exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2002-09-30

openssl-bsd.c
Posted Sep 30, 2002

Apache + OpenSSL v0.9.6d and below exploit for FreeBSD. Tested on FreeBSD 4.4-STABLE, FreeBSD 4.4-RELEASE, FreeBSD 4.5-RELEASE, and FreeBSD 4.6-RELEASE-p1 with Apache-1.3.26 and Apache-1.3.19. Modified to brute force the offset from openssl-too-open.c. Updated by Ech0, and ysbadaddn.

tags | exploit
systems | freebsd
SHA-256 | d22209dfa296d626007b88527d9af34b681b9169c571f3e5c5859d8428447224
logrep-1.1.2.zip
Posted Sep 30, 2002
Site logrep.sourceforge.net

Logrep is a framework for extraction and presentation of information from several kinds of logfiles. Currently Snort, Squid, Postfix, Apache, Trend Micro VirusWall, and Microsoft IIS are supported. Includes HTML reports, 2D analysis, overview page, secure communication, and bar charts.

Changes: New module was added for Apache weblogs (W3C httpd Common Logfile format). Some bugs were fixed.
tags | system logging
systems | unix
SHA-256 | 735ec960984c399de513f0bbc1fb7aada014033e5a7c0f47e11f5c988d9b0d0f
GNU Privacy Guard
Posted Sep 30, 2002
Site gnupg.org

The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440.

Changes: New stable release which features better interoperability with non-conforming OpenPGP implementations and improved keyserver support. There are now various ways to restrict the ability GnuPG has to execute external programs. Full change log available here.
tags | encryption
SHA-256 | ec17b509b3bd340b49ac1b0607da204d0b9eebf460d9813543e906493ec8828e
apscan2.tgz
Posted Sep 30, 2002
Authored by Nebunu

Apache OpenSSL v0.9.6d mass scanner. When a vulnerable server is found code is launched. Includes targets for Apache 1.3.6, 1.3.9, 1.3.12, 1.3.19, 1.3.20, 1.3.26, 1.3.23, and 1.3.14. Includes openssl-too-open binary.

tags | exploit
SHA-256 | aa1467984afb050f4cdbdb18e5960709046b1acf4e899c587a3bb5f32f81af72
nslconf.c
Posted Sep 30, 2002
Authored by RaiSe | Site netsearch-ezine.com

Linuxconf v1.28r3 and below local exploit which uses the ptrace method to find the offset. Tested on Mandrake 8.0 and 8.2, and Redhat 7.2 and 7.3.

tags | exploit, local
systems | linux, redhat, mandrake
SHA-256 | 7c69399dd7f5a08de186e149072b4b0ffad0e4adecf6598bc7fb8d45d8cc6354
sugarplum-0.9.8.tar.gz
Posted Sep 30, 2002
Authored by Devin Carraway | Site devin.com

Sugarplum is an automated spam-poisoner which feeds large quantities of realistic and enticing but otherwise utterly useless data to wandering spam-bots such as EmailSiphon, Cherry Picker, etc. The intention is to so contaminate spammers' databases as to require culling out large portions, including any real data, and/or to require that spambots be instructed to avoid your site. Sugarplum detects so-called "stealth" spambots, and can be used to activate firewalling or more aggressive countermeasures at the administrator's option. It includes Apache mod_rewrite rules for known spambots.

Changes: Major revision of Sugarplum reflecting changes in spammer address harvesting tactics and other changes made over the last two years. Configuration is now external and GDBM-compiled dictionaries are no longer required. The default configuration has been made more conservative. This release features improved performance and half the code size of the previous revision.
systems | unix
SHA-256 | 124b845692b43efa809384e363163cdd16890b144351bdfc5e5bd84e64b2ea20
ethereal-0.9.7.tar.gz
Posted Sep 30, 2002
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

tags | tool, sniffer, protocol
systems | unix
SHA-256 | c36b6f33fcd4a4f326ec192d78c9f0260d01e5d739e790a7473222ddcbbe15e9
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close