what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2004-08-11

traceproto-1.0.0.tar.gz
Posted Aug 11, 2004
Authored by Eric Hope | Site traceproto.sourceforge.net

Traceproto is a traceroute replacement that allows the user to specify the protocol and port to trace to. It currently supports TCP, UDP, and ICMP traces.

tags | tool, udp, scanner, tcp, protocol
systems | unix
SHA-256 | 96de7eb35cbfd4201ea541ea13c1f60249379cd4f48195ec7b0720a3d1b635e4
airpwn-0.50c.tar.gz
Posted Aug 11, 2004
Authored by Bryan Burns | Site evilscheme.org

Airpwn is a platform for injecting application layer data on an 802.11b network. Airpwn requires two 802.11b interfaces, one for listening, and another for injecting. It uses a config file with multiple config sections to respond to specific data packets with arbitrary content.

tags | tool, arbitrary, wireless
SHA-256 | 483bf5f1e65f86240b9b46861cb90417dd3061f7f33b21a79e17b826028441ac
0x4553_Scorpion.tar.gz
Posted Aug 11, 2004
Authored by electronicsouls, Ares | Site es.xor.ru

Tool for infecting statically linked ELF binaries.

SHA-256 | 8be869de86b6690ac0687ffc6128d8d400109360e4e989b834b8e9a671d893d0
0x4553-Static_Infecting.html
Posted Aug 11, 2004
Authored by electronicsouls, Ares | Site es.xor.ru

White paper discussing a method of infecting statically linked ELF binaries.

SHA-256 | b1706a6a89aa5acf716ceada0b5da3383eeea00193479d24b7d0255abcd2e533
0x4553_Exorcist.tar.gz
Posted Aug 11, 2004
Authored by electronicsouls, Ares | Site es.xor.ru

Exorcist is a tool that can be considered an anti-anti-ptrace utility that unlocks the ptrace_traceme guard of a binary.

SHA-256 | 196afaa678e5a8451af6b0aeebe04c81eb9e6697dad1f3fcd75c7fa9ed883329
Secunia Security Advisory 12261
Posted Aug 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Microsoft has released an update for Exchange Server 5.5 SP4. This fixes a vulnerability, allowing malicious people to conduct script insertion attacks. The vulnerability is caused due to an input validation error in a HTML redirection query. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected website when a malicious entry is viewed. This vulnerability affects Microsoft Exchange 5.5 with Service Pack 4.

tags | advisory, arbitrary
SHA-256 | 5d77c2dd825577cb210bef5a0a740d0a2789a0d5983874b737d7c8a2b8ce49f9
Corsaire Security Advisory 2003-11-20.3
Posted Aug 11, 2004
Authored by Martin O'Neal, Corsaire | Site corsaire.com

Corsaire Security Advisory - Sygate Enforcer releases prior to 3.5MR1 allow unauthenticated broadcast traffic to pass through.

tags | advisory
advisories | CVE-2004-0593
SHA-256 | 21d9a16475777b2c30bcd941e5e7faebe82c5cfe876f2a8709cdc45163e95f60
Corsaire Security Advisory 2003-11-20.2
Posted Aug 11, 2004
Authored by Martin O'Neal, Corsaire | Site corsaire.com

Corsaire Security Advisory - Sygate Secure Enterprise versions prior to 3.5MR3 are susceptible to a replay attack that allows for resource exhaustion.

tags | advisory
advisories | CVE-2004-0163
SHA-256 | 9518fde350500d8f1f17561d136500ea61cea2c37c0fb9f6ff05042d4ef28006
Corsaire Security Advisory 2003-11-20.1
Posted Aug 11, 2004
Authored by Martin O'Neal, Corsaire | Site corsaire.com

Corsaire Security Advisory - Sygate Enforcer 4.0 and prior releases are susceptible to a denial of service attack via malformed discovery packets.

tags | advisory, denial of service
advisories | CVE-2003-0931
SHA-256 | c0ffd3b2d0fc4b2f508557dda3a080b8daea38175bc4d73cf4d1a38f69678dee
57619.html
Posted Aug 11, 2004
Site sunsolve.sun.com

Sun Security Advisory - A vulnerability has been reported in Solaris, which can be exploited by malicious people to cause a denial of service. The vulnerability is caused due to an unspecified error within the processing of XDMCP requests. Successful exploitation crashes the X Display Manager (xdm).

tags | advisory, denial of service
systems | solaris
SHA-256 | d8594b78d07db731b421e611b465e7cfd6c24a98820e9b94586a6a54688b4f21
Secunia Security Advisory 12254
Posted Aug 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Symantec Clientless VPN Gateway 4400 Series, where some have an unknown impact and others can be exploited to conduct cross-site scripting attacks or manipulate users' signon information.

tags | advisory, vulnerability, xss
SHA-256 | 9f378f5658ca011e27d688e95c4f9924e0ea4e96411f0cce90a32c64bfe2df2e
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close