what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2004-07-12

ettercap-NG-0.7.0.tar.gz
Posted Jul 12, 2004
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap NG is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 327afcea6e037958a0d56f73803de85957b802af4c77cdd933eb8056fe16a014
ethereal-0.10.5.tar.gz
Posted Jul 12, 2004
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Fixes a remotely exploitable vulnerability which can cause code to be remotely executed! Added several new protocols and updated many other protocol parsers.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 8cf555a4a02716ee1b65b6b8e016a632d869a57c46d8f8a304a324f8ae200dd4
linux.ia64.psr.mfh.txt
Posted Jul 12, 2004
Authored by Arun Sharma | Site bugzilla.redhat.com

Arun Sharma has discovered a vulnerability that affects Linux ia64 kernels. When the psr.mfh bit is checked without checking the identity of the FPH owner, another process may be able to see the first process's registers.

tags | advisory, kernel
systems | linux
advisories | CVE-2004-0565
SHA-256 | 7e63b0d22a6886171fcbc995871136e9f5eb57f8cec14c4fe69851519273f6f5
covert.txt
Posted Jul 12, 2004
Authored by Marc Schoenefeld

The Microsoft Java Virtual Machine suffers from a cross-site communication vulnerability that allows Java applets originating from different domains to communicate.

tags | advisory, java
SHA-256 | 1ac451abafed1ae8f6d56e153fc9d3e676e21a33c0eeff20a26841bdf18887e3
Ability_mail_server_1.18.txt
Posted Jul 12, 2004
Authored by Dr. Insane | Site members.lycos.co.uk

Ability Mail Server 1.x is susceptible to a cross site scripting flaw and a denial of service vulnerability.

tags | advisory, denial of service, xss
SHA-256 | 1f7f8a8d03be95cfa388c5d59de178d57af5d4318ec74a2eddbfaedf6efac7e8
webstretch-0.1.6.zip
Posted Jul 12, 2004
Authored by Simon Shanks | Site sourceforge.net

Webstretch is a tool that enables a user to view and alter all aspects of communications with a web site via a proxy. Primarily used for security based penetration testing of web sites, it can also be used for debugging during development.

tags | web
SHA-256 | e911accba39430b294eeae3392227f6175dbf03045d28c3460cf937f95871ef7
hlboom.zip
Posted Jul 12, 2004
Authored by Luigi Auriemma, Terry Henning | Site aluigi.altervista.org

Remote denial of service exploit for a flaw in the Half-Life server on Linux and Windows where a write occurs to a read-only memory zone.

tags | exploit, remote, denial of service
systems | linux, windows
SHA-256 | e7c70144dd5330c1cc7ffb608a02732ad9ec1fa4f17140d79be8c64ffa1b32d3
memHalfLife.txt
Posted Jul 12, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

A malformed packet to a Half-Life engine will cause a denial of service when a write to a read-only memory zone occurs. Both Windows and Linux releases are affected.

tags | advisory, denial of service
systems | linux, windows
SHA-256 | 0aadb5786ecf985cde4b3895881ce8c7ae018bc807c214246e981dfe8b706fc5
Page 1 of 1
Back1Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close