accept no compromises
Showing 1 - 25 of 146 RSS Feed

Files Date: 2002-12-01 to 2002-12-31

kismet-2.8.0a.tar.gz
Posted Dec 30, 2002
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data. Full changelog here.

Changes: Bug fix release to solve problems with the channel hopper with certain combinations of multiple sources, and to fix the issues with the Zaurus default config and monitor scripts.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
MD5 | 860689485be84f872b1700d6742a04f4
ipac-ng-1.25.tar.gz
Posted Dec 30, 2002
Authored by Al Zaharov | Site sourceforge.net

IP Accounter is an IP accounting package for Linux. It collects, summarizes, and nicely displays IP accounting data. Its output can be a simple ASCII table, or graph images. Ipchains and iptables are supported. Logs are stored in files, gdbm, or even a PostgreSQL database.

Changes: Compile problems with gcc 3.2 were solved. Runfile parsing with ipchains and other bugs were fixed.
systems | linux
MD5 | a02c3d802a9e89e303c8391c265b7012
dsinet-sa-02-01.txt
Posted Dec 30, 2002
Authored by Casper Aleva | Site dsinet.org

DSINet Security Advisory DSINET-SA-02-01 - Web-CyrAdm v0.5.2 and below contains a remote denial of service vulnerability.

tags | exploit, remote, web, denial of service
MD5 | 9e05f4bff7b36055b12b943053e7f744
efs_local.c
Posted Dec 30, 2002
Authored by N. Kursu

Efs_local.c is a stack based local root buffer overflow exploit for Linux/x86. Tested against Gentoo Linux 1.4-rc1, RedHat Linux 8.0, and Slackware Linux 8.0 and 8.1.

tags | exploit, overflow, x86, local, root
systems | linux, redhat, slackware, gentoo
MD5 | f29042b9530123b03028e704e90234b6
Firewall Builder With GUI
Posted Dec 29, 2002
Site fwbuilder.org

Firewall Builder consists of object-oriented GUI and set of policy compilers for various firewall platforms. In Firewall Builder, firewall policy is a set of rules, each rule consists of abstract objects which represent real network objects and services (hosts, routers, firewalls, networks, protocols). Firewall Builder helps user maintain database of objects and allows policy editing using simple drag-and-drop operations. Firewall Builder can be used to manage firewalls built on variety of platforms including, but not limited to, Linux running iptables and FreeBSD or Solaris running ipfilter.

tags | tool, firewall, protocol
systems | linux, solaris, freebsd
MD5 | 9f889dd8219415ee4acef34651b3ad7f
mixmaster-2.9.0.tar.gz
Posted Dec 29, 2002
Site sourceforge.net

Mixmaster is an anonymous remailer which provides protection against traffic analysis and allow sending electronic mail anonymously or pseudonymously. It is every unix using citizens civic duty to run a remailer and help ward off the evil forces of censorship. It is a well known fact that running a remailer will make you automatically cool.

Changes: Doc and packaging changes.
systems | unix
MD5 | c10d1f7c35177748d947aab64143494a
incident-2.4.tar.gz
Posted Dec 29, 2002
Site cse.fau.edu

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: Incident entries reported from WHOIS servers such as RIPE now take priority over other email addresses listed in the same WHOIS output.
tags | tool, remote, sniffer
MD5 | 392c44d76299cc35cbe36e1c05ae1ce7
WifiScanner-0.8.0.tar.gz
Posted Dec 29, 2002
Site wifiscanner.sourceforge.net

WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.

Changes: Adds an IDS module, an option to not display some types of packets (-N), reorganization of .h and .c for optimization, an option to not count INVLD packets (-M), better use of configure.in, and bug fixes. Screenshot available here.
tags | tool, wireless
systems | linux
MD5 | 77642158b452b271d92421a9c2d8fd30
sfx_exploit.c
Posted Dec 29, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

Local proof of concept for non-setuid binary /bin/sfxload which overflows the $HOME environment variable. Tested on Red Hat 7.0 and 7.2. Other setuid programs may call this binary, leading to privilege escalation.

tags | exploit, overflow, local, proof of concept
systems | linux, redhat
MD5 | 386bbe466f4dc4f6b60932f86f505f57
fp-2.4.20.patch.gz
Posted Dec 29, 2002
Site vanheusden.com

The Linux-kernel security patch for kernel v2.4.20 includes security improvements that implement random PIDs, random port numbers for IPv4, NAT, and IPv6, and enhanced random numbers for networking. Patch for kernel 2.4.19 is also available.

tags | kernel, patch
systems | linux, unix
MD5 | b48e2c548650b8e4d6bea098fb4d5ab9
amap-1.2.1.tgz
Posted Dec 29, 2002
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: More application fingerprints, less bugs and SSL support!
tags | tool, protocol
MD5 | c84cdd211628573fc516575829629896
shutdown_Cups.c
Posted Dec 29, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

Cups-1.1.17 and below remote denial of service exploit. Tested against Red Hat Linux 7.0 and 7.3.

tags | exploit, remote, denial of service
systems | linux, redhat
MD5 | 33fa36c03919bbd5f1ee1380d2894ad8
wmap1.3.tar.gz
Posted Dec 29, 2002
Authored by Efrain Torres | Site pwp.007mundo.com

Wmap v1.3 is a cgi scanner that attempts to be smarter than most. To increase the chance of finding useful stuff, wmap has a file containing interesting Directories (dirs.db) and other file containing common cgi dirs (dircgis.db) to search for. If a directory is found is added to the test. This include all the directories that are found in the html tags. For each directory found, not only scans for vulnerable CGI's (cgis.db) it scan for interesting files (ex. passwords.tmp) included in the file (file.db) and does an http PUT scan.

Changes: Many bug fixes.
tags | web, cgi
systems | unix
MD5 | c6ea4d3cb5c9499182cb736b26942b2c
IP-putty.c
Posted Dec 29, 2002
Authored by Rand, Dani | Site iproyectos.com

Putty v0.52 and below remote exploit which is a fake ssh server to exploit connecting putty clients. Downloads and executes an attacker supplied URL. Tested on linux and Cygwin against putty 0.52 running on WinXP and Win2000.

tags | exploit, remote
systems | linux, windows, 2k
MD5 | 88a62418d110db66cf4e541618555d63
cst1_4.tar.gz
Posted Dec 29, 2002
Authored by Toxic Ocean | Site blackhat.be

CST is a java based web scanner that scans using a database of scripts (user editable). The sample databases included contains +1600 possibly vulnerable scripts/dirs. You can scan with or without a proxy server. The scanner has 11 different Anti-IDS tactics and sends fake "X-Forwarded-For:", "Referer:" and "User-Agent:" headers to hide your scan even more. You can also specify a wait time between 2 script fetches. The scanner uses HEAD requests instead of GET for faster scanning, and has support for scanning virtual hosts. You can also specify another port to scan instead of the standard port 80. The scanner outputs the scripts/dirs that return a 200, 403 or 401 HTTP code and outputs the webserver software. A full and comprehensive manual is included.

tags | java, web, cgi
systems | unix
MD5 | dd65552d1d225d11a0cddb0db3755a27
phrack60.tar.gz
Posted Dec 28, 2002
Authored by phrack | Site phrack.org

Phrack Magazine Issue 60 - In this issue: Tool Armory, Smashing the kernel stack for fun and profit, Burning the bridge - Cisco IOS exploits, Static kernel patching, Big loop integer protection, Basic integer overflows, SMB/CIFS by The Root, Firewall spotting with broken CRC, Low cost and portable GPS jammer, Traffic lights, Phrack Loopback, and Linenoise.

tags | overflow, kernel, root, magazine
systems | cisco
MD5 | 4c872d2cdb9b5b0f9c9f78a12fcc139f
kismet-2.8.0.tar.gz
Posted Dec 27, 2002
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data. Full changelog here.

Changes: Now supports multiple capture sources, multiple servers, Revamped client/server protocol, Packet processing speed boosts, Runtime WEP decoding, WSP100 Remote Sensor capture support, Cygwin support, Improved Turbocell/Karlnet dissection, Netmask range options for allowed clients, Client logging in XML, and dozens of bugfixes.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
MD5 | 93ed933e2370183e3a23280b96256362
stunnel-4.03.tar.gz
Posted Dec 27, 2002
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.

Changes: NT Services work again, memory leaks fixed.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
MD5 | 79dddf4174f3c2f7a83202bd8c9c6794
hap-linux-2.2.23-1.diff.gz
Posted Dec 27, 2002
Authored by Hank Leininger | Site TheAIMSGroup.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: This release has been synchronized with kernel 2.2.23 and Openwall 2.2.23-ow1.
tags | root, patch
systems | linux, unix
MD5 | 7d540037dc6995679bbd8eb50a3f1a95
Nmap Scanning Utility 3.10 ALPHA 9
Posted Dec 27, 2002
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Newest alpha - Reworked the "ping scan" algorithm (used for most scans) to be more robust in the face of low-bandwidth and congested connections. Ping types are no longer exclusive -- you can now do combinations such as "-PS22,53,80 -PT113 -PN -PE" in order to increase your odds of passing through strict filters. Applied patch that allows multiple TCP probe ports in raw (root) mode.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | c36f6246e39a636a572f34bd386237b2
efshit.c
Posted Dec 27, 2002
Authored by Hi_Tech_Assassin | Site t3chware.net

Efshit is an exploit for the efstool vulnerability. Unlike other exploits for this vulnerability, Efshit is robust, has a wide range of attack options, incorporates brute forcing, and actually works.

tags | exploit
MD5 | c86684fda6ee684ff958d8fa296443cf
lookout.c
Posted Dec 27, 2002
Authored by Intrusive

Lookout.c watches utmp and executes a specified command when a certain user logs in.

systems | unix
MD5 | 535083fb838da9dff24705706dcee32c
html-trap.procmail.gz
Posted Dec 25, 2002
Authored by John Hardin

Email Security through Procmail 1.137 - Email Security through Procmail attempts to address the trend towards "enhancing" email clients with support for active content, which exposes end-users to many and varied threats, by "sanitizing" email: removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.

Changes: A bug in filename shortening that broke older Perl versions has been fixed. MIME mangling has been changed away from TEXT/PLAIN, as some mailers perform text-related operations on that MIME type, corrupting the attachments.
tags | worm, trojan
systems | unix
MD5 | 6b79032a2a556401269d9db7b382d79c
visnetic.dos.txt
Posted Dec 25, 2002
Authored by Peter Kruse | Site krusesecurity.dk

The VisNetic WebSite Server for Windows v3.5.13.1 and below contains a remote denial of service vulnerability which can be exploited by sending a 5000 character URL.

tags | advisory, remote, denial of service
systems | windows
MD5 | 0274e3ebdebc3d9917880a3ffc311edb
ftp.client.traversal.txt
Posted Dec 25, 2002
Authored by Steven M. Christey

FTP clients, including those that may be embedded in web clients, can be vulnerable to certain directory traversal attacks by modified FTP servers. If successful, the attacks could allow the server to overwrite or create arbitrary files outside of the client's working directory, subject to file/directory permissions and the privilege level of the client. Vulnerable clients include wget-1.8.1, OpenBSD 3.0 ftp, and Solaris 2.7 and 2.7 ftp.

tags | advisory, web, arbitrary
systems | solaris, openbsd
MD5 | 2d918118248dae7cbdde13a75490adac
Page 1 of 6
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close