exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-09-30

Posted Sep 30, 2004
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Various updates and fixes.
tags | web
systems | linux
SHA-256 | a4372827613ba7f990b117eabdc659aa7fbd34c33f9f27a250f5a6d11e564204
Posted Sep 30, 2004
Authored by nikant | Site agriroot.aua.gr

YAVR, or Yet Another antiVirus Recipe, is a procmail recipe that helps filter out many of the common e-mail worms and viruses.

Changes: Added various virus signatures.
tags | worm
systems | unix
SHA-256 | a319dc7f4d6c4eb2f5bd80cdd3bd8043510faa6415e933db411d6965d406c3ca
Posted Sep 30, 2004
Authored by Christophe Devine

Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.

Changes: Various bug fixes, rewrites, and additions.
tags | tool, wireless
SHA-256 | 1bbe79242f4faf2a7724488382e8048fd67497bb89c461d7560ce464be0bd018
Posted Sep 30, 2004
Authored by Victor Julien | Site vuurmuur.sourceforge.net

Vuurmuur is a middle-end and front-end for netfilter and iptables that is aimed at system administrators who need a decent firewall, but do not have netfilter specific knowledge. It converts human-readable rules into an iptables ruleset (or optional a bash script), makes netfilter logs readable, and includes an ncurses GUI.

Changes: Various fixes.
tags | tool, firewall, bash
systems | linux
SHA-256 | 3d524211178ff0549021ad884e6ee0a23f966606b543f0af8aeba4bf364dc6d5
Posted Sep 30, 2004
Authored by CoKi | Site nosystem.com.ar

Local exploit for flc versions 1.0.4 and below. Note that flc is not setuid by default and this is completely proof of concept. Tested on Slackware 10.0.

tags | exploit, local, proof of concept
systems | linux, slackware
SHA-256 | 418b63d366a109a7ec708279fa5ce175e8923a21150f47f353a099403ad65f4c
Posted Sep 30, 2004
Authored by LyNx

BanCh version 1.0 checks hosts for selected banners. Available services are FTP, SMTP, and HTTP. Provides anonymous FTP login checking, CGI scanning, e-mail address extraction from web pages, and other features.

tags | tool, web, cgi, scanner
systems | unix
SHA-256 | 88e8a7cdbf8d9b2ebe41ee1f88fed3fc1fc2eab51e9269d927ea195ecf2edb1f
Posted Sep 30, 2004
Authored by Andrew Daviel

The Canon iR5000i digital printer will print anything sent to port 25 without any authentication.

tags | advisory
SHA-256 | 58058373e0a812b37198444a250039269921467cacaffac6b9768753e74a16bd
Posted Sep 30, 2004
Authored by d_bug

Remote denial of service proof of concept exploit that makes use of a buffer overflow in Mdaemon SMTP server version 6.5.1.

tags | exploit, remote, denial of service, overflow, proof of concept
SHA-256 | 804b7dc239fe04dc64bbb5c1e88a61656cb63f516cf3d37601658a60ec6a72d6
Posted Sep 30, 2004
Authored by d_bug

Remote proof of concept exploit for MDaemon IMAP server version 6.5.1 that makes use of an overflow in the LIST command.

tags | exploit, remote, overflow, imap, proof of concept
SHA-256 | 7765b49b13bbc2fc6df506806a4f1def9a83a1d4a346c019faad1582f97079e7
Posted Sep 30, 2004
Authored by Serguei

N-du is a Unix backdoor which does not have any open ports. It waits for a special UDP or TCP packet, then opens a tcp port backdoor.

tags | tool, udp, tcp, rootkit
systems | unix
SHA-256 | 1d716fe2d428a1b091b2323219d12fa9adc4fb7bb83e3074c1b4ab462af6d467
Page 1 of 1

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By