what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2002-03-20

Posted Mar 20, 2002
Authored by Gollum

Microsoft posted a security bulletin on this (ms99-040) way back in September 28, 1999; it is still exploitable if the html file is run from the users local disk and not from a webserver or file-share.

tags | exploit, local
SHA-256 | 8ffd9671f0b9be7cb6bdf03ca7f71dbd7b5e1f5919523c3959581dcf7e7832de
Posted Mar 20, 2002
Authored by Daniel | Site bastardo.de

IIS unicode strings.

tags | paper
SHA-256 | 9349adb2a527c9a62ec3abae3b5c92f0f8b520e4a61ff2ef6b00e79a53220782
Posted Mar 20, 2002
Authored by Solar Eclipse | Site phreedom.org

onesixtyone 0.3 is an efficient SNMP scanner which utilizes a sweep technique to achieve good performance. It finds SNMP devices on your network and brute-forces the community strings using a dictionary. It is possible to scan a class B network (65536 ip addresses) in under 13 minutes with a high degree of accuracy. Tested on Linux, FreeBSD, OpenBSD and Solaris.

Changes: This release includes portability enhancements.
tags | tool, scanner
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 0baedfe247ea6e07cb88efdc67ca4e7a47bf6457a6de0a5cb0cc8f3851085203
Posted Mar 20, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).

Changes: Added WEP enabled / disabled detection. WEP encrypted enabled access points now get a different icon coloring that non WEP enabled ones. Real access points got different icons than AD-Hoc stations that do the broadcasting. Added a battery monitor window. Enhanced the scanner window performance. Fixed the problem of adding of access point in the tree outside the channels.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | b40851db96e46b4817e4d858df01930ebfc9ab68ce7d8225f0429584dcf000e8
Posted Mar 20, 2002
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Fixes for a few minor memory leaks, new hacks (cubenetic and fluidballs), new versions of pipes, glplanet, bsod, forest, and bumps, and better FPS computation in the GL hacks.
tags | root
systems | unix
SHA-256 | 02dd9db7b5e15b34e9d9cdadb26be5cdc30cc092d00da2035add0ea94b9189c5
Posted Mar 20, 2002
Authored by twlc, Yaroze | Site twlc.net

Mod_protection is an apache module that integrate basic function of an IDS (intrusion detection system) and of a firewall (just an emulation for now). Your apache administrator have only to install mod_protection and define rules. A normal NIDS can't check SSL protected traffic, where mod_protection can. When a malicious client sends a request that matches on your rules the administrator will be warned and the client gets a user defined page or a error or warning.

Changes: Three new directives - BlockTime, PairAlert, and PairAlertMatch. Blocktime does firewall emulation. Updated docs. Rules are now in an external file.
SHA-256 | e1ff421a590fe6e6835781223069f929d55a39f49c486e2db9671f201e81005e
Posted Mar 20, 2002
Site legions.org

IP Sorcery is a TCPIP packet generator which allows you to send TCP, UDP, and ICMP packets with a GTK+ interface.

Changes: Added the ability to the console version to specify number of packets to send. Many cool feature enhancements were added.
tags | udp, tcp
systems | unix
SHA-256 | b00cf5a126db1e3db6f69c581645a5df3895b0d757e4d32ef93ca286a31e8324
Posted Mar 20, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Added support for serial line modems, the ability to spoof without having to specify an IP option (tools 298-307), the ability to create UDP/TCP clients/servers without having to specify an IP option (tools 308-315), TCP/UDP/ICMP traceroute at the IP level (tools 316-18), ICMP/TCP ping at the IP level (tools 319-20), TCP/UDP/ICMP scans at the IP level (tools 322-4), and the ability to edit binary files (tools 325-6) were added. Files not being renamed when the input and output files were the same has been fixed (tools 149-50).
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | 05d1c24027df852d16c16f0fe79d4eb4e0bf7e5c62a8a00dd50059716a829429
Posted Mar 20, 2002
Authored by Nyo, Jade

FreeBSD rootkit precompiled binaries for 4.2-RELEASE.

tags | tool, rootkit
systems | unix, freebsd
SHA-256 | 3af1773776a476c441374927e24c556a578e2d6ed99f92f5b4f875f62c395399
Samhain File Integrity Checker
Posted Mar 20, 2002
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Fixes a compile error with --enable-xml on non-Linux systems and a problem with the hiding kernel module on new Linux kernels has been fixed (files were hidden, but the samhain process was visible).
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | f153a0f8c56156a595ef745a1525915403f8cc4f7379bd5f7c24d166f5afd814
Posted Mar 20, 2002
Authored by Daniel | Site bastardo.de

IISscan v1.0 scans networks for IIS servers vulnerable to the unicode bug.

tags | tool, scanner
systems | unix
SHA-256 | 3c3d59978a521e77e4cd36649b23cbb404e3411fe080d04a7542b236aa3459ad
Page 1 of 1

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By