what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2002-07-17

SPIKEv2.4.tar.gz
Posted Jul 17, 2002
Authored by Dave Aitel | Site immunitysec.com

SPIKE is an attempt to write an easy to use generic protocol API that helps reverse engineer new and unknown network protocols. It features several working examples. Includes a web server NTLM Authentication brute forcer and example code that parses web applications and DCE-RPC (MSRPC).

Changes: Added GUI, and scripting language support. Examples included. Screenshot available here.
tags | web, protocol
systems | unix
SHA-256 | e055b1879513702841a95c003e9606a987f0497b30ff9ffd6517017a36ef0fe0
Atstake Security Advisory 02-07-15.1
Posted Jul 17, 2002
Authored by Atstake, Ollie Whitehouse | Site atstake.com

Atstake Advisory A071502-1 - Norton Personal Internet Firewall 2001 v3.0.4.91 for Windows NT and 2000 contains buffer overflows in the HTTP proxy which allows attackers to overwrite the first 3 bytes of the EDI register, which can lead to remote code execution.

tags | remote, web, overflow, code execution
systems | windows
SHA-256 | b638be2b6c12ee1233b0973e42fb9455d457e7c5b99317fa57810587b7da13b0
lcrzoex-4.12-src.tgz
Posted Jul 17, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Some bugs were fixed.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | b79af779312f215978148a5acb6a9cfe2ff951688ede3ce11905407756d1d81e
thp-0.4.3-1.tar.gz
Posted Jul 17, 2002
Authored by George Bakos | Site alpinista.dyndns.org

Tiny Honeypot (thp) is a simple honey pot program based on iptables redirects, an xinetd listener, and perl. It listens on every TCP port not currently in use, logging all activity and providing some feedback to the attacker. The responders, written in Perl, provide just enough interaction to fool most automated attack tools, as well as quite a few humans, at least for a little while.

Changes: Now has session timeouts, simple HTTP emulation, a PID on the capture log start line (to allow correlation with xinetd logging), and xinetd per-source limits by default.
tags | perl, tcp
systems | unix
SHA-256 | 74d2f02c24eabc0a1841d95b79c6c97ec4ef9ae62c8434413778524f4b15ed95
ltelnet.c
Posted Jul 17, 2002
Authored by Nicola Piazzolla

Ltelnet is a simple linux telnet client written in c.

systems | linux, unix
SHA-256 | e3f894f887b86e05fae960ee2296814fc7e81273c4836b04f82423ee9d96b2cb
motion-3.0.4.tar.gz
Posted Jul 17, 2002
Authored by Jeroen Vreeken | Site motion.technolust.cx

Motion uses a video4linux device for detecting movement. It makes snapshots of the movement which later will be converted to MPEG movies, making it useful as an observation or security system. It can send out email and SMS messages when detecting motion and includes a web interface.

Changes: New stable release - The netcam code uses tmpfiles instead of pipes. MPEG files are opened with append to prevent overwriting time lapse videos.
tags | web
systems | linux
SHA-256 | 383de518a2de728696267c7446c8957dc0dd2da79f1ca095bcac378f6f179aca
darkstat-2.0.tar.gz
Posted Jul 17, 2002
Site members.optushome.com.au

Darkstat is an ntop-workalike network statistics gatherer. Built to be faster and smaller than ntop, it uses libpcap to capture network traffic and serves up Web page reports of statistics such as data transferred by host, port, and protocol. It also has a neat bandwidth usage graph.

Changes: Accounting and DB code rewritten, man page updated, sniffed http requests can be logged.
tags | tool, web, sniffer, protocol
SHA-256 | d799e4755b193f3dcee0d046b1b4f70abacad26b4a7b32f5ca7082f560be580b
elfrip.c
Posted Jul 17, 2002
Authored by netric, PoWeR PoRK | Site netric.org

Elfrip is a tiny cat-like utility for ripping the code section out of a nasm generated elf image.

systems | unix
SHA-256 | d04491b975521b75ef0b591b237c4372cec5f1be775b96ff57fb534aa0a5189f
cdump.c
Posted Jul 17, 2002
Authored by netric, PoWeR PoRK | Site netric.org

Simple pipe driven utility for creating c-style char decs from binary input. Can be of use for embedding shellcode etc in c sourcefiles.

tags | shellcode
systems | unix
SHA-256 | 4a6f029c31af9c526bea153a129ac74524a75df0ffb07a45e880902c7f0e3df0
chrooted.tar.gz
Posted Jul 17, 2002
Authored by netric, Atje | Site netric.org

BSD chrooted user shell scripts.

tags | shell
systems | unix, bsd
SHA-256 | 43313c3a23fcf8951f2941733be00dfe54f56ed678bfc65984b319d755b836c0
Cyclops-1.2-Stand.zip
Posted Jul 17, 2002
Authored by Felipe Moniz | Site nstalker.com

Cyclops 1.2 is a Log Auditing Tool for Web Servers. Cyclops looks for patterns in the log files that suggest an intruder is attacking. The log file formats supported are Apache, Common Log Format, Microsoft IIS, NCSA, PWS and Sambar Server. Tested on Windows 95, 98, ME, NT, 2000 or XP.

tags | web
systems | windows
SHA-256 | 1b8899d74ed4051cd79ea1f12c6ec812a5187f78ae79d992c375e513c8b9f9d5
oddsock.txt
Posted Jul 17, 2002
Authored by Lucas Lundgren | Site outpost24.com

Outpost24 Advisory - The Oddsock Playlist Generator v2.1 contains multiple buffer overflow vulnerabilities which result in a denial of service against the winamp/shoutcast service.

tags | denial of service, overflow, vulnerability
SHA-256 | 90c57c359b6bdbc11c79f220a2fbf14980057252f61933fa10f8406116cc4f9f
FreeBSD Security Advisory 2002.31
Posted Jul 17, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:31 - OpenSSH included with FreeBSD-CURRENT between 2002-03-18 and 2002-06-25 has a remote root vulnerability because ChallengeResponseAuthentication is turned on by default.

tags | remote, root
systems | freebsd
SHA-256 | 95c8eacb9873f2fd53d933945c9f51ac0fb845249ac900809ad7f1f99002a160
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close