Exploit the possiblities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2002-09-12

Posted Sep 12, 2002
Authored by NTFX | Site soldierx.com

Efstool local root exploit. A condition has been found in efstool which is shipped with Redhat and Slackware linux (and possibly other distributions) which, given the right environment, root privileges can be gained. Full research provided.

tags | exploit, local, root
systems | linux, redhat, slackware
MD5 | 044dc4da250fc55be975c7fb9c557d87
Posted Sep 12, 2002
Authored by Contem@efnet

Pud is a peer-to-peer ddos client/server which does not rely on hubs or leafs to function properly. It can connect as many nodes together as you like, and if one node dies, the rest will always stay up).

tags | denial of service
MD5 | 4d79894c14735a1408d6ad18c1aa66b6
Posted Sep 12, 2002
Authored by Noam Rathaus | Site SecuriTeam.com

Outlook Express allows users to bypass many SMTP content protection programs by enabling the 'message fragmentation and re-assembly' feature. Vulnerable filters include GFI, Symantec, Trend Micro, and more.

tags | bypass
MD5 | 2cbfa2f69227bc119f56d01cb031fa42
Posted Sep 12, 2002
Authored by Ryba

Patch for dsniff-2.3 that allows you to record gadu-gadu messages, a popular communicator in Poland.

Changes: Local and remote users' IP addresses can be shown, added switch -p for disabling promiscuous mode (useful on routers), added support for extension in new GG protocol. Other small bugfixes and improvements were made.
tags | patch
systems | unix
MD5 | 346436959f8326ab489ecf61618b5180
Posted Sep 12, 2002
Authored by embyte | Site sourceforge.net

Gspoof is a GTK+ program written in C which makes easy and accurate the building and the sending of TCP packets with or without a data payload. It's possible to modify TCP/IP fields or the Ethernet header.

tags | tcp
systems | unix
MD5 | 7624ac465d83f8a6a4c259acaa33dbe2
Posted Sep 12, 2002
Authored by Gabriel Menezes Nunes

The N(etbios) E(numerating) S(ecurity) S(weep) is a batch file which scans a subnet checking for smb shares and attempts to login as administrator with a null password. Runs under win2k or xp and logs 4 seperate types of info.

systems | windows
MD5 | ab758d24dc8cfb631a1cd6aff462385c
Posted Sep 12, 2002
Authored by Max Moser | Site remote-exploit.org

CDPsniffer is a small perl Cisco discovery protocol (CDP) decoding sniffer. It sniffs the network traffic, picks out the CDP packets and prints out the decoded protocol contents.

tags | tool, perl, sniffer, protocol
systems | cisco
MD5 | a8abba264e411904c953c9b4593c91da
Posted Sep 12, 2002
Authored by NTFX | Site legion2000.security.nu

Remote / Local buffer overflow for Savant Web Server 3.1 and below, as described in Foundstone advisory 091002-SVWS. Crashes the daemon, no patch is available as of the 11th of Sept, 02.

tags | exploit, remote, web, overflow, local
MD5 | 727c37f6b87d09e49e5738313b20ce83
Posted Sep 12, 2002
Authored by Joe Grand | Site consilium-iii.com

Pdd (Palm dd) is a Windows-based tool for for memory imaging and forensic acquisition of data from the Palm OS family of PDAs. Pdd will preserve the crime scene by obtaining a bit-for-bit image or "snapshot" of the Palm device's memory contents. Such data can be used by forensic investigators and incident response teams.

tags | tool, forensics
systems | windows
MD5 | b30f324666ac942cbd889ea4c359721e
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

Mac-robber is a forensics and incident response program that collects Modified, Access, and Change (MAC) times from files. Its output can be used as input to the 'mactime' tool in The @stake Sleuth Kit (TASK) to make a time line of file activity. mac-robber is similar to running the 'grave-robber' tool from The Coroner's Toolkit with the '-m' flag, except this is written in C and not Perl.

tags | tool, perl, forensics
MD5 | 4fa05cf85dd0d28c2780b6151b74f9f0
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

The Autopsy Forensic Browser is an HTML-based graphical interface to The here.

tags | tool, forensics
MD5 | b8472f8fcb4edbe66cb79a13363f5d92
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

The @stake Sleuth Kit (TASK) is an open source forensic toolkit for a complete analysis of Microsoft and UNIX file systems. TASK enables investigators to identify and recover evidence from images acquired during incident response or from live systems. Features the ability to analyze images generated by the 'dd' utility, Supports the NTFS, FAT, FFS, and EXT2FS file systems, 14 command line tools that allow the user to control what data is processed and presented, identify deleted files by name and location, and create time lines of file activity to identify files and directories to analyze.

tags | tool
systems | unix
MD5 | f21e123e9dc5b3634d0e974cff61fc93
Posted Sep 12, 2002
Authored by Fkt | Site prosum.sourceforge.net

ProSum is a console based program that protects your files, sys_call_table and IDT in a manor similar to tripwire (All in user space, without kernel modules). In addition, database with files etc. could be encrypted with Blowfish algorithm and files that are protected could be store at any secure/bastion host to later replace them. ProSum could be run on any UNIX system, at least with file protect mode (without IDT and sys_call_table support).

tags | tool, kernel, intrusion detection
systems | unix
MD5 | c1b76d2566d99e47f62152a0465e73c7
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

March 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    14 Files
  • 2
    Mar 2nd
    12 Files
  • 3
    Mar 3rd
    1 Files
  • 4
    Mar 4th
    3 Files
  • 5
    Mar 5th
    15 Files
  • 6
    Mar 6th
    23 Files
  • 7
    Mar 7th
    15 Files
  • 8
    Mar 8th
    15 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    2 Files
  • 11
    Mar 11th
    1 Files
  • 12
    Mar 12th
    16 Files
  • 13
    Mar 13th
    20 Files
  • 14
    Mar 14th
    14 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    15 Files
  • 17
    Mar 17th
    5 Files
  • 18
    Mar 18th
    2 Files
  • 19
    Mar 19th
    7 Files
  • 20
    Mar 20th
    15 Files
  • 21
    Mar 21st
    19 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By