCP/IP over Ethernet and loopback which provides functionality not found in similar programs. netl is capable of logging everything from pings to telnet, including low level IP like SYNs and RSTs.

Changes: Added perl/Tk interface, fixed some bugs.
tags | tool, tcp, intrusion detection
systems | unix
MD5 | 8bd85e4f9398ec16cdee9dfe9577628b
Posted Sep 19, 2001
Authored by Tom Liston | Site

LaBrea v2.0 is a program that creates a tarpit or, as some have called it, a "sticky honeypot". LaBrea takes over unused IP addresses on a network and creates "virtual machines" that answer to connection attempts. LaBrea answers those connection attempts in a way that causes the machine at the other end to get "stuck", sometimes for a very long time.

Changes: New command line option -p to keep tcp connections in the "persist" state, which can hold on to threads for a long time.
tags | tool, intrusion detection
systems | unix
MD5 | 7365fb2beff6fa486908a1419e0de0ae
Page 1 of 3

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

April 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    5 Files
  • 2
    Apr 2nd
    17 Files
  • 3
    Apr 3rd
    11 Files
  • 4
    Apr 4th
    21 Files
  • 5
    Apr 5th
    17 Files
  • 6
    Apr 6th
    12 Files
  • 7
    Apr 7th
    1 Files
  • 8
    Apr 8th
    6 Files
  • 9
    Apr 9th
    21 Files
  • 10
    Apr 10th
    18 Files
  • 11
    Apr 11th
    42 Files
  • 12
    Apr 12th
    7 Files
  • 13
    Apr 13th
    14 Files
  • 14
    Apr 14th
    1 Files
  • 15
    Apr 15th
    1 Files
  • 16
    Apr 16th
    15 Files
  • 17
    Apr 17th
    20 Files
  • 18
    Apr 18th
    24 Files
  • 19
    Apr 19th
    20 Files
  • 20
    Apr 20th
    2 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By