exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2002-07-10

Posted Jul 10, 2002
Authored by Maarten Van Horenbeeck

Security Hardening of Windows 2000 and NT Server Machines - Contains a roundup of good security practices, hardening, ways that windows-boxes are penetrated, and a roundup of some useful tools. Written in 2001.

tags | paper
systems | windows
SHA-256 | e9aaaa0f410f24e9705089083e684c2cd647519dbc5bd929756fc5b6a20e511f
Posted Jul 10, 2002
Authored by Peter Grundl | Site kpmg.dk

The Bea Weblogic server v5.1.x - 7.0 on on Windows 2000 and NT s vulnerable to a data/connection flooding vulnerability that will result in the web service crashing with a report of an error in NTDLL.DLL.

tags | web
systems | windows
SHA-256 | dd160476ade9f37a3ffeb6de0034fa4f92660fc33d0466f882498e45e0c25e92
Posted Jul 10, 2002
Authored by electronicsouls, Burn-X, 0x90 | Site es.xor.ru

Local buffer overflow exploit for KDE's artsd v2.x and 3.x.

tags | exploit, overflow, local
SHA-256 | c4ee9b2be56eb009a8530167e522b3e52eb220e1569d1a0b77a0f7358526114c
Posted Jul 10, 2002

Knetfilter is a KDE gui application designed to manage the netfilter functionalities that will come with the new kernel 2.4.x. In Principal, all standard firewall system administration activities can be done just using knetfilter. But there is not just a GUI to iptables command line, it is possible also some monitoring via a tcpdump interface.

Changes: Bug fixes and Updates!
tags | tool, kernel, firewall
systems | linux
SHA-256 | b223580a1a846b8ff2a7864e4dc43c5817b3916acb77f9f5b80a64286b19ccec
Posted Jul 10, 2002
Authored by Jeroen Vreeken | Site motion.technolust.cx

Motion uses a video4linux device for detecting movement. It makes snapshots of the movement which later will be converted to MPEG movies, making it useful as an observation or security system. It can send out email and SMS messages when detecting motion and includes a web interface.

Changes: New stable release - bugs were fixed.
tags | web
systems | linux
SHA-256 | e66517b4096938fc41e87ef4160b525f2bb08ba7db7590987df880d1481c3fdc
Posted Jul 10, 2002
Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.

Changes: Added database entries to detect file openings and static character array definitions. The HTML output format has been significantly improved. Flawfinder now (by default) skips symbolic links, and always skips special files, to counter attackers who insert malicious files in their source code directories.
systems | unix
SHA-256 | 33af6d807eeaf4c0964d716cad49f30d00e8e5d85d8ba934522f8049e0cd42e9
Posted Jul 10, 2002
Site gabriel.bigdam.net

X Net Strength is a small utility for monitoring the wireless signal strength of 802.11b cards under Linux. It is written in C and only requires xlib.

tags | tool, wireless
systems | linux
SHA-256 | 93121ff4c722db8739800a554b373ae991dfe5eca022c028f2b4ec4c16441051
Posted Jul 10, 2002
Authored by Simon Edwards | Site simonzone.com

GuardDog is a firewall configuration utility for KDE on Linux. GuardDog is aimed at two groups of users - novice to intermediate users who are not experts in TCP/IP networking and security, and those users who don't want the hassle of dealing with cryptic shell scripts and ipchains parameters. Features an easy to use goal oriented GUI and the ability to generate ipchains scripts as output. Screenshot here.

Changes: Supports zones and many extra protocols, iptables, KDE3, rate limited logging, connection tracking, user defined protocols, the import and export of scripts, DHCP support, and router configuration. Bugs were fixed.
tags | tool, shell, tcp, firewall
systems | linux
SHA-256 | 66b6bd5f11545111bd09aabb69389f0086fec4a6cfaf702ac3c29d5f3b589672
Posted Jul 10, 2002
Site ex-parrot.com

Driftnet is a program which sniffs network traffic and picks out images from TCP streams it observes. It is interesting to run it on a host which sees a lot of web traffic.

Changes: This release fixes problems with building in adjunct-only mode. There are performance enhancements.
tags | tool, web, sniffer, tcp
SHA-256 | dbdf7ead3ae14b109f88c86dedeb7524be8c257aa773a781891216f013373d6d
Posted Jul 10, 2002
Authored by David Litchfield | Site ngssoftware.com

Information on cracking the Microsoft SQL pwdencrypt() hash function which is used to generate SQL hashes.

tags | paper, sql injection
SHA-256 | 5c2b4319be1979dcbd27e7fd3420df3b66d393c7fcb09d4c8682d6c6694cd701
Posted Jul 10, 2002
Authored by Peter Grundl, Andreas Sandor | Site kpmg.dk

Watchguard Firebox Dynamic VPN Configuration Protocol Denial of Service - Malicious users can crash the Dynamic VPN Configuration Protocol service (DVCP) by sending a malformed packet to the listener service on TCP port 4110. Watchguard Firebox firmware v5.x.x is vulnerable.

tags | denial of service, tcp, protocol
SHA-256 | f7fefdb893755ef161385dc353bea35abe34c677710fe9ef1b8f81eb0e3212b7
Posted Jul 10, 2002
Authored by David Litchfield | Site ngssoftware.com

The Sun iPlanet Web Server iWS 4.1 and 6.0 contains a remotely exploitable buffer overflow if the search feature is enabled.

tags | web, overflow
SHA-256 | 569fc6dbae95b454b1cb7139d2f9325513c3521f10923c0642d0afb59f288e67
Page 1 of 1

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    14 Files
  • 7
    Dec 7th
    24 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By