exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2002-09-12

Posted Sep 12, 2002
Authored by NTFX | Site soldierx.com

Efstool local root exploit. A condition has been found in efstool which is shipped with Redhat and Slackware linux (and possibly other distributions) which, given the right environment, root privileges can be gained. Full research provided.

tags | exploit, local, root
systems | linux, redhat, slackware
MD5 | 044dc4da250fc55be975c7fb9c557d87
Posted Sep 12, 2002
Authored by Contem@efnet

Pud is a peer-to-peer ddos client/server which does not rely on hubs or leafs to function properly. It can connect as many nodes together as you like, and if one node dies, the rest will always stay up).

tags | denial of service
MD5 | 4d79894c14735a1408d6ad18c1aa66b6
Posted Sep 12, 2002
Authored by Noam Rathaus | Site SecuriTeam.com

Outlook Express allows users to bypass many SMTP content protection programs by enabling the 'message fragmentation and re-assembly' feature. Vulnerable filters include GFI, Symantec, Trend Micro, and more.

tags | bypass
MD5 | 2cbfa2f69227bc119f56d01cb031fa42
Posted Sep 12, 2002
Authored by Ryba

Patch for dsniff-2.3 that allows you to record gadu-gadu messages, a popular communicator in Poland.

Changes: Local and remote users' IP addresses can be shown, added switch -p for disabling promiscuous mode (useful on routers), added support for extension in new GG protocol. Other small bugfixes and improvements were made.
tags | patch
systems | unix
MD5 | 346436959f8326ab489ecf61618b5180
Posted Sep 12, 2002
Authored by embyte | Site sourceforge.net

Gspoof is a GTK+ program written in C which makes easy and accurate the building and the sending of TCP packets with or without a data payload. It's possible to modify TCP/IP fields or the Ethernet header.

tags | tcp
systems | unix
MD5 | 7624ac465d83f8a6a4c259acaa33dbe2
Posted Sep 12, 2002
Authored by Gabriel Menezes Nunes

The N(etbios) E(numerating) S(ecurity) S(weep) is a batch file which scans a subnet checking for smb shares and attempts to login as administrator with a null password. Runs under win2k or xp and logs 4 seperate types of info.

systems | windows
MD5 | ab758d24dc8cfb631a1cd6aff462385c
Posted Sep 12, 2002
Authored by Max Moser | Site remote-exploit.org

CDPsniffer is a small perl Cisco discovery protocol (CDP) decoding sniffer. It sniffs the network traffic, picks out the CDP packets and prints out the decoded protocol contents.

tags | tool, perl, sniffer, protocol
systems | cisco
MD5 | a8abba264e411904c953c9b4593c91da
Posted Sep 12, 2002
Authored by NTFX | Site legion2000.security.nu

Remote / Local buffer overflow for Savant Web Server 3.1 and below, as described in Foundstone advisory 091002-SVWS. Crashes the daemon, no patch is available as of the 11th of Sept, 02.

tags | exploit, remote, web, overflow, local
MD5 | 727c37f6b87d09e49e5738313b20ce83
Posted Sep 12, 2002
Authored by Joe Grand | Site consilium-iii.com

Pdd (Palm dd) is a Windows-based tool for for memory imaging and forensic acquisition of data from the Palm OS family of PDAs. Pdd will preserve the crime scene by obtaining a bit-for-bit image or "snapshot" of the Palm device's memory contents. Such data can be used by forensic investigators and incident response teams.

tags | tool, forensics
systems | windows
MD5 | b30f324666ac942cbd889ea4c359721e
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

Mac-robber is a forensics and incident response program that collects Modified, Access, and Change (MAC) times from files. Its output can be used as input to the 'mactime' tool in The @stake Sleuth Kit (TASK) to make a time line of file activity. mac-robber is similar to running the 'grave-robber' tool from The Coroner's Toolkit with the '-m' flag, except this is written in C and not Perl.

tags | tool, perl, forensics
MD5 | 4fa05cf85dd0d28c2780b6151b74f9f0
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

The Autopsy Forensic Browser is an HTML-based graphical interface to The here.

tags | tool, forensics
MD5 | b8472f8fcb4edbe66cb79a13363f5d92
Posted Sep 12, 2002
Authored by Brian Carrier | Site atstake.com

The @stake Sleuth Kit (TASK) is an open source forensic toolkit for a complete analysis of Microsoft and UNIX file systems. TASK enables investigators to identify and recover evidence from images acquired during incident response or from live systems. Features the ability to analyze images generated by the 'dd' utility, Supports the NTFS, FAT, FFS, and EXT2FS file systems, 14 command line tools that allow the user to control what data is processed and presented, identify deleted files by name and location, and create time lines of file activity to identify files and directories to analyze.

tags | tool
systems | unix
MD5 | f21e123e9dc5b3634d0e974cff61fc93
Posted Sep 12, 2002
Authored by Fkt | Site prosum.sourceforge.net

ProSum is a console based program that protects your files, sys_call_table and IDT in a manor similar to tripwire (All in user space, without kernel modules). In addition, database with files etc. could be encrypted with Blowfish algorithm and files that are protected could be store at any secure/bastion host to later replace them. ProSum could be run on any UNIX system, at least with file protect mode (without IDT and sys_call_table support).

tags | tool, kernel, intrusion detection
systems | unix
MD5 | c1b76d2566d99e47f62152a0465e73c7
Page 1 of 1

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By