what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2003-07-06

Posted Jul 6, 2003
Authored by Alec Kosky

Connlogd is a detailed TCP/UDP connection logger with the ability to filter what information is logged. It can log to syslog or stderr so that it can be used with other logging packages such as D.J. Bernstein's multilog program. In addition to address and port information, it logs all TCP header flags (SYN, FIN, etc... as well as bogus flags) and the TCP window size. It uses the pcap library for packet capture and runs on most systems that support the pcap library. NOTE: Included in the source distribution is a script to help convert the logs into the format used when reporting attacks to dshield.org.

tags | udp, tcp, system logging
systems | unix
SHA-256 | 864dfbe8e77ac73e591422b48eaff63f4d2778eb91cb34c1e15e03e54890c7fb
Posted Jul 6, 2003
Authored by Cys

Pjam, the UDP packet flooder for windows, which now has multithreaded support and additional bug fixes.

tags | denial of service, udp
systems | windows
SHA-256 | 29722f9c32c2bea5b77479cac3d352acdcbcfbb2e574d892dc148a05d2370207
Posted Jul 6, 2003
Authored by Bastian Ballmann, Stefan Krecher | Site p-a-t-h.sourceforge.net

The P.A.T.H. project is a collection of hijacking tools written in Perl. There is a terminal and a GUI version programmed with Perl/Tk for each tool. This suite of tools allows for the testing of firewall and IDS rules, sniffing your network traffic, and injection of resets to block unwanted traffic in your internal network.

tags | tool, perl
systems | unix
SHA-256 | 914b21ed0bc088b1bb1704cd9a84adf6351244421ec1c9e3571b2531eee084c9
Posted Jul 6, 2003
Authored by Brien M. Posey | Site relevanttechnologies.com

A paper released by Relevant Technologies discussing ways and means to combat Spam using various filters available.

tags | paper
SHA-256 | f9225336dd0fe9690207e4daf5130cb98c478b6a3c29732d0ccbb08c5944aa64
Posted Jul 6, 2003
Authored by Dayne Jordan

The CGI script whereami.cgi that gets distributed by CCBill lacks input validation and in return allows for remote command execution as the web uid.

tags | exploit, remote, web, cgi
SHA-256 | ce15f8d74362f11898352d1bbf86d0330e48248dd00ae31bec0febbb7a67da0c
Posted Jul 6, 2003
Authored by sloth | Site nopninjas.com

50 byte Linux x86 shellcode that connects to the shared memory segment matching the key and executes the code at that address.

tags | x86, shellcode
systems | linux
SHA-256 | 066f2b136b8976babe8f1c96c5f93e13618c63434ba50aebceb60448097c29eb
Posted Jul 6, 2003
Authored by sloth | Site nopninjas.com

Exploit for the win32 Sphere Server .55i from the Ultima Online Server Emulator.

tags | exploit
systems | windows
SHA-256 | c61f895011cca1cf9179eac1583450d27e65398ee74ab2bebbbc0cc2f78f02e7
Posted Jul 6, 2003
Authored by sloth | Site nopninjas.com

Exploit for remote administrative access on the freeware Ultima Online server emulator from sphereserver.com. Tested against axissvr

tags | exploit, remote
SHA-256 | 1e2e497dc7b1abee56419b300adc740941e8fbad2c4768089ac1e0f1a2735a3f
Posted Jul 6, 2003
Authored by sloth | Site nopninjas.com

Quick analysis of the Mindjail worm being distributed by the trojan sdbot 0.5b.

tags | worm, trojan
SHA-256 | 26ebc9f01fd758864df70c938ca2efe7b474be66d6b56fa845180199b9dcda51
Posted Jul 6, 2003
Authored by Bob, Rave | Site dtors.net

Yahoo Messenger 5.5 and below suffers from a buffer overflow that was originally discovered and fixed in May of 2002, but has since resurfaced. Systems Affected: Windows NT/2000/SP1/SP2/SP3, Windows ME, Windows 95/98, Windows XP.

tags | exploit, overflow
systems | windows
SHA-256 | 3dbd08466a589690e261f4eb0f747ba191bda6e704b3f88ec4d48204eb593792
Posted Jul 6, 2003
Authored by Bob, dsr

A paper that details the manipulation of the destructor when utilizing a buffer overflow, a format string attack, or corrupting a malloc chunk.

tags | paper, overflow
systems | unix
SHA-256 | 9ca183559ae54fd97c38cdc1cdabdfb443407e4dead2e88e1c635a606ab6c42d
Posted Jul 6, 2003
Authored by aaron conole | Site aconole.brad-x.com

NetPipe is a redirector. It takes a socket in on one port, and reconnects that data out on the second port. It is multi-threaded, and supports UDP, TCP, and ICMP. It is a fully functioning socket redirector, the aim of which is to open ports on a firewall without needing the access to manipulate firewall ACLs.

tags | udp, tcp
systems | unix
SHA-256 | 00c3ddf079b87394db62e8ac080a815aeef0cee809dd45163241b1992ea98f74
Posted Jul 6, 2003
Authored by dsr, mercy | Site dtors.net

DTORS Security - First Security Agent, the first screen locking tool for win32 is vulnerable to a local user changing or disabling the password via the system registry.

tags | advisory, local, registry
systems | windows
SHA-256 | 658980c23c1c70311de70e308d4e010c29a4e526b9221aee3b44e87b040fb2ef
Posted Jul 6, 2003
Authored by Victim1, rs2112 | Site angrypacket.com

The ColdFusion Server versions 4.5 and 5 suffer from multiple vulnerabilities. They range from the default RDS password being blank by default to allowing a normal remote user to reconfigure their website properties to put and get any file on the server.

tags | exploit, remote, vulnerability
SHA-256 | faa0a31742d24a814cbf24ab9f645633cf615b253c7800154079460c4cdc420b
Posted Jul 6, 2003
Authored by Preston Wood | Site altmode.com

Disco is a passive IP discovery utility designed to sit on segments distributed throughout a network and discover unique IPs. In addition to IP discovery Disco has the ability to passively fingerprint TCP SYN packets to determine the host operating system.

Changes: Added options to fingerprint SYNACK packets, verbose fingerprint information gets logged to an output file.
tags | tcp, system logging
systems | unix
SHA-256 | 0cb6cf5974b9f12310a453d71387bf3d827b4c4e0461ac4594cd72f53f4f1055
Page 1 of 1

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By