Exploit the possiblities
Showing 1 - 20 of 20 RSS Feed

Files Date: 2004-04-28

Posted Apr 28, 2004
Authored by eazy

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.

tags | exploit, tcp, proof of concept
advisories | CVE-2004-0230
MD5 | 2edd0e1dafca116fdae393cd4f64c383
Posted Apr 28, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.

Changes: Added support for various rootkits and improvements.
tags | tool, shell, perl, integrity, rootkit
systems | unix
MD5 | 0016af0e5ca9aa486cad90508cf47636
Posted Apr 28, 2004
Authored by mcree | Site kopkop.sourceforge.net

kopkop is a daemon that listens for encrypted, signed, and fully random-looking command packets. Only the fields essential for the packets' travel trough the Internet are filled with sane data. Upon reception and after a preset timeout, the daemon executes user-defined commands. This can be used to open firewalls, so you can reduce your system's attack surface by hiding certain services until you need to use them. The included kopkop client creates and sends the encrypted packets. The communication is strictly unidirectional and quite minimal between the client and the server. Replay attacks are forestalled by storing and comparing monotonically increasing packet IDs on both sides.

tags | tool, firewall
systems | unix
MD5 | 8b2ac0ae680bba4a7e01160c80adfd5e
Posted Apr 28, 2004
Authored by Brian Wotring | Site osiris.shmoo.com

Osiris is a host integrity management system that can be used to monitor changes to a network of hosts over time and report those changes back to the administrator(s). Osiris takes periodic snapshots of the filesystem, configurations, and logs, and stores them on a central management host. When changes are detected, Osiris will log these events and optionally send email to an administrator. Osiris also has preliminary support for monitoring other system data, including user lists, file system details, kernel modules, and network interface configurations.

Changes: Various support and fixes applied.
tags | tool, kernel, integrity
MD5 | 9a342b5dc1a44ff66300bc651ef1a86d
Posted Apr 28, 2004
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

Fwlogwatch analyzes the ipchains, netfilter, iptables packet filter, and Cisco logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Made status page interactive, Added dynamic memory allocation and fixed memory leaks, Added basic ipfw and fwsm support, various other fixes.
tags | tool, firewall
systems | cisco, unix
MD5 | 7fff74be5a5c6277b771f6d963e3ac7e
Posted Apr 28, 2004
Authored by wrossi | Site rossi.com

File system investigator is a forensic tool that allows viewing of ReiserFS and EXT2/3. While primarily intended as a forensics tool, it is also useful for Linux users who dual boot with another OS; it allows them to view and extract files from their partitions. Written in Java.

Changes: Added FAT support.
tags | java
systems | linux
MD5 | 6f6aab5bd77a4f8cce72a74de8011766
Posted Apr 28, 2004
Authored by pixelbeat | Site pixelbeat.org

FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.

tags | tool
systems | unix
MD5 | c78a230c46a49d95fb8f29eec1723bcb
Posted Apr 28, 2004
Authored by Chuck

Another program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.

tags | exploit
systems | windows, 2k
MD5 | c71f6be9ef9b5b7e9aaaa903c83d697c
Posted Apr 28, 2004
Authored by Laurent Constantin

Program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.

tags | exploit
systems | windows, 2k
MD5 | abe79cdc4e802902cbc75e03bd7f4406
Posted Apr 28, 2004
Authored by Ken Hollis - Gandalf The White | Site digital.net

Updated version of the white-paper discussing the Rose Attack method and how sending two parts of a fragmented packet can cause various outcomes to network devices, including denial of service problems.

tags | paper, denial of service
MD5 | e5f32812c903e7589ac5aedaa9125b14
Posted Apr 28, 2004
Authored by Paolo Ardoino | Site ardoino.altervista.org

The SSDT utility makes use of sending spoofed ICMP and UDP traffic to send RSA encrypted files. Both client and server side programs are included.

tags | udp, spoof
systems | unix
MD5 | c2d0886b3cb90281ed14b89fbd74f000
Posted Apr 28, 2004
Authored by DarkBicho | Site darkbicho.tk

paFileDB version 3.1 suffers from path disclosure and cross site scripting flaws.

tags | advisory, xss
MD5 | cae8846cd34224d112651b525dbbc79d
Posted Apr 28, 2004
Authored by Donato Ferrante | Site autistici.org

DiGi WWW Server version Compieuw.1 suffers from a DoS vulnerability due to a malformed URL.

tags | advisory, denial of service
MD5 | 10aed3b00ae6eea78f8f8d5e157fb1ab
Posted Apr 28, 2004
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Network login hacker enhancements including speed and reliability.
tags | web, imap
systems | cisco
MD5 | 858e0b049fed9dcf06c7c8d052579f69
Posted Apr 28, 2004
Authored by DarkBicho | Site darkbicho.tk

PHP-Nuke Video Gallery Module version 0.1 Beta 5 is susceptible to full path disclosure and SQL injection attacks.

tags | exploit, php, sql injection
MD5 | 54acb3d8866b74c2e6d1ec256608e9d9
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Linux root and Windows NT/2000 Administrator remote exploit for HP Web JetAdmin 6.5.

tags | exploit, remote, web, root
systems | linux, windows, nt
MD5 | 5cd19d9db75680df1b4b9a5cd6ca9642
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Phenoelit Advisory #0815 - Multiple vulnerabilities exist in the HP Web JetAdmin product. Version 6.5 is fully affect. Versions 7.0 and 6.2 and below are partially affected. A vulnerability summary list: Source disclosure of HTS and INC files, real path disclosure of critical files, critical files accessible through web server, user and administrator password disclosure and decryption, user and administrator password replay, and many, many others.

tags | advisory, web, vulnerability
MD5 | e3e5f8476c574e691368a1f5161fc720
Posted Apr 28, 2004
Authored by Michael Gschwandtner | Site anyplay.tznetz.com

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Python version.

tags | exploit, tcp, proof of concept, python
advisories | CVE-2004-0230
MD5 | 46637e58111353af9ab2dffa5ac6e5a3
Posted Apr 28, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

Network Query Tool version 1.6 suffers from a cross site scripting and full path disclosure vulnerability.

tags | advisory, xss
MD5 | d1445060688487a6f6a63d4c18dc813c
Posted Apr 28, 2004
Authored by Karl Lynn | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a severe denial of service vulnerability in the Symantec Client Firewall products for Windows. The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet. Physical access is required in order to bring an affected system out of this "frozen" state. This specific flaw exists within the component that performs low level processing of TCP packets.

tags | advisory, remote, denial of service, tcp
systems | windows
advisories | CVE-2004-0375
MD5 | 1a8e0db404df2e472bc8537292e8ae07
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By