Exploit the possiblities
Showing 1 - 25 of 214 RSS Feed

Files Date: 2004-04-01 to 2004-04-30

tcp_reset.c
Posted Apr 28, 2004
Authored by eazy

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.

tags | exploit, tcp, proof of concept
advisories | CVE-2004-0230
MD5 | 2edd0e1dafca116fdae393cd4f64c383
rkhunter-1.0.7.tar.gz
Posted Apr 28, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.

Changes: Added support for various rootkits and improvements.
tags | tool, shell, perl, integrity, rootkit
systems | unix
MD5 | 0016af0e5ca9aa486cad90508cf47636
kopkop_0.1.0-1.tar.gz
Posted Apr 28, 2004
Authored by mcree | Site kopkop.sourceforge.net

kopkop is a daemon that listens for encrypted, signed, and fully random-looking command packets. Only the fields essential for the packets' travel trough the Internet are filled with sane data. Upon reception and after a preset timeout, the daemon executes user-defined commands. This can be used to open firewalls, so you can reduce your system's attack surface by hiding certain services until you need to use them. The included kopkop client creates and sends the encrypted packets. The communication is strictly unidirectional and quite minimal between the client and the server. Replay attacks are forestalled by storing and comparing monotonically increasing packet IDs on both sides.

tags | tool, firewall
systems | unix
MD5 | 8b2ac0ae680bba4a7e01160c80adfd5e
osiris-4.0.0.tar.gz
Posted Apr 28, 2004
Authored by Brian Wotring | Site osiris.shmoo.com

Osiris is a host integrity management system that can be used to monitor changes to a network of hosts over time and report those changes back to the administrator(s). Osiris takes periodic snapshots of the filesystem, configurations, and logs, and stores them on a central management host. When changes are detected, Osiris will log these events and optionally send email to an administrator. Osiris also has preliminary support for monitoring other system data, including user lists, file system details, kernel modules, and network interface configurations.

Changes: Various support and fixes applied.
tags | tool, kernel, integrity
MD5 | 9a342b5dc1a44ff66300bc651ef1a86d
fwlogwatch-1.0.tar.gz
Posted Apr 28, 2004
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

Fwlogwatch analyzes the ipchains, netfilter, iptables packet filter, and Cisco logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Made status page interactive, Added dynamic memory allocation and fixed memory leaks, Added basic ipfw and fwsm support, various other fixes.
tags | tool, firewall
systems | cisco, unix
MD5 | 7fff74be5a5c6277b771f6d963e3ac7e
fstools-1.0.3.zip
Posted Apr 28, 2004
Authored by wrossi | Site rossi.com

File system investigator is a forensic tool that allows viewing of ReiserFS and EXT2/3. While primarily intended as a forensics tool, it is also useful for Linux users who dual boot with another OS; it allows them to view and extract files from their partitions. Written in Java.

Changes: Added FAT support.
tags | java
systems | linux
MD5 | 6f6aab5bd77a4f8cce72a74de8011766
FSlint-2.06.tar.gz
Posted Apr 28, 2004
Authored by pixelbeat | Site pixelbeat.org

FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.

tags | tool
systems | unix
MD5 | c78a230c46a49d95fb8f29eec1723bcb
RoseAttackv2.txt
Posted Apr 28, 2004
Authored by Chuck

Another program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.

tags | exploit
systems | windows, 2k
MD5 | c71f6be9ef9b5b7e9aaaa903c83d697c
RoseAttackv1.txt
Posted Apr 28, 2004
Authored by Laurent Constantin

Program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.

tags | exploit
systems | windows, 2k
MD5 | abe79cdc4e802902cbc75e03bd7f4406
Rose_Frag_Attack_Explained.txt
Posted Apr 28, 2004
Authored by Ken Hollis - Gandalf The White | Site digital.net

Updated version of the white-paper discussing the Rose Attack method and how sending two parts of a fragmented packet can cause various outcomes to network devices, including denial of service problems.

tags | paper, denial of service
MD5 | e5f32812c903e7589ac5aedaa9125b14
ssdt-0.1.tar.gz
Posted Apr 28, 2004
Authored by Paolo Ardoino | Site ardoino.altervista.org

The SSDT utility makes use of sending spoofed ICMP and UDP traffic to send RSA encrypted files. Both client and server side programs are included.

tags | udp, spoof
systems | unix
MD5 | c2d0886b3cb90281ed14b89fbd74f000
advisory-04.txt
Posted Apr 28, 2004
Authored by DarkBicho | Site darkbicho.tk

paFileDB version 3.1 suffers from path disclosure and cross site scripting flaws.

tags | advisory, xss
MD5 | cae8846cd34224d112651b525dbbc79d
digiwww.txt
Posted Apr 28, 2004
Authored by Donato Ferrante | Site autistici.org

DiGi WWW Server version Compieuw.1 suffers from a DoS vulnerability due to a malformed URL.

tags | advisory, denial of service
MD5 | 10aed3b00ae6eea78f8f8d5e157fb1ab
hydra-4.0-src.tar.gz
Posted Apr 28, 2004
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Network login hacker enhancements including speed and reliability.
tags | web, imap
systems | cisco
MD5 | 858e0b049fed9dcf06c7c8d052579f69
phpnukeVideo.txt
Posted Apr 28, 2004
Authored by DarkBicho | Site darkbicho.tk

PHP-Nuke Video Gallery Module version 0.1 Beta 5 is susceptible to full path disclosure and SQL injection attacks.

tags | exploit, php, sql injection
MD5 | 54acb3d8866b74c2e6d1ec256608e9d9
JetRoot_pl.txt
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Linux root and Windows NT/2000 Administrator remote exploit for HP Web JetAdmin 6.5.

tags | exploit, remote, web, root
systems | linux, windows, nt
MD5 | 5cd19d9db75680df1b4b9a5cd6ca9642
HP_Web_Jetadmin_advisory.txt
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Phenoelit Advisory #0815 - Multiple vulnerabilities exist in the HP Web JetAdmin product. Version 6.5 is fully affect. Versions 7.0 and 6.2 and below are partially affected. A vulnerability summary list: Source disclosure of HTS and INC files, real path disclosure of critical files, critical files accessible through web server, user and administrator password disclosure and decryption, user and administrator password replay, and many, many others.

tags | advisory, web, vulnerability
MD5 | e3e5f8476c574e691368a1f5161fc720
disconn.py
Posted Apr 28, 2004
Authored by Michael Gschwandtner | Site anyplay.tznetz.com

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Python version.

tags | exploit, tcp, proof of concept, python
advisories | CVE-2004-0230
MD5 | 46637e58111353af9ab2dffa5ac6e5a3
waraxe-2004-SA024.txt
Posted Apr 28, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

Network Query Tool version 1.6 suffers from a cross site scripting and full path disclosure vulnerability.

tags | advisory, xss
MD5 | d1445060688487a6f6a63d4c18dc813c
eEye.symantec.txt
Posted Apr 28, 2004
Authored by Karl Lynn | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a severe denial of service vulnerability in the Symantec Client Firewall products for Windows. The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet. Physical access is required in order to bring an affected system out of this "frozen" state. This specific flaw exists within the component that performs low level processing of TCP packets.

tags | advisory, remote, denial of service, tcp
systems | windows
advisories | CVE-2004-0375
MD5 | 1a8e0db404df2e472bc8537292e8ae07
spamma.pl
Posted Apr 26, 2004
Authored by Vengy

Proof of concept utility that allows spammers to hide behind 'Email a friend/article' scripts.

tags | proof of concept
systems | unix
MD5 | d783acb164cd32b285bf1b360c237a1b
not_so_smartether.txt
Posted Apr 25, 2004
Authored by Kyle Duren

Samsung SmartEther switches allow a remote attacker to login as admin without having a correct password. All that is required is that all of the characters that can fit in the buffer for the password be filled.

tags | exploit, remote
MD5 | 3960756959bce9934971104a4c4533b7
Kreset.pl
Posted Apr 25, 2004
Authored by K-sPecial | Site xzziroz.freeshell.org

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Perl version.

tags | exploit, perl, tcp, proof of concept
advisories | CVE-2004-0230
MD5 | 35eafe0e58f3157a7d65afbb26e29c04
eXtremail2.c
Posted Apr 25, 2004
Authored by Luca Ercoli | Site seeweb.com

Linux eXtremail versions 1.5.9 and below remote root exploit that makes use of a format string vulnerability in its logging mechanism.

tags | exploit, remote, root
systems | linux
MD5 | eb165abefc04759a78ee48e3da5a316d
openbb106.txt
Posted Apr 25, 2004
Authored by James Bercegay | Site gulftech.org

Open Bulletin Board versions 1.0.6 and below suffer from cross site scripting, SQL injection, and arbitrary command execution flaws.

tags | advisory, arbitrary, xss, sql injection
MD5 | d312d326fb6de5ac0f588ae4da200302
Page 1 of 9
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close