exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2002-09-24

gspoof-2.1.1.tar.gz
Posted Sep 24, 2002
Authored by embyte | Site sourceforge.net

Gspoof is a GTK+ program written in C which makes easy and accurate the building and the sending of TCP packets with or without a data payload. It's possible to modify TCP/IP fields or the Ethernet header.

tags | tcp
systems | unix
SHA-256 | a88d6431a66a7fb6a6ac88abf80c2b92daaac376cb378ea57a11fce08d0db8d9
last1.tgz
Posted Sep 24, 2002
Authored by K1net1c

The Balaur Rootkit v2.0 is a rootkit for Red Hat 6.1 which is a descendant of lrk5. Contains a ssh backdoor, login backdoor, cron backdoor, adore, top, syslogd, and more. Patches common vulnerabilities to keep out other attackers.

tags | tool, vulnerability, rootkit
systems | linux, redhat, unix
SHA-256 | 96dd1e43908212e0dc4ef397abb29aaff477566103061db23da2fb10ca26af26
rathole.c
Posted Sep 24, 2002
Authored by Incognito/PT

rathole 1.0 is a passworded backdoor for Linux and Openbsd.

tags | tool, rootkit
systems | linux, unix, openbsd
SHA-256 | 61c71101025e9fa373d3a4be37681fbecaa288f2a9639b91cc08aa5d5159c766
ip-fil3.4.29.tar.gz
Posted Sep 24, 2002
Authored by Darren Reed | Site coombs.anu.edu.au

IP Filter is a TCPIP packet filter which works well in a firewall environment. It can either be run as a loadable kernel module (recommended) or incorporated into your kernel. Scripts are provided to install and patch system files as required. IP Filter also includes several cool features, including transparent proxying via packet forwarding, allowing for round-robin forwarding to achieve load-balanced proxy.

Changes: Substantial changes made to the FTP proxy to improve reliability, security, and functionality. It doesn't send ICMP errors/TCP RSTs in response to blocked proxy packets and fixes memory leaks that could occur when unloading ipfilter from the kernel.
tags | tool, kernel, firewall
systems | unix
SHA-256 | bcfbf28bda5709dee28b8109bfcaf7870de705129019ab299660f9df501ffb25
qute.pl
Posted Sep 24, 2002
Authored by Arne Schwerdtfegger

Qute.pl is a perl script which exploits a buffer overflow in Qstat 2.5b. Since Qstat is not SUID by default this script is useless.

tags | exploit, overflow, perl
SHA-256 | e9f3bdc1f8a9d0bf7a7f036f80af23bc7c153c77c4f0d5f0a1ab127e999a6df2
JempiScodes-0.3r4.tgz
Posted Sep 24, 2002
Authored by Matias Sedalo | Site shellcode.com.ar

Polymorphic Shellcode Generator - In Spanish. Tested on Linux, FreeBSD, OpenBSD, and NetBSD.

tags | shellcode
systems | linux, netbsd, freebsd, openbsd
SHA-256 | 46ce94f9fbeb6d2cb6eb3a0bc0f9286d1de99a8e6cdca6fd3dadcad1f3e35908
firewall.steno.txt
Posted Sep 24, 2002
Authored by Lee Bowyer | Site networkpenetration.com

Bypassing firewalls through protocol stenography - You can often bypass firewalls by using trojans that send commands over port 80.

tags | paper, trojan, protocol
SHA-256 | f685fd1b46ed2b24b119f2bd1cb2183c29efd76645c61dc4ade029b9bf0c8d4d
prelude-manager-0.8.6.tar.gz
Posted Sep 24, 2002
Site prelude.sourceforge.net

Prelude Manager is the main program of the Prelude Hybrid IDS suite. It is able to register local or remote sensors, let the operator configure them remotely, receive alerts, and store alerts in a database or any format supported by reporting plugins, thus providing centralized logging and analysis.

Changes: Fixed a communication problem on Linux kernel 2.2.x due to the non-standards-compliant poll().
tags | tool, remote, local, intrusion detection
systems | unix
SHA-256 | afd65b77468f5d7bb132b9dfa83a9e49b9e73418d9e3371265b7fbfbfbb80d69
rc.walloffire-v0.1BETA.txt
Posted Sep 24, 2002
Authored by netric | Site netric.org

Netric Firewall Package - iptables release. This tool enables administrators to easily implement a solid firewall for iptables.

SHA-256 | 778c4cb9283f25febd472ac8a8118e5c4e02184aff15bd4e66752a4a5c7f29ec
idefense.dinoweb.txt
Posted Sep 24, 2002
Authored by David Endler | Site idefense.com

iDEFENSE Security Advisory 09.23.2002 - A vulnerability exists in the latest version of the Dino Webserver that can allow an attacker to view and retrieve any file on the system.

tags | exploit
SHA-256 | 173624a149e99e3fffdbb7f4f8d15aad56be0b1f6a78706b17e41d2dd0e718e6
wireless_scan.txt
Posted Sep 24, 2002
Authored by Danny | Site ebcvg.com

Wireless Scanning / Wardriving / Warchalking - A paper defining how an intruder would identify a suitable open network to launch their attack. It depicts what common methods are used and how to protect against such attacks.

tags | tool, wireless
SHA-256 | 20663ca82283ad1b02d1d80c6f0a723d921fa0e8b6172332e8bc51e0150081a6
openbsdacl.html
Posted Sep 24, 2002
Authored by Andi | Site segfault.net

OpenBSD Network ACLs for i386 - This paper discusses how to utilize a kernel patch to create local ACLs to restrict local users from using network services. It allows an administrator to deny network access for a user by restricting bind() and connect() to allowed accounts.

tags | paper, kernel, local
systems | openbsd
SHA-256 | 4049a210d3c28f826d0429cbdcfedc0ee92e89e21c90faa4675b99e21d18a311
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close