exploit the possibilities
Showing 1 - 24 of 24 RSS Feed

Files Date: 2002-02-05

lotus.domino.bypass.txt
Posted Feb 5, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

Lotus Domino web server prior to v5.0.9 allows password protected features to be accessed without the password by sending a malformed URL.

tags | exploit, web
MD5 | df4b9a8b3afe909c6e9cf088ed4fb54b
NetBSD-SA2001-018.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-018 - A remote buffer overflow in BSD derived Line Printer Daemons can lead to a remote root compromise. This vulnerability affects NetBSD current, 1.5, 1.5.1 and 1.5.2.

tags | remote, overflow, root
systems | netbsd, bsd
MD5 | f3fdd6192469af9d256ffd05a0887f1d
NetBSD-SA2001-017.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-017 - Sendmail's incorrect command line argument check can lead to a local root privilege compromise. This vulnerability affects all sendmail versions between 8.10.0 to 8.11.5.

tags | local, root
systems | netbsd
MD5 | cfc7da87178731d6909560c889d8f5bd
hd_winter_2002.pdf
Posted Feb 5, 2002
Authored by John Thornton, hackersdigest | Site hackersdigest.com

The Winter issue of Hacker's Digest - In this issue: Microsoft The Soup Nazis, Hacker's Digest Focus - The Honeynet Project, Changing Your IP With @Home Service Without the aid of Tech Support, A Mobile Phone ANI Diversion Technique, An Analysis of the RADIUS Authentication Protocol, A Detailed Look Into Prison Phone Systems, Fingerprinting Port 80 Attacks - A look into web server, and web application, attack signatures, Letters!, Windows 2000 and XP Terminal Service IP Address Spoofing, An Insightful Look at the GOVnet Network, iDEFENSE Labs Analyzes Feasibility of Distributed Attacks using SubSeven, Full Disclosure of Vulnerabilities - pros/cons and fake arguments, and Microsoft Passport Account Hijack Attack.

tags | web, spoof, vulnerability, protocol, magazine
systems | windows, 2k
MD5 | ab109045a1e358728fa29960b58d4180
NetBSD-SA2001-016.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-016 - The fts functions are provided for traversing UNIX file hierarchies. The NetBSD fts implementation can be tricked to follow symbolic links and can therefore be abused by local users. All NetBSD releases prior to July 9, 2001 are affected by this vulnerability.

tags | local
systems | netbsd, unix
MD5 | 5aaadd17aaa176e5313bc8ffddc587c5
NetBSD-SA2001-015.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-015 - Several buffer overflows found in the NetBSD kernel can enable local users to crash the system or gain superuser privileges. This vulnerability affects NetBSD-current, 1.4.*, 1.5, and 1.5.1.

tags | overflow, kernel, local
systems | netbsd
MD5 | 05e7d3511508a050b833e485517ece1f
teso-advisory-012.txt
Posted Feb 5, 2002
Authored by teso | Site team-teso.net

TESO Security Advisory - LIDS Linux Intrusion Detection System vulnerability. The "Linux Intrusion Detection System" security patch for the Linux kernel creates a security vulnerability. Exploitation is easy and local users may be able to gain unrestricted root privileges.

tags | kernel, local, root
systems | linux
MD5 | 798dd3ba6b7227152566567c49b9423c
NetBSD-SA2001-014.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-014 - Dump (/sbin/dump), which is setgid tty, does not drop its privileges correctly and can be used to execute commands with setgid tty privileges by using the RCMD_CMD environment variable. This vulnerability affects the NetBSD-1.4, 1.5, 1.5.1 and current branch.

systems | netbsd
MD5 | ca664a93a96fb15541c16aec000c6483
NetBSD-SA2001-013.txt.asc
Posted Feb 5, 2002
Site netbsd.org

NetBSD Security Advisory 2001-013 - The OpenSSL libcrypto includes a PRNG (pseudo random number generator) implementation. The logic used for PRNG was not strong enough, and allows attackers to guess the internal state of the PRNG. Therefore, attackers can predict future PRNG output. This vulnerability undermines the security level of cryptographic programs such as ssh and pgp.

systems | netbsd
MD5 | cdf99cb5c4800d795de5f7a8f19df567
NetBSD-SA2001-012.txt.asc
Posted Feb 5, 2002

NetBSD Security Advisory 2001-012 - A remotely exploitable buffer overflow found in BSD derived telnet daemons can be used to execute shell code with root privileges.

tags | overflow, shell, root
systems | netbsd, bsd
MD5 | 0929abe340f20ce04a6ae1169308c7d3
clean-reboot-shellcode.c
Posted Feb 5, 2002
Authored by Zillion | Site safemode.org

Linux x86 shellcode that does a sync(),sync() and then reboot(). Exit() was added in case the previous syscalls fail.

tags | x86, shellcode
systems | linux
MD5 | 0a26ad1e2875d80365feda5c94b4e552
linux-rename.c
Posted Feb 5, 2002
Authored by Zillion | Site safemode.org

Linux x86 shellcode that does a rename() of /bin/motd to /bin/owned.txt.

tags | x86, shellcode
systems | linux
MD5 | 5499694acd0e057779e2d16da4eca17a
reboot-shell.c
Posted Feb 5, 2002
Authored by Zillion | Site safemode.org

Linux x86 shellcode that does a reboot().

tags | x86, shellcode
systems | linux
MD5 | 8886ed4f3f790a3b137bbdfe4747ca19
execve-tmp-p00p.c
Posted Feb 5, 2002
Authored by Zillion | Site safemode.org

Linux x86 shellcode that does an execve of /bin/sh /tmp/p00p.

tags | x86, shellcode
systems | linux
MD5 | b2968a28b71d272fefa7ea42f4985cb0
flush-iptables-shell.c
Posted Feb 5, 2002
Authored by Zillion | Site safemode.org

Linux x86 shellcode that does an execve() of /sbin/iptables -F in order to flush activated firewall rules.

tags | x86, shellcode
systems | linux
MD5 | 2350c4a496f943a61195c8b3902815a3
flush-ipchains-shellcode.c
Posted Feb 5, 2002
Authored by Zillion | Site safemode.org

Linux x86 shell code that does an execve of /sbin/ipchains -F.

tags | shell, x86, shellcode
systems | linux
MD5 | 5a35863112db6d06b1386db03e00e770
w000t-shell.c
Posted Feb 5, 2002
Authored by Zillion

Linux x86 shellcode that uses execve and echo >> to create a passwordless root account.

tags | x86, root, shellcode
systems | linux
MD5 | 859ba00e8e5653952967ef43baabb02c
shell-mkdir.c
Posted Feb 5, 2002
Authored by Zillion

Linux/x86 shell code that creates the directory 'hacked' (perm 755) using the mkdir() syscall and then does an exit().

tags | shell, x86, shellcode
systems | linux
MD5 | 8659140eb00bbef978fa1d3f6c64fad6
wavestumbler-1.0.4.tar.gz
Posted Feb 5, 2002
Authored by Patrik Karlsson | Site cqure.net

WaveStumbler is console based 802.11 network mapper for Linux and supports WEP, ESSID, MAC and more. This package includes a kernel patch (for the wireless nic drivers) which can be applied to the linux-2.4.17 sources and a program called wavestumbler. The program interacts with the patched network drivers to map wireless networks.

tags | tool, kernel, wireless
systems | linux
MD5 | 78f047175b8d3bf30bf80e6e3fc29d80
lcrzo-4.04-src.tgz
Posted Feb 5, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Bugs fixed! Added support for Intel Itanium 64.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
MD5 | bc0b5eb597af2337f58d5a7b5762528d
lotus-domino-dos.txt
Posted Feb 5, 2002
Authored by Peter Grundl

Lotus Domino Webserver prior to 5.0.9a on Windows 2000 contains two remote denial of service vulnerabilities which use up all 400 threads.

tags | remote, denial of service, vulnerability
systems | windows, 2k
MD5 | 8ecc8da929f0085edc8aa5cf1f1a5275
tac_plus.txt
Posted Feb 5, 2002
Authored by Kevin A. Nassery

Tac_plus, an example and unsupported TACACS+ server developed by Cisco, insecurely creates files.

systems | cisco
MD5 | 6c5e1e9c2315dc458bc4a61de2523c71
gps-0.9.0.tar.gz
Posted Feb 5, 2002
Authored by Whitehat | Site gps.sourceforge.net

Ghost Port Scan is an advanced port scanner and a firewall rule disclosure tool. Uses IP & ARP spoofing, sniffing, stealth scanning, arp poisoning, IP fragmentation, and other techniques to perform stealth and untrackable information collection. GPS is especially efficient in LAN pen-testing, due to its ability to disclose the firewall settings of a host.

Changes: New improved architecture, support for UDP scans, lots of optimizations, faster scan speed, and is more portable.
tags | tool, scanner, spoof
systems | unix
MD5 | 3888e8071ccd6f5404aa8fbc6bc1eef8
ethereal-0.9.1.tar.gz
Posted Feb 5, 2002
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: You can now build display filters on the fly by right-clicking on tree view items. New dissectors include DHCPv6, DLSw, IAPP, SCSI, SPOOLSS RPC, SliMP3, and TSP. Lots more were updated, including AIM, LDAP, NFS, syslog, and TCP.
tags | tool, sniffer, protocol
systems | unix
MD5 | d358941f978bff598672c618df044195
Page 1 of 1
Back1Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    6 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close