what you don't know can hurt you
Showing 1 - 16 of 16 RSS Feed

Files Date: 2004-05-01

Posted May 1, 2004
Authored by Kelledin | Site etherdam.sf.net

The etherdam utility is an IPTables firewall configuration engine. It implements a primitive scripting language as an alternative to the direct use of iptables. It comes with full documentation plus a heavily commented example configuration file. The configuration file should work for many scenarios with minimal adjustment.

tags | tool, firewall
systems | linux
MD5 | 6832b14f64c25b9c0394a76169ff98b4
Posted May 1, 2004
Authored by Enrico Kern | Site h07.org

AntiExploit is a small Perl script that scans for well known exploit files. It currently recognizes over 1400 suspicious files, and the database is updated weekly. Useful for a system that has a lot of shell accounts being used.

tags | shell, perl
systems | unix
MD5 | 233a203d625b8756342c708530248d4e
Posted May 1, 2004
Authored by Johan Lindh | Site sourceforge.net

jailed implements a non-privileged jailroot. It allows an environment to be specified, does std(in/out/err) redirection, and can restart a failed child. Tested on OpenBSD and Gentoo Linux.

systems | linux, unix, openbsd, gentoo
MD5 | 4a0cb99c457d1099c4c0fcb4486acac2
Posted May 1, 2004
Authored by Hank Leininger | Site TheAIMSGroup.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: This release has been synchronized with kernel 2.2.26 and Openwall 2.2.26-ow1.
tags | root, patch
systems | linux, unix
MD5 | 34ec26c10bb28a3d176c85d2c7f80331
Posted May 1, 2004

MS04-011 DsRoleUpgradeDownlevelServer remote exploit. Submitted anonymously.

tags | exploit, remote
MD5 | 5a3eed53d788b4bb830466ed24a0fb4e
Posted May 1, 2004
Site mplayerhq.hu

Multiple vulnerabilities have been discovered and fixed in the Real-Time Streaming Protocol (RTSP). Versions of MPlayer below 1.0pre4 are affected.

tags | advisory, vulnerability, protocol
MD5 | 0e22669fb9c8e65d570d75ef7d965f1f
Posted May 1, 2004
Authored by sbaa

Remote exploit for the Lsasrv.dll RPC buffer overflow. To make this exploit work remotely you have to use the sbaaNetapi.dll which modifies the DsRoleUpgradeDownlevelServer API.

tags | exploit, remote, overflow
MD5 | 60309c0cc0bc6cb4b687ed57dd0a9e3b
Posted May 1, 2004
Authored by houseofdabus

Remote exploit for the Lsasrv.dll RPC buffer overflow. Tested against various Russian and English versions of Windows XP Professional, Windows 2000 Professional, and Windows 2000 Advanced Server.

tags | exploit, remote, overflow
systems | windows, 2k, xp
MD5 | 336ff2588da990a705cc495d882c45fd
Posted May 1, 2004
Authored by priestmaster | Site priestmaster.org

HSFTP versions 1.11 and below remote exploit that makes use of a format string vulnerability when processing file names.

tags | exploit, remote
MD5 | 7cd8a65e47c3d8ce7e8abc637a3a3696
Posted May 1, 2004
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Palm binary version released.
tags | web, imap
systems | cisco
MD5 | 9b25c771acac8871613ad70ed8e8edc1
Posted May 1, 2004
Authored by BlackAngels | Site blackangels.it

A local buffer overflow vulnerability exists in REP version 0.15.1 on RedHat Linux 7.3. Proof of concept exploitation included.

tags | advisory, overflow, local, proof of concept
systems | linux, redhat
MD5 | 39225a84cba3e870a2ffcdc5452210b4
Cisco Global Exploiter
Posted May 1, 2004
Authored by Nemesis, BlackAngels, E4m | Site blackangels.it

Cisco Global Exploiter is a tool that demonstrates exploitation of the various Cisco buffer overflow and denial of service vulnerabilities. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

tags | exploit, remote, web, denial of service, overflow, arbitrary, protocol, memory leak, bypass
systems | cisco, windows, nt
MD5 | 614b3a9d575715147cac9a0e352d6861
Posted May 1, 2004
Authored by BlackAngels | Site blackAngels.it

Scanner for webservers that checks for various CGI and other httpd related vulnerabilities.

tags | cgi, vulnerability
MD5 | bc462741450192c9abceea244f3fcf6b
Posted May 1, 2004
Authored by BlackAngels | Site blackAngels.it

Local buffer overflow exploit generator for Linux, BSD, BSDi, HP-UX, UnixWare, IRIX and SCO.

tags | overflow, local
systems | linux, irix, bsd, hpux, unixware
MD5 | cb5cbdcd5c17d8e59d12c37a65fc4867
Posted May 1, 2004
Authored by BlackAngels | Site blackangels.it

Perl Loadable Exploiting Module (PLEM) is an advanced module for Perl programming that provides a list of common functions for local and remote exploit coding.

tags | remote, local, perl
MD5 | 578dd55e75fbb8b39a3f068d5198f707
Microsoft Windows LSASS Buffer Overrun
Posted May 1, 2004
Authored by OCANOR

Microsoft Windows LSASS (Local Security Authority Subsystem Service) is prone to a remotely exploitable buffer overrun vulnerability. The specific vulnerable system component is LSASRV.DLL. Successful exploitation of this issue could allow a remote attacker to execute malicious code on a vulnerable system, resulting in full system compromise. This exploit produces a shell.

tags | exploit, remote, overflow, shell, local
systems | windows
MD5 | 0f0bd483f2bfc4450e382d53bc9e98eb
Page 1 of 1

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    17 Files
  • 23
    Mar 23rd
    1 Files
  • 24
    Mar 24th
    1 Files
  • 25
    Mar 25th
    16 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By