what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2001-12-05

imp
Posted Dec 5, 2001
Authored by Sinkhole

Imp is a denial of service tool which sends SYN floods. Some people call this one slice3. Dynamically linked with libc5.

tags | denial of service
SHA-256 | d8cf30882ac4d4ec7b847bf9d642fa4796da3f4e83a781bf3451b335261e29a4
snort-1.8.3.tar.gz
Posted Dec 5, 2001
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Bugfix release - fixed crash bug in frag2 on Linux, fixed ICMP printout and decoder for new ICMP header structs introduced in 1.8.1, fixed flexresp code - actually works now, flexresp response times should be shorter for TCP sniping, TCP packets are cached at start time and fired as needed, and added -B switch to enhance obfuscation of IP addresses in pcap files. Full changelog available here.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 1340b33f5dfe0eeaa4567f6d7341a523ee3f582b4f73bac4157c33820370c72d
openssh-3.0.2p1.tar.gz
Posted Dec 5, 2001
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Does not allow authorized_keys specified environment variables when UseLogin is active. Full changelog available here.
tags | encryption
systems | linux, openbsd
SHA-256 | 9ac31a081ace29131435a854402905a0759ad06ca10aa76c2c182db4b3537a19
jack.c
Posted Dec 5, 2001
Authored by Indigo

Jack.c is a remote exploit for the Active Perl ISAPI overflow described in Bugtraq ID 3526. Sends you a shell with SYSTEM level access.

tags | exploit, remote, overflow, shell, perl
SHA-256 | 3745d798cbfd539aa3903eced68c73268af5b0ed42cc15a37971c2d5e4a435b4
jim.c
Posted Dec 5, 2001
Authored by Indigo

Jim.c is an exploit for the remote IIS server side include buffer overflow vulnerability. Tested on Linux and Win32. To exploit this vulnerability you must have write access to the web root of the target web server. Causes the server to send you a shell with SYSTEM level access.

tags | exploit, remote, web, overflow, shell, root
systems | linux, windows
SHA-256 | fc4394ea6bdefdcf93fd1062c5697de010d7b73a75a52213eedbd484a3d7bfab
badboy.c
Posted Dec 5, 2001
Authored by Indigo

Badboy.c is a remote exploit for the Win32 Checkpoint Firewall-1 GUI log viewer program. Binds a shell to a port with SYSTEM level access. Must be run from a valid GUI client machine.

tags | exploit, remote, shell
systems | windows
SHA-256 | 4cf220b4efdf8049558c14ed6efc96485034f17cf3eb5a189cb6dcffc19f652c
comphack.c
Posted Dec 5, 2001
Authored by Indigo

Comphack.c is a remote exploit for Compaq Insight Manager.

tags | exploit, remote
SHA-256 | 77ce882eebad3c846cad7406ee942408f5d27df5e3e7c6d6733ae42461dcf0d9
Page 1 of 1
Back1Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close