exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files Date: 2004-05-20

mix.c
Posted May 20, 2004
Authored by Serial Killah

Simple generic backdoor protected by a password encrypted with an MD5 hash. Gets added into inittab.

tags | tool, rootkit
systems | unix
MD5 | 472a0b9ee3932c0c401d7f1c6c043625
openaanval-1.48-stable.tar.gz
Posted May 20, 2004
Site aanval.com

OpenAanval is an open-source web based Snort intrusion detection console. Currently supporting Snort and syslog, OpenAanval provides dynamic monitoring, comprehensive reporting and powerful alerting capabilities. OpenAanval supports multiple sensors of multiple intrusion detection system types. OpenAanval's web-browser interface provides live auto-updating technology which provides real time event viewing from any Internet connected web-browser.

Changes: Miscellaneous bug fixes including a client side memory leak. In addition various new features have been added and streamlined.
tags | tool, web, sniffer
MD5 | 43453b81db08a3373a0e55b859d5e139
cvs_solaris_HEAP.c
Posted May 20, 2004

Remote root exploit for stable CVS releases up to 1.11.15 and CVS feature releases up to 1.12.7. Solaris version. Anonymously submitted.

tags | exploit, remote, root
systems | solaris
advisories | CVE-2004-0396
MD5 | 2172d2e08430a16cd515d19de297d1de
cvs_linux_freebsd_HEAP.c
Posted May 20, 2004

Remote root exploit for stable CVS releases up to 1.11.15 and CVS feature releases up to 1.12.7. Linux and FreeBSD version. Anonymously submitted.

tags | exploit, remote, root
systems | linux, freebsd
advisories | CVE-2004-0396
MD5 | 9cfad9f85d417e6bc59595d2781f88e6
CookiePathBestPractice.pdf
Posted May 20, 2004
Authored by Martin O'Neal | Site corsaire.com

Corsaire White Paper: Cookie Path Best Practice. A brief document discussing how and why a cookie path should be strictly defined.

tags | paper, web
MD5 | 417f1a51b89e89935bc34e68fd4c2655
SecureDevelopmentv06.pdf
Posted May 20, 2004
Authored by Glyn Geoghegan | Site corsaire.com

Corsaire White Paper: Secure Development Framework. This paper addresses the need for an infrastructure to exist in which things are securely developed to help mitigate the high costs incurred when vulnerable software is released into the wild.

tags | paper
MD5 | 7155cf428ccb06b0b9b83af4dbfd755f
ApplicationLevelDoSAttacksv06.pdf
Posted May 20, 2004
Authored by Stephen de Vries | Site corsaire.com

Corsaire White Paper: Application Level Denial Of Service Attacks. Discusses root causes, attack vectors, classes, and more.

tags | paper, denial of service, root
MD5 | 3cfdfceff8ebbe00d928e4b91a4004e8
Blind_XPath_Injection_20040518.pdf
Posted May 20, 2004
Authored by Amit Klein | Site sanctuminc.com

This paper describes a Blind XPath Injection attack that enables an attacker to extract a complete XML document used for XPath querying, without prior knowledge of the XPath query.

tags | paper
MD5 | e7b01772daac419ef8451d1e2780969c
Page 1 of 1
Back1Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    19 Files
  • 16
    Apr 16th
    7 Files
  • 17
    Apr 17th
    1 Files
  • 18
    Apr 18th
    1 Files
  • 19
    Apr 19th
    19 Files
  • 20
    Apr 20th
    18 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close