what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2002-09-04

smbkillah.c
Posted Sep 4, 2002
Authored by b0uNtYkI113r

Smbkillah.c exploits the SMB death bug in the WinXX OS.

tags | exploit
SHA-256 | 640d132863cb7924714e5d0d18c4f4e4b06760e757e8cadfb996390bb417dabb
l2es.tgz
Posted Sep 4, 2002
Authored by Mimayin

L2ES is the Legion 2000 Encryption System. It uses CAST-256 encryption, automatically recognizes l2es-encrypted files, and includes Linux, FreeBSD and Windows binaries along with C source.

tags | encryption
systems | linux, windows, freebsd
SHA-256 | e7ebb379df878eec5305fdc57655628af847bd5017640cacb0ab48b94145dba5
cynux-portscanner.pl
Posted Sep 4, 2002
Authored by Eric de Maar

Cynux-Portscanner v1.1 is a simple and compact port scanner written in Perl which simply checks for open ports between 1-1024.

tags | tool, scanner, perl
systems | unix
SHA-256 | 3db9fbc1fa1c3f57d2b22fbb26e2466bdcc997115f1ecbace20afaec51df80f6
mssql-sp_MSSetServerProperties.txt
Posted Sep 4, 2002
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Security Research Advisory NISR03092002 - The sp_MSSetServerProperties stored procedure in Microsoft SQL Server 2000 contains a low risk issue which allows remote users to decide whether or not SQL server starts up automatically. This does not allow an attacker to com promise the server or data but may be used in conjunction with another attack.

tags | remote
SHA-256 | 2d8b8761c587c92d162bdf1ffcb36e42ec190e63cc9a5e3406c3b2a332cc6519
dotnet-msde.txt
Posted Sep 4, 2002
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Security Research Advisory NISR03092002B - The Microsoft Windows .NET Server Release Candidate contains a buffer overflow in name resolution which allows an attacker without a userID or password to take control of the server with a single packet to UDP port 1434 on the machine running MSDE. Fix available here.

tags | overflow, udp
systems | windows
SHA-256 | 9db34630d664597a8cf29192735e45564c2d9e401bac5a6b0d4ed6fab67a82c6
mssql-udp.txt
Posted Sep 4, 2002
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Security Research Advisory NISR25072002 - Microsoft's database server SQL Server 2000 exhibits two buffer overrun vulnerabilities that can be exploited by a remote attacker without ever having to authenticate to the server. What further exacerbates these issues is that the attack is channeled over UDP port 1434. Whether the SQL Server process runs in the security context of a domain user or the local SYSTEM account, successful exploitation of these security holes will mean a total compromise of the target server and its data.

tags | remote, overflow, local, udp, vulnerability
SHA-256 | 7374876a71fb3fcb12a28e6f8cfb96087512b03f0bc58422af03eaa003fa9944
lcrzoex-4.14-src.tgz
Posted Sep 4, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Errors in virtual clients were corrected and 2 bugs in the spoofing functions got fixed.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | f0e7cc26d441199ad794d4e742c860d052eabd6f5bbb89e7d52e964b65c90a15
scrollkeeper.txt
Posted Sep 4, 2002
Authored by Spybreak

A vulnerability exists in the insecure creation of files in /tmp by Scrollkeeper versions 0.3.4 and 0.3.11. Proof of concept exploit included.

tags | exploit, proof of concept
SHA-256 | e0688a37a550e78e95f81f75c0a1a5d103aec32f940e904a1754d99dccb816fc
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close