what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2002-02-26

bvi-1.3.1.src.tar.gz
Posted Feb 26, 2002
Authored by Gerhard Buergmann

BVI v1.1.1 is an editor for binary files using common vi - commands and additional commands for binary search and substitution.

Changes: Bug fixes and updates.
SHA-256 | c94dbfa293cbc61b8571d025e90fd1f06a34f8d4e5b11a59856bfc1f13014de3
sortelnetd.tgz
Posted Feb 26, 2002
Authored by Sorbo

Sortelnetd is a working telnetd 0.17 exploit (even remote if you are careful enough). alignment is critical. Includes a demo of how to find offsets and use against localhost.

tags | exploit, remote
SHA-256 | 6e643b30e9635a5e3b22d1113b59356de6894ddf8033ed508db6d01f8a7808f3
mieliekoek.pl
Posted Feb 26, 2002
Authored by Roelof Temmingh | Site sensepost.com

Mieliekoek.pl is a SQL insertion crawler which tests all forms on a web site for possible SQL insertion problems. This script takes the output of a web mirroring tools as input, inspecting every file and determine if there is a form in the file.

tags | web
systems | unix
SHA-256 | fe1bfe7f6e6e16ac4c2fcbed336c09b562bbbe5cb6b8556bfdf043b0c7344cff
CA-2002-04.ie-overflow
Posted Feb 26, 2002
Site cert.org

CERT Advisory CA-2002-04 - Microsoft Internet Explorer contains a buffer overflow vulnerability in its handling of embedded objects in HTML documents. This vulnerability allows attackers to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message. This bug was discussed in MS02-005.

tags | web, overflow, arbitrary
advisories | CVE-2002-0022
SHA-256 | 9a86954b827531979248410932ae6b826879622ef9498d4d64c93d6d37982945
mirc_security.htm
Posted Feb 26, 2002
Authored by Joe S

A paper in mIRC security.

SHA-256 | 90a2207d0d828df429e655944406fbc25002e8d8c14bbe55d716c17f03e9ade0
chap.pdf
Posted Feb 26, 2002
Authored by teso, Sebastian Krahmer | Site team-teso.net

Weaknesses in the CHAP protocol as used within PPP and PPTP. Allows authentication in PPTP networks without knowing valid login/password combinations. This authentication scheme is widely used at universities (WLAN networks). A link to a special pppd which is able to authenticate without valid /etc/ppp/chap-secrets is included.

tags | protocol
SHA-256 | a57abb2faae0727b81e1510955840c818aed9a508d24a18b84c7c47e18cd0da4
NetStumbler_0_3_23.zip
Posted Feb 26, 2002
Site netstumbler.com

NetStumbler is a Windows utility for 802.11b based wireless network auditing.

tags | tool, wireless
systems | windows
SHA-256 | c27225ba4264acde0d6ea5ab87765dc3481c0a71598cd2219ffa5d54825d6786
ApSniff.exe
Posted Feb 26, 2002
Site bretmounet.com

ApSniff is a wireless (802.11) access point sniffer for Windows 2000. It enables you to list all access points broadcasting beacon signals at your location. Useful for helping you set new access points making sure you do not have interfering APs, and helping you set-up wireless clients by providing you with the client configuration information. Requires WLAN cards of Prism 2 chipset. It works with a DLINK DWL-650 and linksys WPC11.

tags | tool, wireless
systems | windows
SHA-256 | a21ff12cd0f685ecb6beedee3258a44546d209435187179a19c1cace86d71521
kismet-1.4.1.tar.gz
Posted Feb 26, 2002
Authored by Mike Kershaw | Site nerv-un.net

Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, and Secure SUID behavior.

tags | tool, wireless
systems | cisco, linux
SHA-256 | 650217f643c0fcd7692ecb59ff0d20b1c0ba84ae2af7abb9eac15f01dd14ed1b
unicode.txt
Posted Feb 26, 2002

The UNICODE bug explained, by ReDeeMeR

tags | paper
SHA-256 | 1f7165fc929d3a5b630e0fe560bd7b35f047a4bd537ee6d46eb63d05be739c47
sqlat-src-1.0.0.tar.gz
Posted Feb 26, 2002
Authored by Patrik Karlsson | Site cqure.net

SQLAT is a suite of tools which could be useful for pen-testing a MS SQL Server. The tools do dictionary attacks, upload files, read registry and dump the SAM. They do this by wrapping extended stored procedures. There is also a tool for doing a minimal analysis of a SQL Server with output as HTML. You need to be 'sa' to run some of the tools, but this usually isn't a problem. SQLAT works over port 1433.

tags | registry
systems | unix
SHA-256 | 0a6676ead453d7eb681412ed238737347e7d9999a9a49c421d11ecd2fa62ddf7
oat-source-1.1.0.zip
Posted Feb 26, 2002
Authored by Patrik Karlsson | Site cqure.net

OAT 1.1.0 is a set of tools which can be used to audit Oracle databases running on the Microsoft Windows platform. The Tools are Java based and were tested on both Windows and Linux. They should hopefully also run on any other Java platform.

Changes: The password guessing is now done on all SIDs of the database. The SIDs enumeration should now be more reliable, Errors reported in a more readable form.
tags | java
systems | linux, windows, unix
SHA-256 | bc9ed0ea0c85421c9784e1ff06ab40b9281dd0c95e8d3000643a6c092d7de444
wavestumbler-1.2.0.tar.gz
Posted Feb 26, 2002
Authored by Patrik Karlsson | Site cqure.net

WaveStumbler is console based 802.11 network mapper for Linux and supports WEP, ESSID, MAC and more. This package includes a kernel patch (for the wireless nic drivers) which can be applied to the linux-2.4.17 sources and a program called wavestumbler. The program interacts with the patched network drivers to map wireless networks.

Changes: New kernel patch + massive bugfixes! WEP, Noise and channel should now be displayed properly. Added time fields "firstseen", "lastseen", "maxsignal". Added curses support.
tags | tool, kernel, wireless
systems | linux
SHA-256 | 319a2fe4cb418f7de47ee1cd5c4b13d741d5068d4d306365a9efe4016383edba
NBTEnum20beta1.zip
Posted Feb 26, 2002
Authored by NTSleuth | Site ntsleuth.0catch.com

NetBIOS Enumeration Utility v2.0 beta 1 is a utility for Windows which can be used to enumerate one single host or an entire class C subnet. This utility can run in two modes: query and attack. The main difference between these modes is that when NBTEnum is running in attack mode it will seek for blank password and for passwords that are the same as the username but then in lowercase letters. Runs on Windows NT 4.0/2000/XP.

Changes: Enumerates more things. Checks for user accounts with blank passwords and accounts with the same username and password.
systems | windows
SHA-256 | 12ac2cfedbc300d17fcbaffeef06b0f83bc887f0476ab2d221c8093e37454c97
wbclk256.zip
Posted Feb 26, 2002
Authored by Moritz Bartl | Site headstrong.de

WebClicker v2.56 uses public proxies to create artificial banner ad clicks. Emulates complete browser HTTP transfer and can be used for banner/link exchanges and toplists as well.

Changes: customizable proxy timeout, play WAV sound file when done, flashes window when done, minimizing the simple form is now possible, improved memory management and a few more bugs fixed.
tags | web
SHA-256 | 3a526be0353ccddea8bb276fd38b9d7ca51629a459134d57868966c55ab45d43
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close