exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2002-07-04

Posted Jul 4, 2002
Authored by Gollum | Site digit-labs.org

Digit-Labs Security Advisory DLA-25-06-2002 - Microsoft Internet Information Server 5.0 Administration Web Site redirect proof of concept exploit.

tags | exploit, web, proof of concept
MD5 | c38f830b059323d85d83d5c54f9b6354
Posted Jul 4, 2002
Site sourceforge.net

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

Changes: Fixed the iptables and sendmail parsing routines. Some Solaris compatibility changes were made. An arpwatch filter was added.
tags | tool, intrusion detection
systems | unix
MD5 | c559a05283e575531845b44f8787bf2d
Posted Jul 4, 2002
Authored by Ighighi

Miscutils is a set of commands useful to the program and/or system administrator. Current included programs are: acct, confstr, getrlimit, pathconf, sysconf, crypt, gettimeofday, readlink and stat.

systems | unix
MD5 | 32d7a137e0f81950c28f24d3c053c402
Posted Jul 4, 2002
Authored by Ighighi

Logdump is a set of commands that dump the contents of the standard Unix log files: utmp, wtmp, utmpx, wtmpx, lastlog & acct. With logdump you may discover zapped/patched log entries; something you cannot do with who(1) and last(1).

Changes: compilation on SunOS 5.8 now works well.
tags | system logging
systems | unix
MD5 | 1e8fb7f35e83013a73e59a3309648b34
Posted Jul 4, 2002
Authored by Craig Smith | Site AcademicUnderground.org

The Examiner is a tool to analyze foreign binary executables. The goal of is to be able to get output similar to strace without executing the binary in question. Uses the objdump command to disassemble and comment binaries. This tool was designed for forensic purposes but could be used for basic reverse-engineering goals as well.

systems | linux
MD5 | b54af6041cacbbdea2ecb0ed95bce2b1
Posted Jul 4, 2002
Authored by Team N.finity | Site nfinity.yoll.net

Argosoft Mail Server v1.8.1.5 Plus/Pro Webmail reverse directory traversal exploit which allows an attacker to retrieve any file on the disk readable by the mail server. The freeware edition of Argosoft Mail Server is not vulnerable. Fix available here.

tags | exploit
MD5 | 69ad0d9d9a31fcdbf4bd62ccbd76ccf2
Posted Jul 4, 2002
Site dimlight.org

Linux Security Auditing Tool (LSAT) is a post install security auditing tool. It is modular in design, so new features can be added quickly. It checks inetd entries and looks for unneeded RPM packages. It is being expanded to work with Linux distributions other than Red Hat, and checks for kernel versions.

Changes: Some basic sshd config checks were added. Buffer checks were added.
tags | kernel
systems | linux, redhat
MD5 | 4274ed9d157c9d477d44473c493d9151
Posted Jul 4, 2002
Authored by NTSleuth | Site ntsleuth.0catch.com

NetBIOS Enumeration Utility v3.0 is a utility for Windows which can be used to enumerate NetBIOS information from one host or a range of hosts. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, shares, and more. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP.

Changes: Enhanced HTML reporting, bugs fixed. Added new enumeration routines, better HTML reporting, and support for IP input files.
tags | local
systems | windows, nt
MD5 | 7716101ce83a03b2481741dd61a062aa
Posted Jul 4, 2002
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Security Advisory - Microsoft's Commerce Server 2000 and 2002 contains several remotely exploitable buffer overruns in the Profile Service and a CGI executable that allows the execution of arbitrary commands.

tags | overflow, arbitrary, cgi
MD5 | 44252a3c77872ed189c0f3b2f71e8049
Posted Jul 4, 2002
Authored by Richard van den Berg | Site trust-factory.com

SunPCi II v2.3 comes with a modified VNC which allows an attacker to discover the password if he can sniff the traffic between client and server. Decoding program tested on Linux and Solaris.

tags | exploit
systems | linux, solaris
MD5 | 04f239e954d52792e6cb6b953794d8bf
Page 1 of 1

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By