what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-05-28

sysmsg.pl
Posted May 28, 2004
Authored by mu-b

Simple UK GSM mobile network mail-bombing utility.

systems | unix
SHA-256 | fa1c075f2a2f366d0d4b7b0e0c7a3091066aaa7868feb157fd2a0044ab8735ca
nbtstat.pl
Posted May 28, 2004
Authored by Jimvin | Site watersheep.org

nbtstat.pl is a simple Perl script that provides the basic functionality of the nbtstat utility that is available on Windows. It grabs the NetBIOS name table from a remote machine. This is a Perl port of eSDee's nbtstat.c (http://www.netric.org/tools.htm), written with portability in mind. It only requires Perl and the IO::Socket module.

tags | tool, remote, web, scanner, perl
systems | windows, unix
SHA-256 | 13166a14ceb220484c98d39013a6a4c0060355f3bb85f104f1f59e07c7141da8
WifiScanner-0.9.4.tar.gz
Posted May 28, 2004
Site wifiscanner.sourceforge.net

WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.

Changes: Various code clean ups and fixes.
tags | tool, wireless
systems | linux
SHA-256 | 16751fe94097aa634d7d4fe4759ee5cfc710cf6685c825ca389f2f27494305d6
tacshell-0.91.tar.gz
Posted May 28, 2004
Authored by Christopher SEKIYA | Site rezrov.net

tacshell is a drop-in replacement for sdshell, the functionality used with RSA's ACE/Server. It uses the TACACS+ protocol for authentication.

tags | tool, protocol
systems | unix
SHA-256 | ede71e0999d7bfd053f9057721f96d6f11df13cf7aa73e4d659afe677f8e6f14
csr-exploitation.pdf
Posted May 28, 2004
Authored by SolarIce | Site covertsystems.org

Tutorial written by Covert Systems Research. It defines several of the common types of vulnerabilities together with their counterpart command line exploit sequences. The descriptions of these types of vulnerabilities range from stack to heap, function pointer and format string weaknesses. This whitepaper has been developed to help those seeking to improve their exploitation skills while also aiming to give the reader the knowledge for a more surgical aspect to manipulating vulnerable programs.

tags | paper, vulnerability
SHA-256 | df7d9d5f892763880a05d4e45b7e6b4aa2abc083b26886bb80971593a3d97615
wildtangent.txt
Posted May 28, 2004
Authored by Peter Winter-Smith | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR27052004 - It is possible to cause a number of buffer overruns within the WildTangent WTHoster and Web Driver modules via any method that takes a filename as a parameter. Version 4.0 tested and others are possibly affected.

tags | advisory, web, overflow
SHA-256 | 1fd4a6d0da967ff355c42ac21d6118964e275521cf330235468cd3d7fe398cc5
sunjavaapp.txt
Posted May 28, 2004
Authored by Marc Schoenefeld

Sun-Java-App-Server PE version 8.0 suffers from a path disclosure vulnerability when returning server error 500 pages.

tags | advisory, java
SHA-256 | 80f7cd44aca210a567313a3abe3eec919dc378cf120eb973210189e875ca9082
Technical Cyber Security Alert 2004-147A
Posted May 28, 2004
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA04-147A - A heap overflow vulnerability in the Concurrent Versions System (CVS) could allow a remote attacker to execute arbitrary code on a vulnerable system. Systems affected: Concurrent Versions System (CVS) versions prior to 1.11.16. CVS Features versions prior to 1.12.8.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2004-0396
SHA-256 | eb076a8b5b46b1ff5cdb1e09fb7058dfaf0b977564279a22443f627e735d5bc8
SSRT4724.txt
Posted May 28, 2004
Site support.openview.hp.com

Use Of TCP/IP Reserved Port Zero Causes Integrated Lights-Out (iLO) To Stop Responding. LAN management products that use port zero when accessing an Integrated Lights-Out (iLO) in a ProLiant server will cause iLO to become unresponsive. Port zero is specified as a reserved port by the Internet Engineering Task Force (IETF) and should not be used.

tags | advisory, tcp
SHA-256 | 89bf8595009c96fdcd64a1994970dee44c3b8ddbf57df3ebd1eaf1ce3c2b6205
minishare132.txt
Posted May 28, 2004
Authored by Donato Ferrante | Site autistici.org

MiniShare HTTP server version 1.3.2 is susceptible to a denial of service attack due to mismanagement of requests. If a HEAD or GET request is sent with only one line following it, the server will crash.

tags | advisory, web, denial of service
SHA-256 | 5c8714016e397698c8a92f9d1d06a4284a4966ce9ff23ddb246c6e039dd72d94
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close