what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2002-11-25

wan.txt
Posted Nov 25, 2002
Authored by wanvadder, flyguy | Site scan-associates.net

Combating reverse telnet using OpenBSD Packet Filter (pf) - This paper goes into detail on how to set up a firewall properly to disallow outbound traffic from reverse telnet attacks from compromised machines.

tags | paper
systems | openbsd
SHA-256 | b8b0f85c10f344cc6143603c25ef79a8379bb05a1625ef6cbb3755e44d03971c
SecurityIPTelephonyNetworks.pdf
Posted Nov 25, 2002
Authored by Ofir Arkin

IP Telephony based networks, which might be a core part of our Telephony infrastructure in the near future, introduce caveats and security concerns which traditional telephony based networks do not have to deal with, have long forgotten about, or have learned to cope with. The security risk is usually overshadowed by the technological hype and the way IP Telephony equipment manufacturers push the technology to the masses. This paper highlights the different security risk factors with IP Telephony based networks.

tags | paper
SHA-256 | 10fdc19e837a48d2132e421740f1be97f5a4b7f2e8d40525080b86f72461e49f
acFreeProxy.txt
Posted Nov 25, 2002
Authored by Matthew Murphy

acFreeProxy (aka "acfp") is an HTTP/1.x proxy for Microsoft Windows that generates error pages when unable to reach a destination host. The results of the error page do not have any input validation leaving it vulnerable to cross-site scripting attacks.

tags | web, xss
systems | windows
SHA-256 | b73cb37d7003a95b03e17334931602a4021c36c50e68d3f36d09ad572bddca2d
CAISRNP.bind
Posted Nov 25, 2002
Authored by Vagner Sacramento

The problem described on this advisory certifies BIND versions 4 and 8 do not prevent sending of two or more resolution requests for the same domain name allowing DNS Spoofing attacks with significant probability of success.

tags | spoof
SHA-256 | 1ff0291e103cffab6d704722eb3a1553d6877ea3f7896be778483fcaf7956ec1
Itadem30.ZIP
Posted Nov 25, 2002
Authored by Itadem

Itadem Trojan v3.0 is a small trojan controlled by a web browser. New features include bug fixes, server can be passworded, and html layout. Archive password is set to p4ssw0rd. Use at your own risk.

tags | web, trojan
SHA-256 | 5f57c327b784ac19ffee3dd1b85e14d9c139481d4145e666f173874e625d089e
anwrap.pl
Posted Nov 25, 2002
Authored by Ron Sweeney, Brian Barto

anwrap is a wrapper for ancontrol that serves as a dictionary attack tool against LEAP enabled Cisco Wireless Networks. It traverses a user list and password list attempting authentication and logging the results to a file.

systems | cisco
SHA-256 | 5b2c150321984726d6e8b0dce2701c05c125c16ac8cf177cc9d5351ee2046d15
SF-talkischeap.pl
Posted Nov 25, 2002
Authored by subversive | Site securityfreaks.com

Calisto Internet Talker Version 0.04 Remote Denial of Service exploit.

tags | exploit, remote, denial of service
SHA-256 | cfa90118496081e0fe751cc98451d2637dd51c25d130732436c1a6e645da95b7
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close