Twenty Year Anniversary
Showing 1 - 15 of 15 RSS Feed

Files Date: 2004-05-01

Posted May 1, 2004
Authored by Kelledin | Site

The etherdam utility is an IPTables firewall configuration engine. It implements a primitive scripting language as an alternative to the direct use of iptables. It comes with full documentation plus a heavily commented example configuration file. The configuration file should work for many scenarios with minimal adjustment.

tags | tool, firewall
systems | linux
MD5 | 6832b14f64c25b9c0394a76169ff98b4
Posted May 1, 2004
Authored by Enrico Kern | Site

AntiExploit is a small Perl script that scans for well known exploit files. It currently recognizes over 1400 suspicious files, and the database is updated weekly. Useful for a system that has a lot of shell accounts being used.

tags | shell, perl
systems | unix
MD5 | 233a203d625b8756342c708530248d4e
Posted May 1, 2004
Authored by Johan Lindh | Site

jailed implements a non-privileged jailroot. It allows an environment to be specified, does std(in/out/err) redirection, and can restart a failed child. Tested on OpenBSD and Gentoo Linux.

systems | linux, unix, openbsd, gentoo
MD5 | 4a0cb99c457d1099c4c0fcb4486acac2
Posted May 1, 2004
Authored by Hank Leininger | Site

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: This release has been synchronized with kernel 2.2.26 and Openwall 2.2.26-ow1.
tags | root, patch
systems | linux, unix
MD5 | 34ec26c10bb28a3d176c85d2c7f80331
Posted May 1, 2004

MS04-011 DsRoleUpgradeDownlevelServer remote exploit. Submitted anonymously.

tags | exploit, remote
MD5 | 5a3eed53d788b4bb830466ed24a0fb4e
Posted May 1, 2004

Multiple vulnerabilities have been discovered and fixed in the Real-Time Streaming Protocol (RTSP). Versions of MPlayer below 1.0pre4 are affected.

tags | advisory, vulnerability, protocol
MD5 | 0e22669fb9c8e65d570d75ef7d965f1f
Posted May 1, 2004
Authored by sbaa

Remote exploit for the Lsasrv.dll RPC buffer overflow. To make this exploit work remotely you have to use the sbaaNetapi.dll which modifies the DsRoleUpgradeDownlevelServer API.

tags | exploit, remote, overflow
MD5 | 60309c0cc0bc6cb4b687ed57dd0a9e3b
Posted May 1, 2004
Authored by houseofdabus

Remote exploit for the Lsasrv.dll RPC buffer overflow. Tested against various Russian and English versions of Windows XP Professional, Windows 2000 Professional, and Windows 2000 Advanced Server.

tags | exploit, remote, overflow
systems | windows, 2k, xp
MD5 | 336ff2588da990a705cc495d882c45fd
Posted May 1, 2004
Authored by priestmaster | Site

HSFTP versions 1.11 and below remote exploit that makes use of a format string vulnerability when processing file names.

tags | exploit, remote
MD5 | 7cd8a65e47c3d8ce7e8abc637a3a3696
Posted May 1, 2004
Authored by van Hauser, thc | Site

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Palm binary version released.
tags | web, imap
systems | cisco
MD5 | 9b25c771acac8871613ad70ed8e8edc1
Posted May 1, 2004
Authored by BlackAngels | Site

A local buffer overflow vulnerability exists in REP version 0.15.1 on RedHat Linux 7.3. Proof of concept exploitation included.

tags | advisory, overflow, local, proof of concept
systems | linux, redhat
MD5 | 39225a84cba3e870a2ffcdc5452210b4
Cisco Global Exploiter
Posted May 1, 2004
Authored by Nemesis, BlackAngels, E4m | Site

Cisco Global Exploiter is a tool that demonstrates exploitation of the various Cisco buffer overflow and denial of service vulnerabilities. Google flags this as malware so only use this if you know what you are doing. The password to unarchive this zip is the word "infected".

tags | exploit, remote, web, denial of service, overflow, arbitrary, protocol, memory leak, bypass
systems | cisco, windows, nt
MD5 | 614b3a9d575715147cac9a0e352d6861
Posted May 1, 2004
Authored by BlackAngels | Site

Scanner for webservers that checks for various CGI and other httpd related vulnerabilities.

tags | cgi, vulnerability
MD5 | bc462741450192c9abceea244f3fcf6b
Posted May 1, 2004
Authored by BlackAngels | Site

Local buffer overflow exploit generator for Linux, BSD, BSDi, HP-UX, UnixWare, IRIX and SCO.

tags | overflow, local
systems | linux, irix, bsd, hpux, unixware
MD5 | cb5cbdcd5c17d8e59d12c37a65fc4867
Posted May 1, 2004
Authored by BlackAngels | Site

Perl Loadable Exploiting Module (PLEM) is an advanced module for Perl programming that provides a list of common functions for local and remote exploit coding.

tags | remote, local, perl
MD5 | 578dd55e75fbb8b39a3f068d5198f707
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

July 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    1 Files
  • 2
    Jul 2nd
    26 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    13 Files
  • 6
    Jul 6th
    4 Files
  • 7
    Jul 7th
    4 Files
  • 8
    Jul 8th
    1 Files
  • 9
    Jul 9th
    16 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    32 Files
  • 12
    Jul 12th
    22 Files
  • 13
    Jul 13th
    15 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    1 Files
  • 16
    Jul 16th
    3 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By