accept no compromises
Showing 1 - 25 of 557 RSS Feed

Files Date: 2002-11-01 to 2002-11-30

4553-invader-2.1.1.tar.gz
Posted Nov 27, 2002
Authored by electronicsouls, Brain Storm, Resistor | Site es.xor.ru

4553 - Invader v2.1.1 is source code which can append parasitic executable code to any ELF binary which causes it it to send a shell to a remote host. Uses TCP port 21317 by default.

tags | tool, remote, shell, tcp, rootkit
systems | unix
MD5 | e828fd8a619c206f18a7ae7ceb58344d
linux-2.2.22-ow2.tar.gz
Posted Nov 27, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Linux 2.2.22-ow2 improves the "lcall" DoS fix for the Linux kernel to cover the NT (Nested Task) flag attack discovered by Christopher Devine.
tags | overflow, kernel
systems | linux
MD5 | 2db63ab8503cd8a8df7b903e06c0cf0c
hudo.c
Posted Nov 27, 2002
Authored by Michel Kaempf

Linux exploit for versions of sudo 1.6.3p7 and below. Takes advantage of the Sudo prompt overflow in v1.5.7 to 1.6.5p2. Detailed exploitation instructions included.

tags | exploit, overflow
systems | linux
MD5 | 42847df931b3d90cce4fe4c5bac5f3ce
wan.txt
Posted Nov 25, 2002
Authored by wanvadder, flyguy | Site scan-associates.net

Combating reverse telnet using OpenBSD Packet Filter (pf) - This paper goes into detail on how to set up a firewall properly to disallow outbound traffic from reverse telnet attacks from compromised machines.

tags | paper
systems | openbsd
MD5 | a17fbb20af199726341779197070c7db
SecurityIPTelephonyNetworks.pdf
Posted Nov 25, 2002
Authored by Ofir Arkin

IP Telephony based networks, which might be a core part of our Telephony infrastructure in the near future, introduce caveats and security concerns which traditional telephony based networks do not have to deal with, have long forgotten about, or have learned to cope with. The security risk is usually overshadowed by the technological hype and the way IP Telephony equipment manufacturers push the technology to the masses. This paper highlights the different security risk factors with IP Telephony based networks.

tags | paper
MD5 | e013b1ffa4ad1861992a3a2038e98d7b
acFreeProxy.txt
Posted Nov 25, 2002
Authored by Matthew Murphy

acFreeProxy (aka "acfp") is an HTTP/1.x proxy for Microsoft Windows that generates error pages when unable to reach a destination host. The results of the error page do not have any input validation leaving it vulnerable to cross-site scripting attacks.

tags | web, xss
systems | windows
MD5 | f6736c54d2e17698278a650acf58f3f6
CAISRNP.bind
Posted Nov 25, 2002
Authored by Vagner Sacramento

The problem described on this advisory certifies BIND versions 4 and 8 do not prevent sending of two or more resolution requests for the same domain name allowing DNS Spoofing attacks with significant probability of success.

tags | spoof
MD5 | e82339ef919924eb06fd217624952955
Itadem30.ZIP
Posted Nov 25, 2002
Authored by Itadem

Itadem Trojan v3.0 is a small trojan controlled by a web browser. New features include bug fixes, server can be passworded, and html layout. Archive password is set to p4ssw0rd. Use at your own risk.

tags | web, trojan
MD5 | 11d544e921effc6a8919901969dc70a9
anwrap.pl
Posted Nov 25, 2002
Authored by Ron Sweeney, Brian Barto

anwrap is a wrapper for ancontrol that serves as a dictionary attack tool against LEAP enabled Cisco Wireless Networks. It traverses a user list and password list attempting authentication and logging the results to a file.

systems | cisco
MD5 | 93482aca62c5745ec9cf65ad1c4c462a
SF-talkischeap.pl
Posted Nov 25, 2002
Authored by subversive | Site securityfreaks.com

Calisto Internet Talker Version 0.04 Remote Denial of Service exploit.

tags | exploit, remote, denial of service
MD5 | 09acae77211b07f74c3142a55a4e2fac
realplayeroverrun.txt
Posted Nov 24, 2002
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR22112002 - Multiple Buffer Overruns in RealOne / RealPlayer / RealOne Enterprise. Three remotely exploitable overruns exist: two being heap based overflows and the other being a stack based overflow. On exploitation of these overruns any supplied code would execute in the security context of the logged on user.

tags | overflow
MD5 | 00e84849421fb90942857352005c1d1e
guardadv-03-2002-clearcaseDoS.txt
Posted Nov 24, 2002
Site guardeonic.com

Guardeonic Solutions Security Advisory #03-2002 - ClearCase 4.1 is susceptible to a remote denial of service. Performing two simple nmap scans against ClearCase, which listens on port 371, causes the daemon to die upon the second scan.

tags | remote, denial of service
MD5 | 900ca86a382b5d2a3870cdaddae11ac3
ms02-65
Posted Nov 24, 2002
Site microsoft.com

Microsoft Security Advisory - Buffer Overrun in Microsoft Data Access Components Could Lead to Code Execution. Both web servers and web clients are at risk from the vulnerability: Web servers are at risk if a vulnerable version of MDAC is installed and running on the server. To exploit the vulnerability against such a web server, an attacker would need to establish a connection with the server and then send a specially malformed HTTP request to it, that would have the effect of overrunning the buffer with the attacker's chosen data. The code would run in the security context of the IIS service (which, by default, runs in the LocalSystem context). Web clients are at risk in almost every case, as the RDS Data Stub is included with all current versions of Internet Explorer and there is no option to disable it. To exploit the vulnerability against a client, an attacker would need to host a web page that, when opened, would send an HTTP reply to the user's system and overrun the buffer with the attacker's chosen data. The web page could be hosted on a web site or sent directly to users as an HTML Mail. The code would run in the security context of the user.

tags | web, overflow, code execution
MD5 | c3a1c2ea24effd53e4df7b5d1f1fec07
zerooexploit.txt
Posted Nov 24, 2002
Authored by Matthew Murphy

Zeroo HTTPd server remote command execution exploit. Based on advisory by InetCop.

tags | exploit, remote
MD5 | 85ea5cabd6e20390b1eb75c32ad83e69
CA-2002-33.MDAC
Posted Nov 24, 2002
Site cert.org

CERT Advisory CA-2002-33 - Heap Overflow Vulnerability in Microsoft Data. A routine in the RDS component, specifically the RDS Data Stub function, contains an unchecked buffer. The RDS Data Stub function's purpose is to parse incoming HTTP requests and generate RDS commands. This unchecked buffer could be exploited to cause a heap overflow.

tags | web, overflow
MD5 | b5c22892f43bdc3b7483e26eba6523ce
CA-2002-32.alcatel
Posted Nov 24, 2002
Site cert.org

CERT Advisory CA-2002-32 - Backdoor in Alcatel OmniSwitch 7700 and 7800 AOS version 5.1.1. A telnet server listens on TCP port number 6778, a backdoor that was originally used during development to access the Wind River Vx-Works operating system. Due to an oversight, this access was not removed prior to product release.

tags | tcp
MD5 | bb91a5a0f11171433192ade8fc82b9cc
FS-112002-MDAC
Posted Nov 24, 2002
Site foundstone.com

Foundstone Research Labs Advisory - 112002 - MDAC : Microsoft Data Access Components (MDAC) is a collection of components that provide the back-end technology which enables database access for Windows platforms. One of the components within MDAC, Remote Data Services (RDS), enables controlled Internet access to remote data resources through Internet Information Services (IIS). Such access allows users to execute files including .dll and .exe extensions, thereby providing increased site functionality. In general RDS embodies two functional technologies: Data Space and Data Control. The technology exploited within MDAC utilizes the DataSpace object of RDS which acts as a middle layer between the local command execution and the web front end. Due to incorrect string handling within the RDS interface, it is possible for a malicious user to gain control of the remote system via over-running a buffer.

tags | remote, web, local
systems | windows
MD5 | cba0ad778b52dd0d49ce91b4594980b3
NetworkActivScannerV4.0.exe
Posted Nov 24, 2002
Authored by Mike J. Kowalski | Site networkactiv.com

NetworkActiv Scanner is a Fast, Easy to use, Advanced network scanner with many useful features. You can perform DNS dig, whois, and more. Main features are: TCP connect() scanning (standard TCP port scan), TCP SYN scanning (fast and "quiet" TCP port scan), Fast UDP port scanning with auto-speed control and reliable results, UDP sub-net scanning, High speed ping scanning of sub-nets (UDP or ICMP), TCP sub-net scanning, Integrated fast trace-route, Remote OS detection via advanced TCP/IP stack fingerprinting, Wizard Mode: Walks you through step-by-step to perform network scanning, trace-route, and much more. Whois Client: Ability to perform whois with ease, you can either specify a whois server, or have it attempt to determine a whois server automatically. DNS Dig system: Performs DNS dig quickly with ease, choose between TCP and UDP, specify a DNS server or have it attempt to determine the authoritative server automatically. Also, support for many RR's (Resource Records), Simple Port Scan Mode for easy and quick port scans, Nice looking interface, with multi-skin support, Tells you if remote computer being scanned is stealth, User set-able max speed (ranging from 2 PPS to non-limited), Tells you the host responses for TCP connect() port scan and sub-net scan, Tells you the port use from huge lists of ports as found, Random order, reverse order, and "Only Scan Known Ports" scan capable, and much more.

tags | remote, udp, tcp
MD5 | a62cf1b5fb71aa5fb8b239beba3babba
hydra-2.2.tar.gz
Posted Nov 24, 2002
Authored by thc | Site thc.org

THC-Hydra is a parallel login hacker. With this tool you are able to attack several services at once (Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, VNC, ICQ, Socks5, PCNFS, Cisco and more). Includes SSL support and can be used with Nessus. Bugfix release.

tags | web, imap
systems | cisco
MD5 | 05042c1add6155ea48233df05a1e37ae
mynetmon.zip
Posted Nov 20, 2002
Authored by Ekrem ORAL | Site trsecurity.net

myNetMon v2.0 is a Windows based network monitor and packet analyzing tool (sniffer) tool. Uses WinPcap. Freeware.

tags | tool, sniffer
systems | windows
MD5 | d3768bbc29de25410a995c778e90edd8
11.19.02c.txt
Posted Nov 20, 2002
Authored by Bennett Haselton | Site idefense.com

iDEFENSE Security Advisory 11.19.02c - Users of Netscape Communicator 4.x's web browser and e-mail client who can be tricked into clicking on a malicious link can return the contents of the targeted user's preferences file often including e-mail password and URL history back to a remote attacker who redefines user_pref(), a javascript function.

tags | advisory, remote, web, javascript
MD5 | 395e9cf673b9914f64dad12d34178c04
11.19.02b.txt
Posted Nov 20, 2002
Authored by Bennett Haselton | Site idefense.com

iDEFENSE Security Advisory 11.19.02b - Remote exploitation of a weakness in Eudora v5.2 and below allows for the retrieval of sensitive information from a targeted Eudora users computer. Attackers send an e-mail to a Eudora user that directs him to a specific URL; the e-mail also contains an HTML-enabled e-mail attachment that contains scripting code.

tags | advisory, remote
MD5 | bfe60240d292949b370be55a2a3d2261
11.19.02a.txt
Posted Nov 20, 2002
Authored by Alex S. Harasic | Site idefense.com

iDEFENSE Security Advisory 11.19.02a - Linksys Cable/DSL Routers models BEFW11S4, BEFSR11, BEFSR41 and BEFSRU31 can be crashed when several thousand characters are passed in the password field of the device's web management interface. Exploitation simply requires the use of a web browser that can send long Basic Authentication fields to the affected router's interface. Fix available here.

tags | advisory, web
MD5 | 6d9464f8c33b0e6a0c6614a5dbca1e47
sms.220.zlib
Posted Nov 20, 2002
Site sunsolve.sun.com

Sun Microsystems Advisory #220 - A double free bug in the zlib compression library allows the Java(TM) Runtime Environment to be crashed by remote users. SDK and JRE 1.4.0 and below on Windows and SDK and JRE 1.2.2_011 or earlier on Solaris, and SDK and JRE 1.4.0 on Linux is affected. Releases for JDK and JRE 1.1.x should no longer be used. This vulnerability does not affect the Java 2 SDK, Standard Edition, v 1.4.1 release.

tags | java, remote
systems | linux, windows, solaris
MD5 | 9f45b3718287883c25dac8748a5db660
latte-release-beta-0.1.zip
Posted Nov 20, 2002
Authored by C0w-d0g

Latte is a little unix backdoor which only allows one UID to use it.

tags | tool, rootkit
systems | unix
MD5 | 50b42878974dd58eece52e4941727f5a
Page 1 of 23
Back12345Next

File Archive:

September 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    5 Files
  • 2
    Sep 2nd
    5 Files
  • 3
    Sep 3rd
    3 Files
  • 4
    Sep 4th
    13 Files
  • 5
    Sep 5th
    16 Files
  • 6
    Sep 6th
    15 Files
  • 7
    Sep 7th
    20 Files
  • 8
    Sep 8th
    16 Files
  • 9
    Sep 9th
    4 Files
  • 10
    Sep 10th
    2 Files
  • 11
    Sep 11th
    15 Files
  • 12
    Sep 12th
    19 Files
  • 13
    Sep 13th
    20 Files
  • 14
    Sep 14th
    38 Files
  • 15
    Sep 15th
    31 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    7 Files
  • 18
    Sep 18th
    15 Files
  • 19
    Sep 19th
    40 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    14 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close