what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 214 RSS Feed

Files Date: 2004-04-01 to 2004-04-30

tcp_reset.c
Posted Apr 28, 2004
Authored by eazy

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson.

tags | exploit, tcp, proof of concept
advisories | CVE-2004-0230
SHA-256 | 498554d722ef08c3079f480800919a02ffb8380999bd74b87840cccf1b571e52
rkhunter-1.0.7.tar.gz
Posted Apr 28, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix clone.

Changes: Added support for various rootkits and improvements.
tags | tool, shell, perl, integrity, rootkit
systems | unix
SHA-256 | e394d3ac455c255d1c7607e09511ef79614437fb191ef4ea4c73a71e9241e5ab
kopkop_0.1.0-1.tar.gz
Posted Apr 28, 2004
Authored by mcree | Site kopkop.sourceforge.net

kopkop is a daemon that listens for encrypted, signed, and fully random-looking command packets. Only the fields essential for the packets' travel trough the Internet are filled with sane data. Upon reception and after a preset timeout, the daemon executes user-defined commands. This can be used to open firewalls, so you can reduce your system's attack surface by hiding certain services until you need to use them. The included kopkop client creates and sends the encrypted packets. The communication is strictly unidirectional and quite minimal between the client and the server. Replay attacks are forestalled by storing and comparing monotonically increasing packet IDs on both sides.

tags | tool, firewall
systems | unix
SHA-256 | dcfac1165b23dfff98417a486588a9fe4e6a5350d7f7750d46435db08b4b95ed
osiris-4.0.0.tar.gz
Posted Apr 28, 2004
Authored by Brian Wotring | Site osiris.shmoo.com

Osiris is a host integrity management system that can be used to monitor changes to a network of hosts over time and report those changes back to the administrator(s). Osiris takes periodic snapshots of the filesystem, configurations, and logs, and stores them on a central management host. When changes are detected, Osiris will log these events and optionally send email to an administrator. Osiris also has preliminary support for monitoring other system data, including user lists, file system details, kernel modules, and network interface configurations.

Changes: Various support and fixes applied.
tags | tool, kernel, integrity
SHA-256 | cc47768301dd94de6f6c1155bc68e83d1434ff7a9ff06f3c745739727ece435b
fwlogwatch-1.0.tar.gz
Posted Apr 28, 2004
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

Fwlogwatch analyzes the ipchains, netfilter, iptables packet filter, and Cisco logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Made status page interactive, Added dynamic memory allocation and fixed memory leaks, Added basic ipfw and fwsm support, various other fixes.
tags | tool, firewall
systems | cisco, unix
SHA-256 | d3a68f42cbadfde7a9a26bb7c86d7958f430ad16ac95b9242a032a42475516e9
fstools-1.0.3.zip
Posted Apr 28, 2004
Authored by wrossi | Site rossi.com

File system investigator is a forensic tool that allows viewing of ReiserFS and EXT2/3. While primarily intended as a forensics tool, it is also useful for Linux users who dual boot with another OS; it allows them to view and extract files from their partitions. Written in Java.

Changes: Added FAT support.
tags | java
systems | linux
SHA-256 | 148555dee50322a3e971221b0dbbc7586dd326ef3093e5fee993332a6624ddd3
FSlint-2.06.tar.gz
Posted Apr 28, 2004
Authored by pixelbeat | Site pixelbeat.org

FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.

tags | tool
systems | unix
SHA-256 | 7bcb02f26a17575b3b200eaa5d5191790d9ecac971ee6e1c5b7eb8e435f8baaf
RoseAttackv2.txt
Posted Apr 28, 2004
Authored by Chuck

Another program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.

tags | exploit
systems | windows
SHA-256 | 1762446df8362dce6e172db2a60b849b2bc2e6fe8d05cc34f85b83cfd3bb51b5
RoseAttackv1.txt
Posted Apr 28, 2004
Authored by Laurent Constantin

Program that demonstrates the Rose Attack eating up CPU processing time on a Windows 2000 box.

tags | exploit
systems | windows
SHA-256 | 1affe79e6026e065c1e1f74743818f1905a9bd31d0c94f82f8de9b88e54adc91
Rose_Frag_Attack_Explained.txt
Posted Apr 28, 2004
Authored by Ken Hollis - Gandalf The White | Site digital.net

Updated version of the white-paper discussing the Rose Attack method and how sending two parts of a fragmented packet can cause various outcomes to network devices, including denial of service problems.

tags | paper, denial of service
SHA-256 | aa2f2ff730fea23f570e3ae205be9c0e9da54e6c7f83c0637e38973166c67f1a
ssdt-0.1.tar.gz
Posted Apr 28, 2004
Authored by Paolo Ardoino | Site ardoino.altervista.org

The SSDT utility makes use of sending spoofed ICMP and UDP traffic to send RSA encrypted files. Both client and server side programs are included.

tags | udp, spoof
systems | unix
SHA-256 | fc453f28b98740de2e25120c5e2435746b8e0d1c762fe67f570cb5b3917f9c1b
advisory-04.txt
Posted Apr 28, 2004
Authored by DarkBicho | Site darkbicho.tk

paFileDB version 3.1 suffers from path disclosure and cross site scripting flaws.

tags | advisory, xss
SHA-256 | d5f47ce4fbc5d389d472a4f2644aa907ce5916533dbd1e734dcb4ffda99b5b1d
digiwww.txt
Posted Apr 28, 2004
Authored by Donato Ferrante | Site autistici.org

DiGi WWW Server version Compieuw.1 suffers from a DoS vulnerability due to a malformed URL.

tags | advisory, denial of service
SHA-256 | b59f8b508b853385cef1f02cb1e03b73784841a4adaa41136efa8c3c2438f65c
hydra-4.0-src.tar.gz
Posted Apr 28, 2004
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Network login hacker enhancements including speed and reliability.
tags | web, cracker, imap
systems | cisco
SHA-256 | f499f533b3049fa5dc11ca68ecca9bed993cb6ce9d9fb59bd12fa40f65f3a98f
phpnukeVideo.txt
Posted Apr 28, 2004
Authored by DarkBicho | Site darkbicho.tk

PHP-Nuke Video Gallery Module version 0.1 Beta 5 is susceptible to full path disclosure and SQL injection attacks.

tags | exploit, php, sql injection
SHA-256 | fe3ff118560c7e9a4f76a80601322a0fa94b9f122ffbe84c9212355bc5ab8523
JetRoot_pl.txt
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Linux root and Windows NT/2000 Administrator remote exploit for HP Web JetAdmin 6.5.

tags | exploit, remote, web, root
systems | linux, windows
SHA-256 | 2313f6c8c3680934ff278d70f97559a0358c9851c286921cd3a616b0ad3e2749
HP_Web_Jetadmin_advisory.txt
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Phenoelit Advisory #0815 - Multiple vulnerabilities exist in the HP Web JetAdmin product. Version 6.5 is fully affect. Versions 7.0 and 6.2 and below are partially affected. A vulnerability summary list: Source disclosure of HTS and INC files, real path disclosure of critical files, critical files accessible through web server, user and administrator password disclosure and decryption, user and administrator password replay, and many, many others.

tags | advisory, web, vulnerability
SHA-256 | c69f95a71084e7a828d8795c80a234d4f7bda584394ce675667092d629882a14
disconn.py
Posted Apr 28, 2004
Authored by Michael Gschwandtner | Site anyplay.tznetz.com

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Python version.

tags | exploit, tcp, proof of concept, python
advisories | CVE-2004-0230
SHA-256 | 80fbb1b75432221e765f2f7267fdcea0bd46642b06db40424528f8dc9503f573
waraxe-2004-SA024.txt
Posted Apr 28, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

Network Query Tool version 1.6 suffers from a cross site scripting and full path disclosure vulnerability.

tags | advisory, xss
SHA-256 | fa1523d9e83ebd95e254ed0fdedcdbbee7fbc285f5cf83a0945a61cc86b6c446
eEye.symantec.txt
Posted Apr 28, 2004
Authored by Karl Lynn | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a severe denial of service vulnerability in the Symantec Client Firewall products for Windows. The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet. Physical access is required in order to bring an affected system out of this "frozen" state. This specific flaw exists within the component that performs low level processing of TCP packets.

tags | advisory, remote, denial of service, tcp
systems | windows
advisories | CVE-2004-0375
SHA-256 | 145ded9725a9da33875b70d37b0748495d13246a5489f58b4d40c3b08b3d3e92
spamma.pl
Posted Apr 26, 2004
Authored by Vengy

Proof of concept utility that allows spammers to hide behind 'Email a friend/article' scripts.

tags | proof of concept
systems | unix
SHA-256 | 408ba61c8ace35ca97c3511f317dd27884c0ed193189eecdafd32e35492d65d4
not_so_smartether.txt
Posted Apr 25, 2004
Authored by Kyle Duren

Samsung SmartEther switches allow a remote attacker to login as admin without having a correct password. All that is required is that all of the characters that can fit in the buffer for the password be filled.

tags | exploit, remote
SHA-256 | afe2a7860a1e2e382e42f0ff2b3783ae8f7656865e91fbdfc36859ea6c6103ac
Kreset.pl
Posted Apr 25, 2004
Authored by K-sPecial | Site xzziroz.freeshell.org

Sample proof of concept exploit that demonstrates the TCP vulnerability discovered by Paul A. Watson. Perl version.

tags | exploit, perl, tcp, proof of concept
advisories | CVE-2004-0230
SHA-256 | 7b8da88a4b120e083cbeadb74aaf609c90eefcbba41d5d768d53613eda9c9800
eXtremail2.c
Posted Apr 25, 2004
Authored by Luca Ercoli | Site seeweb.com

Linux eXtremail versions 1.5.9 and below remote root exploit that makes use of a format string vulnerability in its logging mechanism.

tags | exploit, remote, root
systems | linux
SHA-256 | 6036e06b4c58e55a423903721dd48a2c313b1ab18a6383129e59eff5587ec24e
openbb106.txt
Posted Apr 25, 2004
Authored by James Bercegay | Site gulftech.org

Open Bulletin Board versions 1.0.6 and below suffer from cross site scripting, SQL injection, and arbitrary command execution flaws.

tags | advisory, arbitrary, xss, sql injection
SHA-256 | e16c00b60f8ba3f4b3b6fd18ee54b24d3774e3df45e73ef6c1f8da73a3fd1158
Page 1 of 9
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close