exploit the possibilities
Showing 1 - 7 of 7 RSS Feed

Files Date: 2002-11-25

wan.txt
Posted Nov 25, 2002
Authored by wanvadder, flyguy | Site scan-associates.net

Combating reverse telnet using OpenBSD Packet Filter (pf) - This paper goes into detail on how to set up a firewall properly to disallow outbound traffic from reverse telnet attacks from compromised machines.

tags | paper
systems | openbsd
SHA-256 | b8b0f85c10f344cc6143603c25ef79a8379bb05a1625ef6cbb3755e44d03971c
SecurityIPTelephonyNetworks.pdf
Posted Nov 25, 2002
Authored by Ofir Arkin

IP Telephony based networks, which might be a core part of our Telephony infrastructure in the near future, introduce caveats and security concerns which traditional telephony based networks do not have to deal with, have long forgotten about, or have learned to cope with. The security risk is usually overshadowed by the technological hype and the way IP Telephony equipment manufacturers push the technology to the masses. This paper highlights the different security risk factors with IP Telephony based networks.

tags | paper
SHA-256 | 10fdc19e837a48d2132e421740f1be97f5a4b7f2e8d40525080b86f72461e49f
acFreeProxy.txt
Posted Nov 25, 2002
Authored by Matthew Murphy

acFreeProxy (aka "acfp") is an HTTP/1.x proxy for Microsoft Windows that generates error pages when unable to reach a destination host. The results of the error page do not have any input validation leaving it vulnerable to cross-site scripting attacks.

tags | web, xss
systems | windows
SHA-256 | b73cb37d7003a95b03e17334931602a4021c36c50e68d3f36d09ad572bddca2d
CAISRNP.bind
Posted Nov 25, 2002
Authored by Vagner Sacramento

The problem described on this advisory certifies BIND versions 4 and 8 do not prevent sending of two or more resolution requests for the same domain name allowing DNS Spoofing attacks with significant probability of success.

tags | spoof
SHA-256 | 1ff0291e103cffab6d704722eb3a1553d6877ea3f7896be778483fcaf7956ec1
Itadem30.ZIP
Posted Nov 25, 2002
Authored by Itadem

Itadem Trojan v3.0 is a small trojan controlled by a web browser. New features include bug fixes, server can be passworded, and html layout. Archive password is set to p4ssw0rd. Use at your own risk.

tags | web, trojan
SHA-256 | 5f57c327b784ac19ffee3dd1b85e14d9c139481d4145e666f173874e625d089e
anwrap.pl
Posted Nov 25, 2002
Authored by Ron Sweeney, Brian Barto

anwrap is a wrapper for ancontrol that serves as a dictionary attack tool against LEAP enabled Cisco Wireless Networks. It traverses a user list and password list attempting authentication and logging the results to a file.

systems | cisco
SHA-256 | 5b2c150321984726d6e8b0dce2701c05c125c16ac8cf177cc9d5351ee2046d15
SF-talkischeap.pl
Posted Nov 25, 2002
Authored by subversive | Site securityfreaks.com

Calisto Internet Talker Version 0.04 Remote Denial of Service exploit.

tags | exploit, remote, denial of service
SHA-256 | cfa90118496081e0fe751cc98451d2637dd51c25d130732436c1a6e645da95b7
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close