exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2004-03-26

os-sim-0.9.3.tar.gz
Posted Mar 26, 2004
Authored by Dominique Karg, David Gil, Fabio Ospitia Trujillo, Julio Casal, Jesus D. Munoz | Site sourceforge.net

Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.

Changes: Serious bug fixes.
tags | system logging
systems | linux, unix
SHA-256 | 427104a9fc56b1fecaace0c003a31ce8e7d853ccfa8c8d36383719e8b616b15b
rkhunter-1.0.1.tar.gz
Posted Mar 26, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.

Changes: Fixed bugs and added new features. Added support for Linux SuSE 8.2.
tags | tool, shell, perl, integrity, rootkit
systems | unix
SHA-256 | be0b20db764f70133a096d5071dcff5b1f3e08d09914f4e92bd33f6ab0eec999
zm-1.19.1.tar.gz
Posted Mar 26, 2004
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Minor bugfixes and enhancements.
tags | web
systems | linux
SHA-256 | 0e02ce1e40b7f1c7ea579a643d9e9719bbfee3e94c554cc7112c180f82bfc72c
MSWordPW.txt
Posted Mar 26, 2004
Authored by Andrew Barkley

Information on how to bypass Password protection on Microsoft Word documents with step by step instructions given.

tags | exploit
SHA-256 | bb774d9093b8a8ba89b18c15d9bf70cbb6976db2c192ab68cb19c19761a46a6a
ethboom.zip
Posted Mar 26, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Etherlords I versions 1.07 and below and Etherlords II versions 1.03 and below that causes a crash.

tags | exploit, remote, proof of concept
SHA-256 | 2842c60e89c6f95ad1c30077452b1d49bc3be2b59425bce7ad28b436ed1f7bfb
etherlords.txt
Posted Mar 26, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Etherlords I versions 1.07 and below and Etherlords II versions 1.03 and below suffer from a bug where reading of unallocated memory causes a crash.

tags | advisory
SHA-256 | 86d3b03376e87dd21664999646d2de080f050a5eaf1a4eef7312f4c720bd382a
vz-eSignal76.pl
Posted Mar 26, 2004
Authored by insect | Site viziblesoft.com

Remote exploit for eSignal versions 7.6 and 7.5 that downloads and executes a file.

tags | exploit, remote
SHA-256 | 4de8ee1d043050fc6b60d8d9e1cf57973ba65d5c71d9339504b1035fc27cfc36
vz012004-esignal7.txt
Posted Mar 26, 2004
Authored by insect | Site viziblesoft.com

VizibleSoft Security Advisory #2004/01 - eSignal versions 7.6 and 7.5 have a stack based buffer overflow in the WinSig.exe binary, allowing for remote code execution.

tags | advisory, remote, overflow, code execution
SHA-256 | ea68e78e59e75709cc5a6d65db16bdb0f0f2c6c08fe4e58d8ddfdfd63c93aebd
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close