exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 27 RSS Feed

Files Date: 2002-10-22

autopsy-1.62.tar.gz
Posted Oct 22, 2002
Authored by Brian Carrier | Site atstake.com

The Autopsy Forensic Browser is an HTML-based graphical interface to The here.

Changes: Bug fixes.
tags | tool, forensics
SHA-256 | cde4370054a7517eb875f440b96f74eecd787db70646c17b539c794decd11608
mssql-webtasks.txt
Posted Oct 22, 2002
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Security Advisory - Microsoft SQL Server 2000 and 7 allow attackers to gain control of the database by elevating their privileges by using the xp_runwebtask stored procedure. Fix available here.

SHA-256 | 0993da5c8ab7c5ff24d06d11c71e7c6166e5eef4f669d081f8f47da07b21ae30
anhttpd141c_exploit.java
Posted Oct 22, 2002
Authored by Kanatoko | Site jumperz.net

AN HTTPD v1.30 to 1.41c remote heap overflow exploit written in java for Japanese Windows 2000 Pro (SP2).

tags | exploit, java, remote, overflow
systems | windows
SHA-256 | 167ce9e82779b5e084ff82fd83009543c8acb427e75433946e1e8bb76aabd037
nocc.xss.txt
Posted Oct 22, 2002
Authored by Ulf Harnhammar

Nocc v0.9.5 contains cross site scripting vulnerabilities which allow an attacker to take over a victim's e-mail account and/or perform actions against the victim's will, by simply sending a malicious e-mail message to the victim. Fix available at http://nocc.sourceforge.net.

tags | web, vulnerability, xss
SHA-256 | 9dc7f58e6a84de7afd3c2dc0c1c01e0a92637f30032701f1adde85a1090db208
pfdos.pl
Posted Oct 22, 2002
Authored by Securma Massine

PowerFTP v2.24 and below remote denial of service exploit in Perl.

tags | remote, denial of service, perl
SHA-256 | 6c35bcb40ba1d5bd9322642847860c17eb6c904541ae79689c51f4513a733837
sendmail-8-11-x.c
Posted Oct 22, 2002
Authored by sd@sf.cz

Sendmail 8.11.x linux/x86 local root exploit. Uses gdb to find offsets.

tags | exploit, x86, local, root
systems | linux
SHA-256 | 97fb231f9fda1d4ce349f63e8594a891166c284dcf5ab06cb3000406b26a36b9
unishell.pl
Posted Oct 22, 2002
Authored by Pakk

Unicode IIS exploit in perl. Tries 20 ways.

tags | exploit, perl
SHA-256 | 8662d0aab8bd41a11af165611d21686de5ca89f17b76ea0ca9ec002d6a6ccc07
r032b.zip
Posted Oct 22, 2002
Site home.zonnet.nl

Windows XP port scanner.

systems | windows
SHA-256 | 2765e98d0c660f9e26fe5790fef0fe45c40dc5cafb09fc4422ae1815a1232f59
web602dos.pl
Posted Oct 22, 2002
Authored by eip aka deadbeat aka AnGrY_SQl

Web602 webserver remote denial of service exploit which uses the com1 windows flaw.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | ab81b2d5aae5a6c0ecbe18c0c13997194365a98f277de5ce0d0fa049a1a34322
web602dir.pl
Posted Oct 22, 2002
Authored by eip aka deadbeat aka AnGrY_SQl

Web602 (Czech version) directory tree exploit.

tags | exploit
SHA-256 | 93003a050e2c15ef1e0f6c14a2e62b6ea615d4de687dec1239970cbb346096e7
HP-netris_DoS.c
Posted Oct 22, 2002
Authored by Artur Byszko

HP Netris v0.5 and below remote denial of service exploit.

tags | remote, denial of service
SHA-256 | 1511466d20ead8a76a69420ed7ccb8dcb916dcf1d94877d562d9820209800c33
crip.c
Posted Oct 22, 2002
Authored by PoWeR PoRK | Site netric.org

Crip.c is a utility for ripping out a c-declaration of binary data (like shellcode) and converting it to binary.

tags | shellcode
SHA-256 | a63c9f4d2960f672e07b9bbd29d3d87d4a43463fb6e89cd83c72d12adb1619b0
logwatch-4.1.tar.gz
Posted Oct 22, 2002
Site sourceforge.net

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

Changes: Fixed race conditions.
tags | tool, intrusion detection
systems | unix
SHA-256 | 0fd643ed6ce80f231d2e8aeb0282685d95a821baacdd2963e6c251e0fbff879d
ntal-0.2.2.tar.gz
Posted Oct 22, 2002
Authored by Marko Zivanovic | Site ntal.sourceforge.net

Network Traffic Analyzer (formerly known as sniffer) is designed to be an extremely powerful, configurable, and versatile tool for monitoring network traffic. It can be used as a plain sniffer, as a tool for accounting, dynamic firewall updates, and many more things. It features scripting support and an event-driven architecture.

tags | tool, sniffer
SHA-256 | 2a3912e05cf9a52bd3afea5f9a8013210a3db30e922d20a3b6b090d9f91ebebb
DansGuardian-2.4.6-5.source.tar.gz
Posted Oct 22, 2002
Site dansguardian.org

DansGuardian is a web content filter which currently runs on Linux, FreeBSD, OpenBSD and Solaris. It filters the actual content of pages based on many methods including phrase matching, PICS filtering and URL filtering. It does not purely filter based on a banned list of sites like lesser totally commercial filters. DansGuardian is designed to be completely flexible and allows you to tailor the filtering to your exact needs. It can be as Draconian or as un-obstructive as you want.

tags | web
systems | linux, solaris, freebsd, openbsd
SHA-256 | f0003cc7c44bf053003f746583a595dcc3b843748cdbf0bb8475ed89a538c8f3
rpcap-devel-0.23.tar.gz
Posted Oct 22, 2002
Site rpcap.sourceforge.net

RPCAP is a Remote Packet Capture system. It enables you to run a packet capture program (the server) on a target computer, which will sniff the network traffic on that system, and uplink the captured packets to another host (the client), where the captured packets can be processed, analyzed and archived . The rpcap system thus consists of two separate processes, the server (or agent) which captures network traffic on a remote system, and a client, which receives and processes these packets. The server code is a standalone executable program which uses the libpcap packet capture library to capture network traffic. The client is a library called librpcap, which is linked to a user program and used on the client system in a manner identical to libpcap, to receive and process the captured packets.

tags | remote, library
SHA-256 | bc9423ceb9e73e1b4bc2ddfd8483ebc0f006bcb4ad31602eda4b13475b5a0596
rtdump-1.0.tar.gz
Posted Oct 22, 2002
Site rpcap.sourceforge.net

Rtdump is a version of tcpdump modified to capture traffic on remote systems and networks. It links to librpcap rather than libpcap. Apart from the additional requirements introduced by the remote capture paradigm, rtdump is identical to tcpdump in command syntax and use.

tags | tool, remote, sniffer
SHA-256 | 7612b9f2f2c55b9865bc449622ea8614fc7b42d351530ccf677791dbbb7157c3
logrep-1.2.4.tar.gz
Posted Oct 22, 2002
Site logrep.sourceforge.net

Logrep is a framework for extraction and presentation of information from several kinds of logfiles. Currently Snort, Squid, Postfix, Apache, Trend Micro VirusWall, and Microsoft IIS are supported. Includes HTML reports, 2D analysis, overview page, secure communication, and bar charts.

Changes: Bug fixes.
tags | system logging
systems | unix
SHA-256 | 4e765d1e6b2f97a48521f2ccb109118602a06e59be467aef7b1378894b4a9136
packit-0.4.1.tgz
Posted Oct 22, 2002
Site packit.sourceforge.net

Packit offers the ability to monitor, manipulate and inject IPv4 (and soon IPv6) traffic (TCP/UDP/ICMP) on and into your network. This can be valuable in testing firewalls, intrusion detection systems and in general TCP/IP auditing. At the comment Packit can be run using one of two modes. packet capture, and IPv4 packet injection. Packit is dependent on libnet 1.1.0+ and libpcap and has been tested with numerous FreeBSD and Linux kernels.

Changes: Bug fixes, updates.
tags | kernel, udp, tcp
systems | linux, unix, freebsd
SHA-256 | ea2fcd0a0b3d8168358f5503f81d46ced5a6bc48fc9a0b78f88d32b2481ab3de
patch-2.4.19-fnk11.patch.gz
Posted Oct 22, 2002
Authored by Paul Drain | Site cipherfunk.org

The cipherfunk Patched Linux Kernels provide patch sets that focus on security enhancements, optimizations, and bugfixes to the current stable Linux Kernel. They are suitable for workstation or high-end server use in both production and development environments.

Changes: Merged the IDE layer from the -ac tree and added Andre Hedrick's Serial ATA changes, FreeS/WAN updated to 1.98b plus X.509 interoperability, AES and NULL cipher and NAT implementation patches, grsecurity has been updated to 1.97c, and the NTFS backport has been upgraded to 2.1.0a with partial write support.
tags | kernel, patch
systems | linux, unix
SHA-256 | 5ef0770b74439a0e0d70f94a607274936cd7648e93aca444311a9c43428e871b
Bastille-2.0.1.tar.bz2
Posted Oct 22, 2002
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here..

Changes: Bug fixes and updates. New stable release supports HP-UX and RH 7.3.
systems | linux, redhat, unix, suse, debian, hpux, mandrake
SHA-256 | fb6d096a829d4241956085f69b5c3dde765b7ef522d6db5c5f2603f328ea2a3b
mrtg-2.9.25.tar.gz
Posted Oct 22, 2002
Authored by Tobias Oetiker | Site people.ee.ethz.ch

The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing graphical images which provide a LIVE visual representation of this traffic. Check http://www.ee.ethz.ch/stats/mrtg for an example. MRTG is based on Perl and C and works under UNIX and Windows NT.

Changes: Bug fixes.
tags | tool, web, perl
systems | windows, unix
SHA-256 | 789694b170187543e100c18ad5cd223ff4f9c46d2e0e955ffdf50fa259145563
kismet-2.6.2.tar.gz
Posted Oct 22, 2002
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data. Full changelog here.

Changes: Bugfixes and minor feature enhancements from the -devel tree. This is just a maintenance release.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | 4267968d657ec3c48333621ddfa6f1f203183b082cf08fbcd73101d2575cd1a3
stunnel-4.02.tar.gz
Posted Oct 22, 2002
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.

Changes: Please upgrade and fix vulnerabilities in OpenSSL-0.9.6d and below that are exploitable.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | 3f292c6513d671f71f3fb635363a9f819662fc4c0989be4dc1e6ba7edbc7e14e
comp_trojans.txt
Posted Oct 22, 2002
Site frame4.com

The Complete Trojans Text. Contents:What Is a Trojan Horse,Trojans Today,The Future Of Trojans,Anti-virus Scanners,How You Can Get Infected -From ICQ,From IRC,From attachment,From Physical Access,From Trick,How Dangerous a trojan can be,Different Kinds Of Trojans,Remote Access Trojans,Password Sending Trojans, Keyloggers,Destructive Trojans,FTP Trojans,Who can Infect you?What is the attacker looking for?How trojans work?The Most COmmon Trojan Ports,Anti-trojans software -Log Monitor,PrcView,XNetStatm,AtGuard,Conseal PC Firewall,LockDown2000,TDS. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan, virus
SHA-256 | 60fb960c3356495ffadf73b60d770925f0d93995f1b5f388d491cf90d94b4dc5
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close