exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2002-06-04

Posted Jun 4, 2002
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: Bug fixes!
tags | encryption
SHA-256 | ad0864754164583d95ac00987d9c627906d260de717418847417680dae2fed53
Posted Jun 4, 2002
Authored by thc | Site thc.org

THC-Shagg is a modular application to bruteforce check digit algorithms. It is able to analyze the used algorithm, its weights and its partitions of a set of serial numbers, e.g. credit card numbers, social id numbers, and calling card numbers. After analysis new serial numbers can be generated from the saved results.

SHA-256 | bfd76ef8ac462ae19d1f7c9bc217599c41e7e1c5e79ab40188774f683a901e4c
Posted Jun 4, 2002
Authored by thc, Doc Holiday | Site thc.org

The NetUserChangePassword function in Windows NT 4 enables an attacker to change the password of any user under special/default circumstances.

systems | windows
SHA-256 | 94faf138aef331f98dc6f9d7d0bc78b7ff08fa0c2127791fe549ae03bb16ef2c
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

Reverse-WWW-Tunnel-Backdoor v2.0 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.

Changes: Now has full HTTP v1.0 compliance.
systems | linux, solaris, openbsd, aix
SHA-256 | 012239d21cbf76e09bca91cb3f7c23c5960360129f2f512bc096f55b74fb111a
THC Secure Deletion v2.3
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Secure Deletion v2.3 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: Bug fixes.
systems | unix
SHA-256 | 1d5629b0f83a0352b0d2654208ad38a2aee6ce78c9f94f8d2b044b5316b164b7
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.1 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security.

tags | spoof
SHA-256 | b610d3a1f5525d3b5f3fa41e2d3efb3cfcea5af963e3f4aee759732839b7bf90
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.3 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Rewrote the GPS data gathering function. Fixed lots of bugs!
systems | linux
SHA-256 | 9810f45f7b163d85d8aaf5092726d2e26ba29ee6171d07999e36a2d771651a0f
Posted Jun 4, 2002
Authored by thc | Site thc.org

THC-Hydra is a parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, PCNFS, and more). Also included Socks5 and SSL support.

tags | web, cracker, imap
SHA-256 | 5fb2a998138aac2a9286b5f1f4bd416ed6dbd511b5f8992250ee75aaeb99cef4
Posted Jun 4, 2002
Authored by Jonas Blowfish | Site digital-root.com

NewAtlanta ServletExec ISAPI 4.1 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | ce0b25b8a3ff31cf7999f19d45feb3e11deedb4281f0765cd5121dc39ab565e1
Posted Jun 4, 2002
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 900 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: More CVE cross references, added more vulnerability checks, and fixed bugs.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 01eb6ac7c6d1a11f95bebae3894dd27e58923657e16151cc23b1e94ab99952d8
Posted Jun 4, 2002
Site airsnort.shmoo.com

Airsnort is a tool for wireless lans which recovers encryption keys by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Works on both 40 and 128 bit encryption. Many weaknesses in the WEP 802.11 protocol are discussed here. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second. Tested on Linux kernel v2.4.

Changes: Now uses libpcap. Supports more cards. Now can read pcap dump files. Cracking is attempted in parallel with capture. There is no need to guess whether you have enough packets to obtain a successful crack.
tags | tool, kernel, protocol, wireless
systems | linux
SHA-256 | c160899ad2fea72220eef69caf57c0c628ff39b25989e584765fe06d8586550c
Posted Jun 4, 2002
Authored by Luigi Grandini | Site sefin.it

PHP v4.1.1 and 4.0.4 remote exploits ported to windows w/ Cygwin.

tags | exploit, remote, php
systems | windows
SHA-256 | 942c5fa91ba14ca93d5c955bf672b5655abe52da4288041878569f0ac0d44788
Posted Jun 4, 2002
Authored by Cult

This exploit hangs WiredRed e/pop v2.0.3, probably works on all 2.x versions. Ported to Windows w/ Cygwin.

tags | exploit
systems | windows
SHA-256 | b888ff0b10bd0e61f49601ca8df8a50dd62484cc687f644e99ca6b9d20341fd0
Posted Jun 4, 2002
Authored by Pir8 | Site dtors.net

Local backdoor - Secure root shell, protected by standard DES encryption.

tags | tool, shell, local, root, rootkit
systems | unix
SHA-256 | 31505319837ac9a5d95fa12d23585c1d6824d1619c5849dbabeaf9f9ee81bb69
Posted Jun 4, 2002
Authored by Pir8 | Site dtors.net

False.c is a local/remote backdoor for Linux.

tags | tool, remote, local, rootkit
systems | linux, unix
SHA-256 | 1258fc1afb8d05496afbb0ac6750abcae3d1f81d9148516aa2e5bdb83bce46ca
Posted Jun 4, 2002
Authored by Pedram Amini | Site pedram.redhive.com

Dnshijacker v1.2 is a libnet/libpcap based packet sniffer & dns spoofer. A versatile tool, dnshijacker supports tcpdump style filters that allow you to specifically target victims. Dns answers are forged based on entries in a "fabrication table" or by simply forging one answer to all requests. A print only mode is also supported, allowing one to simply monitor dns traffic. Archived prank: alex on slashdot. Requires libnet and libpcap.

Changes: Fixed freebsd bugs and now dynamically allocates memory.
systems | unix
SHA-256 | 98a5bf780f9e88276cb7aa18e20a49c331bdb12ed9ebf60bea2a425b8b7f9e9d
Posted Jun 4, 2002
Authored by SS4

+++ATH0 pinger, written in VB. Includes source + Ping API calls library.

tags | denial of service
SHA-256 | 894315484b456cb1c01980bd03ccea7e89bf6bd4cd5d2fcd5c0d5633abde749c
Posted Jun 4, 2002
Authored by Phrail | Site divisi0n7.org

IBM x86 Informix SE-7.25 sqlexec local root exploit in perl. Overflows the INFORMIXDIR environment variable passed to the sqlexec binary.

tags | exploit, overflow, x86, local, root, perl, sql injection
SHA-256 | ab9dd888595f3f4dfef65f529c62b9a6c0caa60712655bf6613fde2bb4847e93
Posted Jun 4, 2002
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.2.21.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | d61bf6e3dbf719b509f1f7f95548c9046c1ea67c123e9d83a01d182c414a25d0
Posted Jun 4, 2002
Authored by Dianne Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.11 / 8.12's "milter" API and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Sophie virus-scanning daemon support added, per user filter customization, and more fixes.
systems | windows, unix
SHA-256 | a1f4b76c7d11fd65cc7ff7eb62149b3acbcabcbe564107f3053b7651bb5d3d79
Posted Jun 4, 2002
Site sendmail.org

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: Bug fixes, documentation updates, more secure permissions on database files.
systems | unix
SHA-256 | 95824bba177f8376aa4892d5c54b979cf252b9968ce3f784b909fa6b2697c35f
Posted Jun 4, 2002
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 50d76bb1d256115c3608d023a3612e1fe33812323feba4e14f8d474d8bc0dc69
Posted Jun 4, 2002
Site debian.org

Debian Security Advisory DSA-130-1 - Ethereal versions prior to v0.9.3 are vulnerable to an allocation error in the ASN.1 parser allowing remote root exploits. This affected GNU/Linux 2.2 and fixed packages have been released for the alpha, arm, i386, m68k, powerpc and sparc architectures.

tags | remote, root
systems | linux, debian
SHA-256 | 6047e9c58a21975a17a86279a3933dce99d34759cf75423e74a5af261768ac6b
Posted Jun 4, 2002
Authored by Zillion | Site safemode.org

Mnews v1.22 remote FreeBSD buffer overflow exploit. Included shellcode prints a message to stdout.

tags | exploit, remote, overflow, shellcode
systems | freebsd
SHA-256 | 01ef7c9e912a48e3c415c9f36a6240e9e0a115bf00bebc74b5585b7817ddb949
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    15 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By