what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2003-12-18

SAdoor-20031217.tgz
Posted Dec 18, 2003
Authored by CMN | Site cmn.listprojects.darklab.org

SADoor is a non-listening remote administration tool for Unix systems. It sets up a listener in non-promiscuous mode for a specific sequence of packets arriving to the interface before allowing command mode. The commands are sent Blowfish encoded in the TCP payload and decoded and passed on to system(3).

Changes: Added a new client side application to edit database files. First release of winserver, a version of SADoor for Microsoft Windows.
tags | tool, remote, tcp, rootkit
systems | unix
SHA-256 | 94e0dcdf600116b079950ef2ffe319177b437da4b237b008bb960d77c075ed17
FLoP-1.0.6.tar.gz
Posted Dec 18, 2003
Authored by DG | Site geschke-online.de

FLoP is utility designed to gather alerts with a payload from distributed Snort sensors at a central server, and to store them in a database. Both PostgreSQL and MySQL are currently supported. High priority alerts may be sent out via e-mail.

tags | tool, sniffer
SHA-256 | 18adeaf982dc57c0ae442afb3815fc04ee7c432a62e9688ccb674a4955dfd542
rkhunter-1.00RC2.tar.gz
Posted Dec 18, 2003
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.

tags | tool, shell, perl, integrity, rootkit
systems | unix
SHA-256 | da5d8dc171840f688afdb859ad75295823aafc7b4c902fd4fb4de6a694ea1943
zm-0.9.16.tar.gz
Posted Dec 18, 2003
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

tags | web
systems | linux
SHA-256 | d293d84700bb11561f0275c86caec33df22cb5fe89c987d3b7a6ddefdcffaec0
darkage.txt
Posted Dec 18, 2003
Authored by Bryan Mayland, Todd Chapman

Weak encryption in the client for the game Dark Age of Camelot exposes customer billing and authentication information during transmission.

tags | advisory
SHA-256 | 6d944e3dc153c45f1774d46011fc92c063d2ad92d85abf77cd1c805dfeb68133
lftpadv.tgz
Posted Dec 18, 2003
Authored by Ulf Harnhammar

Two buffer overflows exist in lftp versions 2.3 to 2.6.9. When using the ls and rels commands during an HTTP/HTTPS connection, an attacker has the opportunity to exploit a sscanf() call in try_netscape_proxy() and try_squid_eplf().

tags | advisory, web, overflow
SHA-256 | 763cfb7b83021a88fea152144b0becd3ae188d5febab74fae428d2aa26a62665
eZXploit.pl
Posted Dec 18, 2003
Authored by Kralor | Site coromputer.net

Remote exploit for eZnetwork versions 3.3 to 3.5 that sends a shell back to the host that the attack spawns from.

tags | exploit, remote, shell
SHA-256 | 9f8750c0a7a828bc993803f79bc0832fef6d9aedc389c1e9bf8aa51b774106c0
ms03-043v2.c
Posted Dec 18, 2003
Authored by Mr. Nice

Remote exploit for the Microsoft Messenger service buffer overflow described in ms03-043. Tested against Windows 2000 FR SP0.

tags | exploit, remote, overflow
systems | windows
SHA-256 | e89e791af17b286cbae55b6f8a5cc430de2ee2deb5b3cc411ff97b53dac2f46f
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close