Exploit the possiblities
Showing 1 - 25 of 76 RSS Feed

Files Date: 2002-04-01 to 2002-04-30

Nmap Scanning Utility 2.54 BETA 33
Posted Apr 27, 2002
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: This version contains a huge OS fingerprint update - More than 100 added or changed. Applied fix for an important RPC scanning bug and a nasty OS fingerprinting bug. Does not show uptime when obviously spoofed (eg OpenBSD 3.0).
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 4d82a7feb1ef5865900a8843935a7f63
ms02-021
Posted Apr 26, 2002

Microsoft Security Advisory MS02-021 - Outlook 2000 and 2002 provide the option to use Microsoft Word as the e-mail editor when creating and editing e-mail in either Rich-Text or HTML format. A security vulnerability exists when Outlook is configured this way and the user forwards or replies to a mail from an attacker. This could be exploited by sending a specially malformed HTML e-mail containing a script to an Outlook user who has Word enabled as the e-mail editor. If the user replied to or forwarded the e-mail, the script would then run, and be capable of taking any action the user could take. Microsoft FAQ on this issue available here.

MD5 | b532e21631882541c7a0ba255aa1c5df
FreeBSD Security Advisory 2002.18
Posted Apr 25, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:18 - A programming error in zlib may cause segments of dynamically allocated memory to be released more than once (double-freed), allowing attackers to send specially crafted data to applications that use zlib, crashing the application.

systems | freebsd
MD5 | f9a566d99804698e4e9e3c6101ca7f87
Wellenreiter-v11.tar.gz
Posted Apr 25, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: GPS support has been added. It is possible to enable/disable the acoustic beacon indicator. This release uncovers non-broadcasting networks by just waiting until a probe response passes the network (someone joins the network). A new acoustic event has been added for uncovering an essid. There is massive code cleanup and speed improvements.
tags | tool, perl, wireless
systems | linux, bsd
MD5 | e341cb0bd0812fc86b29b2c9867881c2
apache_1.3.24.tar.gz
Posted Apr 25, 2002
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed. Changelog available here.

Changes: Fixed the security vulnerability noted in CVE-2002-0061 (mitre.org) regarding the escaping of command line args on Win32. Prevented invalid client hostnames from appearing in the log file.
systems | unix
MD5 | ebea6588c3954731fcc318d29bc82409
epop.c
Posted Apr 25, 2002
Authored by Cult

This exploit hangs WiredRed e/pop v2.0.3, probably works on all 2.x versions.

tags | exploit
MD5 | d53cc8ba199088d13beffe904c1f9450
FreeBSD Security Advisory 2002.22
Posted Apr 25, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:22 - Local users can cause the FreeBSD system to crash due to a bug in the virtual memory management system involving a failure to check for the existence of a VM object during page invalidation. This bug could be triggered by calling msync(2) on an anonymous, asynchronous memory map (i.e. created using the mmap flags MAP_ANON and MAP_NOSYNC) which had not been accessed previously, causing the system to crash.

tags | local
systems | freebsd
MD5 | 60895e0707038d7543f12cf88b6df18c
slrnpull.overflow.txt
Posted Apr 25, 2002
Authored by Alex Hernandez

Slrnpull, which is installed sgid root on RedHat 6.2, contains an exploitable buffer overflow in the -d parameter.

tags | overflow, root
systems | linux, redhat
MD5 | e727d27dc99c824a299ee980cd83a57b
snort4-latest.pdf
Posted Apr 25, 2002
Authored by Aidan Carty | Site entropy.ie

Building an Intrusion Detection System Using Snort - Covers installing RedHat Linux 7.1,Compiling/Installing and configuration of MySql/Apache/ACID/Snort, setup of snort rules, and hardening the machine.

tags | paper
systems | linux, redhat
MD5 | 76ba61fd4ec82916de4b1b4bf0e145ca
k9-setup.exe
Posted Apr 25, 2002
Authored by Oscar Gallego Sendin | Site robota.net

K9 is a Windows tool for passive OS detection. It uses WinPCAP to capture network traffic and a user friendly interface to handle results, fingerprint database, etc.

systems | windows
MD5 | d3be655ac792af0cab135030a967cf03
nessus-1.2.0.tar.gz
Posted Apr 25, 2002
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 900 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: This release has SSL support, better scalability, tons of new features, bugfixes, and more.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
MD5 | a9ee95a060a7b33502ea6f4daa4ce14a
psydos.txt
Posted Apr 25, 2002
Authored by Nawok

PsyBNC v2.3 has a problem dealing with oversized passwords, making it possible to tie up all the connection slots and consume a lot of CPU on the server.

tags | exploit
MD5 | 72882c16409c851c3e19cdd8edf515a6
Alcatel.zip
Posted Apr 25, 2002
Authored by Autor Herman | Site bruring.com

Alcatel.zip is a Windows tool for getting the challenge response for easy offline config of an alcatel modem. Often used for "patching" a speedtouch home to pro, as discussed on http://brunning.com.

tags | web
systems | windows
MD5 | d20b862383bca011585fd66738ba9152
NBTEnum12.zip
Posted Apr 25, 2002
Authored by NTSleuth | Site ntsleuth.0catch.com

NetBIOS Enumeration Utility v1.2 (command line version) is a utility for Windows which can be used to enumerate NetBios information from one single host or an entire class C subnet. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, and shares. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP.

Changes: New enumeration routines, better HTML reporting, support for IP input file.
tags | local
systems | windows, nt
MD5 | 2dea94401be86154c64562fa34a34027
iischeck.pl
Posted Apr 25, 2002
Authored by Filip Maertens | Site filip.compsec.be

Microsoft IIS .HTR heap overflow checker. Determines remotely if patch MS02-018 has been applied.

tags | exploit, overflow
MD5 | 2b2edd24b76ee0b58d5186d14b8d3923
screen-stuff.tgz
Posted Apr 25, 2002
Authored by Gobbles Security

Screen v3.9.11 local root linux/x86 exploit for braille module bug.

tags | exploit, x86, local, root
systems | linux
MD5 | bf834c1357f2a2f6814bd7bf51ecea1d
xpede-4.1.txt
Posted Apr 25, 2002
Site sympatico.ca

Five vulnerabilities have been found in Intellisol Xpede v4.1.

tags | vulnerability
MD5 | e19de9b862f8cac67e3e22c95c0f9dbb
microsoft.dts.txt
Posted Apr 25, 2002
Authored by Peter Grundl

Microsoft Distributed Transaction Coordinator DoS - A flaw in the way MSDTC handles malformed packets could allow an attacker to hang the service and exhaust resources on the Server. If an attacker sends 20200 null characters to the MSDTC service, which listens on TCP port 3372, server resources are allocated poorly. This attack can result in MSDTC.EXE spiking at 100% cpu usage, MSDTC refusing connections and kernel resources being exhausted. This was fixed with MS02-018, although the security bulletin does not mention this vulnerability.

tags | kernel, tcp
MD5 | e25b02dc80600cec84dac5e0cc8955a5
fscan.txt
Posted Apr 25, 2002
Authored by Peter Grundl

A format string bug in Foundstone Fscan v1.12 for Windows can result in a malicious service banner overwriting the stack and the EIP on the PC performing the scanning, if banner grabbing is enabled. Fix available here.

systems | windows
MD5 | 2de3733540166fe27765c7a79b8f3da9
remotefmt-howto.txt
Posted Apr 25, 2002
Authored by Frederic Raynal

How to Remotely Exploit Format String Bugs - A practical tutorial. Includes info on guessing the offset, guessing the address of the shellcode in the stack, using format string bugs as debuggers, examples, etc.

tags | paper, shellcode
systems | unix
MD5 | 8d086961f802114fdecba45f4f33283f
FreeBSD Security Advisory 2002.23
Posted Apr 25, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:23 - Setuid or setgid applications can be used for privilege elevation due to insecure handling of stdio file descriptors on FreeBSD releases up to and including 4.5-RELEASE. It is known that the 'keyinit' set-user-id program is exploitable using this method. This vulnerability was discovered by Joost Pol.

systems | freebsd
MD5 | af9b03df14e62e8c4b9fdf23ef6b6305
evelyne.sh
Posted Apr 25, 2002
Authored by netric, Atje | Site netric.org

Local root exploit for the "Suid application execution bug" (< FreeBSD 4.5-STABLE) that was discovered by Joost Pol from Pine.

tags | exploit, local, root
systems | freebsd
MD5 | 6e686fc543c6ddbad436bfb0f81fd5be
php.nuke.cross-site.txt
Posted Apr 25, 2002
Authored by Rodrigo Gutierrez | Site trustix.com

PHP Nuke v5.5 contains 8 new and 9 old cross site scripting vulnerabilities.

tags | php, vulnerability, xss
MD5 | 2a63943705c465c396b7b7575f6e3503
iosmash.c
Posted Apr 25, 2002
Authored by phased

Iosmash.c is an exploit for the stdio kernel bug that resides in all releases of FreeBSD up to and including 4.5-RELEASE. The exploit uses keyinit, which is part of the S/key package, to create 5 valid root passwords that give instant root access trough S/key.

tags | exploit, kernel, root
systems | freebsd
MD5 | 5a17bababe3ea7ff5e73ed68e8bf079d
ettercap-0.6.5.tar.gz
Posted Apr 24, 2002
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
MD5 | 75bdba8f9ea65ec89683c53a326ee015
Page 1 of 4
Back1234Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close