exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2003-07-06

connlogd-0.9.7.tar.gz
Posted Jul 6, 2003
Authored by Alec Kosky

Connlogd is a detailed TCP/UDP connection logger with the ability to filter what information is logged. It can log to syslog or stderr so that it can be used with other logging packages such as D.J. Bernstein's multilog program. In addition to address and port information, it logs all TCP header flags (SYN, FIN, etc... as well as bogus flags) and the TCP window size. It uses the pcap library for packet capture and runs on most systems that support the pcap library. NOTE: Included in the source distribution is a script to help convert the logs into the format used when reporting attacks to dshield.org.

tags | udp, tcp, system logging
systems | unix
SHA-256 | 864dfbe8e77ac73e591422b48eaff63f4d2778eb91cb34c1e15e03e54890c7fb
pjam.zip
Posted Jul 6, 2003
Authored by Cys

Pjam, the UDP packet flooder for windows, which now has multithreaded support and additional bug fixes.

tags | denial of service, udp
systems | windows
SHA-256 | 29722f9c32c2bea5b77479cac3d352acdcbcfbb2e574d892dc148a05d2370207
path.tgz
Posted Jul 6, 2003
Authored by Bastian Ballmann, Stefan Krecher | Site p-a-t-h.sourceforge.net

The P.A.T.H. project is a collection of hijacking tools written in Perl. There is a terminal and a GUI version programmed with Perl/Tk for each tool. This suite of tools allows for the testing of firewall and IDS rules, sniffing your network traffic, and injection of resets to block unwanted traffic in your internal network.

tags | tool, perl
systems | unix
SHA-256 | 914b21ed0bc088b1bb1704cd9a84adf6351244421ec1c9e3571b2531eee084c9
CombatingSPAM.doc
Posted Jul 6, 2003
Authored by Brien M. Posey | Site relevanttechnologies.com

A paper released by Relevant Technologies discussing ways and means to combat Spam using various filters available.

tags | paper
SHA-256 | f9225336dd0fe9690207e4daf5130cb98c478b6a3c29732d0ccbb08c5944aa64
ccbill.txt
Posted Jul 6, 2003
Authored by Dayne Jordan

The CGI script whereami.cgi that gets distributed by CCBill lacks input validation and in return allows for remote command execution as the web uid.

tags | exploit, remote, web, cgi
SHA-256 | ce15f8d74362f11898352d1bbf86d0330e48248dd00ae31bec0febbb7a67da0c
shm_shell.c
Posted Jul 6, 2003
Authored by sloth | Site nopninjas.com

50 byte Linux x86 shellcode that connects to the shared memory segment matching the key and executes the code at that address.

tags | x86, shellcode
systems | linux
SHA-256 | 066f2b136b8976babe8f1c96c5f93e13618c63434ba50aebceb60448097c29eb
sphereexp.c
Posted Jul 6, 2003
Authored by sloth | Site nopninjas.com

Exploit for the win32 Sphere Server .55i from the Ultima Online Server Emulator.

tags | exploit
systems | windows
SHA-256 | c61f895011cca1cf9179eac1583450d27e65398ee74ab2bebbbc0cc2f78f02e7
axis1exp-13_3_0.c
Posted Jul 6, 2003
Authored by sloth | Site nopninjas.com

Exploit for remote administrative access on the freeware Ultima Online server emulator from sphereserver.com. Tested against axissvr 0.13.3.0.

tags | exploit, remote
SHA-256 | 1e2e497dc7b1abee56419b300adc740941e8fbad2c4768089ac1e0f1a2735a3f
mindjail.txt
Posted Jul 6, 2003
Authored by sloth | Site nopninjas.com

Quick analysis of the Mindjail worm being distributed by the trojan sdbot 0.5b.

tags | worm, trojan
SHA-256 | 26ebc9f01fd758864df70c938ca2efe7b474be66d6b56fa845180199b9dcda51
Yahoo-ducky.txt
Posted Jul 6, 2003
Authored by Bob, Rave | Site dtors.net

Yahoo Messenger 5.5 and below suffers from a buffer overflow that was originally discovered and fixed in May of 2002, but has since resurfaced. Systems Affected: Windows NT/2000/SP1/SP2/SP3, Windows ME, Windows 95/98, Windows XP.

tags | exploit, overflow
systems | windows
SHA-256 | 3dbd08466a589690e261f4eb0f747ba191bda6e704b3f88ec4d48204eb593792
manipulating.dtors.txt
Posted Jul 6, 2003
Authored by Bob, dsr

A paper that details the manipulation of the destructor when utilizing a buffer overflow, a format string attack, or corrupting a malloc chunk.

tags | paper, overflow
systems | unix
SHA-256 | 9ca183559ae54fd97c38cdc1cdabdfb443407e4dead2e88e1c635a606ab6c42d
netpipe.tar.gz
Posted Jul 6, 2003
Authored by aaron conole | Site aconole.brad-x.com

NetPipe is a redirector. It takes a socket in on one port, and reconnects that data out on the second port. It is multi-threaded, and supports UDP, TCP, and ICMP. It is a fully functioning socket redirector, the aim of which is to open ports on a firewall without needing the access to manipulate firewall ACLs.

tags | udp, tcp
systems | unix
SHA-256 | 00c3ddf079b87394db62e8ac080a815aeef0cee809dd45163241b1992ea98f74
DSR-FSA.txt
Posted Jul 6, 2003
Authored by dsr, mercy | Site dtors.net

DTORS Security - First Security Agent, the first screen locking tool for win32 is vulnerable to a local user changing or disabling the password via the system registry.

tags | advisory, local, registry
systems | windows
SHA-256 | 658980c23c1c70311de70e308d4e010c29a4e526b9221aee3b44e87b040fb2ef
0006_AP.CF-rds-dump.txt
Posted Jul 6, 2003
Authored by Victim1, rs2112 | Site angrypacket.com

The ColdFusion Server versions 4.5 and 5 suffer from multiple vulnerabilities. They range from the default RDS password being blank by default to allowing a normal remote user to reconfigure their website properties to put and get any file on the server.

tags | exploit, remote, vulnerability
SHA-256 | faa0a31742d24a814cbf24ab9f645633cf615b253c7800154079460c4cdc420b
disco-1.2.tar.gz
Posted Jul 6, 2003
Authored by Preston Wood | Site altmode.com

Disco is a passive IP discovery utility designed to sit on segments distributed throughout a network and discover unique IPs. In addition to IP discovery Disco has the ability to passively fingerprint TCP SYN packets to determine the host operating system.

Changes: Added options to fingerprint SYNACK packets, verbose fingerprint information gets logged to an output file.
tags | tcp, system logging
systems | unix
SHA-256 | 0cb6cf5974b9f12310a453d71387bf3d827b4c4e0461ac4594cd72f53f4f1055
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close