what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files Date: 2004-05-09

sishell-0.1.tar.gz
Posted May 9, 2004
Authored by Michel Blomgren aka Shadowinteger | Site cycom.se

sishell is a reverse (connecting) shellcode kit for x86 Linux, FreeBSD, NetBSD and OpenBSD. It generates both regular shellcode without NULLs and stand-alone ELF executables. sishell is distributed with a Makefile system, a custom ELF brander (brandelf) and a C example code generator. sishell is distributed under the MIT License.

tags | x86, shellcode
systems | linux, netbsd, freebsd, openbsd
SHA-256 | 2c3d6e93ea10f49f72295f4c8a5610d2e83976e34a37eda03b1600301a9077c1
gwee - Generic Web Exploitation Engine v1.21
Posted May 9, 2004
Authored by Michel Blomgren aka Shadowinteger | Site cycom.se

gwee, or Generic Web Exploitation Engine, is a small program written in C designed to exploit input validation vulnerabilities in web scripts, such as Perl CGIs, PHP, etc. gwee is much like an exploit, except more general-purpose. It features several reverse connecting shellcodes, 4 methods of injection, and a built-in HTTP/HTTPS client and server. gwee is distributed under the MIT License. The Perl and Python shellcodes were written by Sabu.

tags | tool, web, cgi, perl, php, vulnerability, shellcode, python
systems | unix
SHA-256 | a6f6a37f5e530eb4830fbac1b48b25142c7ccee1c7a06b9458eb9eca5bb7d37f
rrs-1.49.tar.gz
Posted May 9, 2004
Authored by Michel Blomgren aka Shadowinteger | Site cycom.se

rrs is a reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). The listener will accept the connection and receive a shell from the remote host. rrs features full pseudo-tty support, full OpenSSL support (high encryption, client/server authentication, choice of cipher suites), Twofish encryption, a simple XOR cipher, plain-text (unencrypted) session, peer-side session monitoring (snooping), daemon option and reconnection features. rrs is Free Software distributed under the MIT License and is known to compile and run under Linux, FreeBSD, NetBSD, OpenBSD and QNX.

tags | remote, shell
systems | linux, netbsd, unix, freebsd, openbsd
SHA-256 | e1731f76298f2b4aca4e90cbd80cd194f4e3c066efb4079b79d2674f6b009d1d
etherdam-0.3.tar.gz
Posted May 9, 2004
Authored by Kelledin | Site etherdam.sf.net

The etherdam utility is an IPTables firewall configuration engine. It implements a primitive scripting language as an alternative to the direct use of iptables. It comes with full documentation plus a heavily commented example configuration file. The configuration file should work for many scenarios with minimal adjustment.

Changes: Bug fixes.
tags | tool, firewall
systems | linux
SHA-256 | 2a178517bb502a2c6ecb01f4ce83f0fba4d3d3461939e5f3b1ec8cad32127782
oc192-sec.tgz
Posted May 9, 2004
Authored by sw | Site oc192.us

FreeBSD 4.x kernel security module. Currently supports forkbomb protection, and setuid restrictions and logging. Future versions of the module will carry more powerful features such as stack randomization, malloc bomb protection, etc.

tags | kernel
systems | unix, freebsd
SHA-256 | d6046ee8a2cb59b97f9b114b492cff647c5d8ba07c777afb085fd9540d22b791
Secunia Security Advisory 11567
Posted May 9, 2004
Authored by Secunia | Site secunia.com

SmOk3 has reported a vulnerability in e107 version 0.x, which can be exploited to conduct script insertion attacks.

tags | advisory
SHA-256 | ffc203776b348b7e241395594527efc8355618e7f5691876c2abbb91ebefa4c2
57555.html
Posted May 9, 2004
Site sunsolve.sun.com

A vulnerability in the Java Runtime Environment may allow a remote unprivileged user to cause the Java Virtual Machine to become unresponsive resulting in a Denial of Service (DoS) condition for the runtime environment and servers that run on the runtime environment. Affected versions are Sun Java JRE 1.4.x and Sun Java SDK 1.4.x. Unaffected versions are 1.4.2_04 or later.

tags | advisory, java, remote, denial of service
SHA-256 | 634bafb123157c728d0624e898b9c78737d1db3146091555c65b88327a961f3d
auxploit-1.0.tgz
Posted May 9, 2004
Authored by Teolupus

Auxploiter is a remote exploitation tool for the c:\aux vulnerability and is able to completely lock a user mail client. Outlook and other mail clients read this message using Internet Explorer, which is touchy to this vulnerability.

tags | exploit, remote
SHA-256 | 379b4e6b32cfd722ac33ffd4b3b82493967efcf5b1256e6d26c1f5cd867ec2a2
305-pound.c
Posted May 9, 2004
Authored by Nilanjan De | Site eos-india.net

Pound versions 1.5 and below local and remote format string exploit. Only works locally if pound is setuid.

tags | exploit, remote, local
SHA-256 | d32c4eb64924cacbd6138fbf93daad2d980fde8fa9dea7eb17cdfb06d23df785
WFBE.txt
Posted May 9, 2004
Authored by Tom

Write up detailing how to defeat file browsing restrictions on Windows 98 running Novell 3.2.0.0.

tags | exploit
systems | windows
SHA-256 | eba44110e3caccbe7c8b9b342ad17af2aa59924dd11497e268bd6624c6881869
knock-0.3.tar.gz
Posted May 9, 2004
Authored by Judd Vinet | Site zeroflux.org

knock is a server/client set of tools that implements the idea known as port-knocking. Port-knocking is a method of accessing a backdoor to your firewall through a special sequence of port hits. This can be useful for opening up temporary holes in a restrictive firewall for SSH access or similar.

Changes: Added PPP (LINUX_SLL) support, various patches, multiple protocols.
tags | tool, scanner
systems | unix
SHA-256 | 81dccc25ad234c9efb1f356e108abff9b75ea60cb5ef2bc3f2c9bade0e8a1e83
sfick-0.01.tar.gz
Posted May 9, 2004
Authored by f0rever | Site sfick.sf.net

sfick (simple file integrity checker) is a system that assists system administrators with the process of verifying the integrity of critical files. Given a system compromise, system administrators must be able to verify the integrity of any files they designate as critical and, if such files have been modified in any way, have the ability to restore an original copy of such a file. It stores backup copies of files designated as critical along with verification information to write-once media such as a CD-R.

tags | tool, integrity
SHA-256 | f19f0e96659e1b703991c1416ab37685580925979309d1fe6ba6b9c9088e100f
nkvir-rc
Posted May 9, 2004
Authored by nikant | Site agriroot.aua.gr

YAVR, or Yet Another antiVirus Recipe, is a procmail recipe that helps filter out many of the common e-mail worms and viruses.

tags | worm
systems | unix
SHA-256 | 0a2020f64ffde3521d3a9272c239b92de70d8076b994b5aa964249061e2942fe
webrampscan-0.2.tar.gz
Posted May 9, 2004
Authored by Candyman | Site haventt.net

The WebRamp scanner is program that scans for open webramp administration webpages, rips the usernames and passwords out, and dumps them into a text file. Included in the tarball is the binary, source and a script example for scanning multiple subnets.

tags | tool, scanner
systems | unix
SHA-256 | 2d8ee617ceaad37b92609c22942e015c78e277cd1c6817b3d5b0c675598e2967
efFingerD.txt
Posted May 9, 2004
Authored by Dr. Insane | Site members.lycos.co.uk

A buffer overflow has been identified in efFingerD version 0.2.12.

tags | advisory, overflow
SHA-256 | 579a8af004a7d1139f1522767ad1220c8da86ccabd89512f32c4c6110bf8937e
overet-i386-bind84.c
Posted May 9, 2004
Authored by Giuseppe Gottardi | Site overet.securitydate.it

84 byte Linux i386 shellcode which binds /bin/sh to TCP port 2707.

tags | tcp, shellcode
systems | linux
SHA-256 | 9b9774ec4874486dacdaee199ac08b545b6b978c39f935e72afad17953be31e1
win_msrpc_lsass_ms04-11_Ex.c
Posted May 9, 2004
Authored by houseofdabus, froggy 3s

Remote exploit for the Lsasrv.dll RPC buffer overflow. Tested against various Russian and English versions of Windows XP Professional, Windows 2000 Professional, and Windows 2000 Advanced Server. Ported to compile properly on Linux.

tags | exploit, remote, overflow
systems | linux, windows
SHA-256 | de64cd542848869101fd0295b16efedcc16a5d8fa502380d2df58defde723411
x25bru.c
Posted May 9, 2004
Authored by Inode | Site wayreth.eu.org

Multithreaded multi-link X.25 Pad password brute-forcing utility. Tested on Solaris. The speed of this software will depend on network congestion and the number of free outgoing links.

systems | solaris
SHA-256 | 0376e9b17ff926409fad0c905df32f253c46300171d706ec8aae3ca07053102c
openaanval-1.47-stable.tar.gz
Posted May 9, 2004
Site aanval.com

OpenAanval is an open-source web based Snort intrusion detection console. Currently supporting Snort and syslog, OpenAanval provides dynamic monitoring, comprehensive reporting and powerful alerting capabilities. OpenAanval supports multiple sensors of multiple intrusion detection system types. OpenAanval's web-browser interface provides live auto-updating technology which provides real time event viewing from any Internet connected web-browser.

Changes: This release includes a few major bug fixes and several minor new features.
tags | tool, web, sniffer
SHA-256 | 7964cfa752ea4d3d2d61f55640d29d955fe4816bdb4dfa5909ebd77913d66e28
zm-1.19.3.tar.gz
Posted May 9, 2004
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Minor features, fixes and language updates.
tags | web
systems | linux
SHA-256 | f1049899de4f8573964d5531d0d23c0a0a42d3597e93435a8897f47bf7e06c2b
waraxe-2004-SA028.txt
Posted May 9, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

The Nuke jokes module for PHPNuke is susceptible to path disclosure, cross site scripting, and SQL injection attacks.

tags | exploit, xss, sql injection
SHA-256 | 2c563bf041f397f2368286aa9f5f303cec749c7907a27ee19b36a9362644cb89
eudoraConceal.txt
Posted May 9, 2004
Authored by Brett Glass

Eudora is susceptible to a fraudulent URL vulnerability where a malicious URL can be masked behind what appears to be a legitimate link in the client. This technique is used commonly by phishers.

tags | advisory
SHA-256 | 07c109786d4b5d5968c26b09b0ebaeb84aece62066406ed0dce5ece18c26fbdb
firehol-1.191.tar.bz2
Posted May 9, 2004
Authored by Costa Tsaousis | Site firehol.org

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

tags | tool, spoof, firewall
systems | linux
SHA-256 | 05f3bc2e96dc0388d273f7c8a966a73f2970c3303e55ab69284bd08ab6bd84fb
msIPSec.txt
Posted May 9, 2004
Authored by Steffen Pfendtner

Write up noting how Microsoft's Windows IPSec implementation fails to properly authenticate an IPSec gateway and in return will accept client certificates as gateway certificates.

tags | advisory
systems | windows
SHA-256 | cf364f51155ba33ddfd9895eff2a5dd2e1dc229766ef23c6a25bbccaf2b36176
trendofficeVirus.txt
Posted May 9, 2004
Authored by Matt

The default installation of Trend OfficeScan allows a non administrative user to disable the service due to weak permissions, stopping the Antivirus software from working. Versions 3.0 to 6.0 are affected.

tags | advisory
SHA-256 | b5058376de37871b8a9edae79cb539b3067880dea63213336bb15e458655204b
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close