what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2003-04-18

nessus-2.0.4.tar.gz
Posted Apr 18, 2003
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: Fixed the SIGCHLD handler which would leave zombies on the system, fixed a race condition when testing a great number of hosts which would cause a testing process to slow down a whole audit or even hang it totally, When a large number of host names is passed to nessusd as a target, they are resolved by chunks of 64 instead of trying to resolve everything before starting the test, and includes RedHat 9 support.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 8ef4e4953c3069a87bdcf639fae6f3c68322d76de42c723d2f50712db53b8946
0x82-Remote.54AAb4.xpl.c
Posted Apr 18, 2003
Authored by Xpl017Elz | Site x82.inetcop.org

FreeBSD and OpenBSD remote Samba v2.2.x call_trans2open i386 buffer overflow exploit. Tested against OpenBSD 3.0 and FreeBSD 4.6.2-RELEASE with Samba v2.2.x. Includes support for target brute forcing. Information about the vulnerability is available here.

tags | exploit, remote, overflow
systems | freebsd, openbsd
SHA-256 | f677c9d6fb78104c365cb38722fea0540f263fc2adf56d38ded0fbb35c2f2573
lkl-0.0.2.tar.gz
Posted Apr 18, 2003
Authored by Carlo Comin | Site spine-group.org

LKL is a userspace keylogger that runs under linux x86/arch. LKL logs everything which passes through the hardware keyboard port (0x60). Keycode to ASCII translation is supported.

tags | x86
systems | linux
SHA-256 | 679352f1e08ffc5cfe6292171c0f108c101f5a74762075a23257f7e477f502fe
CA-2003-13.snort
Posted Apr 18, 2003
Site cert.org

CERT Advisory CA-2003-13 - Two remote vulnerabilities in the Snort IDS, versions 1.8 through 2.0 RC allow remote execution of code as root. It is not necessary for the attacker to know the IP address of the Snort device they wish to attack; merely sending malicious traffic where it can be observed by an affected Snort sensor is sufficient to exploit these vulnerabilities. Fix available here.

tags | remote, root, vulnerability
SHA-256 | 5a3ec3a941e459dab6ee1434d872c4142fa7d76c874532b7b896c46b440d6bbe
Core Security Technologies Advisory 2003.0307
Posted Apr 18, 2003
Authored by Core Security Technologies | Site corest.com

CORE Security Advisory CORE-2003-0307 - A remotely exploitable heap overflow vulnerability has been found in the Snort stream4 preprocessor module which allows remote code execution if a snort sensor picks up an exploit packet. Vulnerable versions include Snort 2.0 versions prior to RC1, Snort 1.9.x, 1.8.x, and IDS's with snort embedded. Includes information on exploitation using hping.

tags | remote, overflow, code execution
SHA-256 | dfed14afc923672fedae803a8b7cc07e21bc0d52931be34ba0d08d9c33e81c92
Wellenreiter-v1.8.tar.gz
Posted Apr 18, 2003
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl wireless network discovery and auditing tool. its scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks and detects WEP capabilities and the manufacturer automatically. Dhcp and arp traffic will be decoded and displayed to give you further informations about the networks. A flexible sound event configuration lets it work in unattended. An ethereal / tcpdump-compatible dumpfile can be created. GPS is used to track the location of the discovered networks immediately. Automatic associating is possible with randomly generated MAC address. Wellenreiter runs also on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs). An unique Essod-bruteforcer is now included too. prism2, Lucent, and Cisco based cards are supported.

Changes: Complete new GUI. Statistics are removed now. Scanner window is now the main window and the control point for everything. New tree/click split window makes this the easiest to use wireless scanner. Auto detection engine has been added, so no card configurations are needed anymore. Wireless-scanning for dummies :-). Speedup in the packet decoding due to a rewrite. New detail window. Partial rewrite.
tags | tool, perl, wireless
systems | cisco, linux, bsd
SHA-256 | 5951e08289e6312bb1903b8db9375afa29fd3d4a3780d451be50975d1629d648
blowdoor30.c
Posted Apr 18, 2003
Authored by Bl0w | Site secworld.org

Blowdoor v3.0 is a backdoor for Unix systems and uses md5sum passwords for authentication.

Changes: Fixed bugs.
tags | tool, rootkit
systems | unix
SHA-256 | d0efcb0d097e945cd6f9af81c4f3ccc3b2a09fd3782a8723520953441cad5ff3
sormail.c
Posted Apr 18, 2003
Authored by Sorbo | Site darkircop.org

Local exploit for sendmail 8.11.6 which takes advantage of the vulnerable prescan() function which allows users to input 0xff to skip the length check of the buffer. Includes targets for Slackware 8.0, Redhat 7.2, and Redhat 7.3.

tags | exploit, local
systems | linux, redhat, slackware
SHA-256 | 6c7b5fd249e10c235502380844b5482f60d098427bce8782f3b77db91c26779f
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close