exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2002-11-02

shroud-1.30.tgz
Posted Nov 2, 2002
Authored by phish

Shroud is a log wiper that wipes and edits utmp, wtmp, lastlog and plaintext logs. It ensures that it keeps proper permissions and access, creation, and modify file times on the log files. It also makes use of Van Hauser's srm to delete old log files.

tags | tool, rootkit
systems | unix
SHA-256 | 80ca2636b174e0841277e9bfeea1edf0077ad7f6d1065ed534d63b87ccc206ee
sneaky-sneaky-1.12.tar.gz
Posted Nov 2, 2002
Authored by phish

Sneaky-sneaky is a bidirectional spoofed ICMP tunnel backdoor that has built-in encryption and logging capabilities. It communicates via echo replies keeping the true source IP address encrypted inside of the payload.

tags | tool, spoof, rootkit
systems | unix
SHA-256 | 7995080d8ef82352cec03420727e8d2eb5a74d0dc5ada7ad5b48d89fcf6aa397
lagsa-com21.txt
Posted Nov 2, 2002
Authored by David | Site lag.securinet.qc.ca

Lag Security Advisory - Com21 cable modem configuration file feeding vulnerability. All Com21 DOXport 1110 cable modems with software version 2.1.1.106 are vulnerable to being fed a configuration file that will allow a user to have access to features that are not paid for by spoofing an ISP-side TFTP server to feed the data.

tags | advisory, spoof
SHA-256 | 21174a7ece399423e3136d1c78ecc11cf864756b62fe48d179e2436176fa3641
anti-anti-dbg.c
Posted Nov 2, 2002
Authored by Slacko

anti-anti-debug is a Linux kernel module that is used to stop the technique currently implemented into closed source Linux binaries that disallow or restrict debugging and tracing with tools like gdb and strace.

tags | kernel
systems | linux
SHA-256 | aeca12c39a86982dc39a6c75f1547017d9e4b6274450bd8692153ad954b3dabd
idefense.abuse.txt
Posted Nov 2, 2002
Authored by David Endler | Site idefense.com

iDEFENSE Security Advisory 11.01.02 - Abuse is a popular side-scrolling video game that has a locally exploitable parsing error in the -net command line option allowing an attackers to gain root privileges.

tags | advisory, root
SHA-256 | b221fec3e71a23d7a3b9bd708f91010df4c7db23390ea1a2908cf7f76dfeb888
netscreen25.txt
Posted Nov 2, 2002
Authored by H D Moore

Netscreen VPN solutions ship with an SSH daemon that is vulnerable to the SSH1 CRC32 bug. In the default configuration, SSH is not enabled on their devices and when enabled, it is expected that any CRC32 exploits used to attack said device will cause a crash and require a reboot. Original bug discovered by Michal Zalewski.

tags | advisory
SHA-256 | c9b6c7dfaef3625ad4d061880ee7f533627566f9c4dd4145fd54b9341ca31096
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close