exploit the possibilities
Showing 1 - 25 of 31 RSS Feed

Files Date: 2004-10-01

Posted Oct 1, 2004
Authored by Grant Edwards | Site josefsson.org

The NTLM library contains utilities for authenticating against Microsoft servers that require NTLM authentication. The goal of this project is to make libntlm easier to build (by using autoconf, automake, and libtool) for use by other projects.

tags | library
MD5 | 0accca251d70ba59107b0573147e4f59
Posted Oct 1, 2004
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Various bug fixes and some support added.
tags | tool, intrusion detection
systems | unix
MD5 | d94620d0808fd85e71112ce4caec798f
Posted Oct 1, 2004
Authored by Robert Osterlund | Site pikt.org

PIKT is a cross-platform, multi-functional toolkit for monitoring systems, reporting and fixing problems, security management, and updating system configurations. PIKT comprises an embedded scripting language with unique, labor-saving features. Binaries available here.

Changes: FAQ added. Various updates.
tags | tool
systems | unix
MD5 | 53deedcc336ff5016ec7827b5303953b
Posted Oct 1, 2004
Authored by Todd J.

Packet Storm new exploits for September, 2004.

tags | exploit
MD5 | 2fb304d87dca78c323690298ac9d1a9e
Posted Oct 1, 2004
Authored by aCiDBiTS

Serendipity 0.7-beta1 and below proof of concept SQL injection exploit that dumps the administrator's username and md5 password hash.

tags | exploit, sql injection, proof of concept
MD5 | fa4a99a6347d410345afafd3477bb084
Posted Oct 1, 2004
Authored by Delikon, Luigi Auriemma | Site delikon.de

Remote exploit for Zinf 2.2.1 on Win32 that downloads and executes a file.

tags | exploit, remote
systems | windows
MD5 | 04b0fede58545ec6f3d333dc5701dbf6
Posted Oct 1, 2004
Authored by Thomas Waldegger

Wordpress 1.2 is susceptible to multiple cross site scripting flaws.

tags | advisory, xss
MD5 | 51650e6d818cf6a23d8fe7c15a23fb39
Posted Oct 1, 2004

A vulnerability in the Yahoo! Store shopping cart allowed a remote user the ability to effectively alter the price of merchandise being placed into their shopping cart.

tags | advisory, remote
MD5 | 88c3879070e3063c41feb3a723ca38f2
Fwknop Port Knocking Utility
Posted Oct 1, 2004
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Added init script for Fedora systems. Added --Kill, --Restart, and --Status modes.
tags | tool, scanner
systems | linux, unix
MD5 | 19a008bc79cb9a906d0694a7b826ac9d
Posted Oct 1, 2004
Authored by Max Moser, Joshua Wright | Site remote-exploit.org

Hotspotter is a utility that passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names. If the probed network name matches a common hotspot name, Hotspotter will act as an access point to allow the client to authenticate and associate. Once associated, Hotspotter can be configured to run a command, possibly a script to kick off a DHCP daemon and other scanning against the new victim.

Changes: New, pre accesspoint mode scripting and bug fix.
tags | tool, wireless
systems | windows, xp
MD5 | 1fa7f4822732c8798832f8ce2f4fb703
Posted Oct 1, 2004
Authored by Konstantin Klyagin | Site konst.org.ua

KRIPP is a simple and light-weight network passwords sniffer written in Perl, which uses tcpdump to intercept traffic. Can sniff and display ICQ, FTP and POP3 passwords.

Changes: Updated to stay in compliance with tcpdump.
tags | tool, perl, sniffer
MD5 | d9113d4129089beed2265b8c671571bc
Posted Oct 1, 2004
Authored by Stefano Di Paola | Site wisec.it

PHP proof of concept exploit that makes use of an arbitrary file upload flaw in PHP versions below 4.3.9 and 5.0.2.

tags | exploit, arbitrary, php, proof of concept, file upload
MD5 | 82bbf54363bb3c8d4fb0c1e2add5924a
Posted Oct 1, 2004
Authored by nekd0 | Site unl0ck.blackhatz.info

MyWebServer 1.0.3 is susceptible to a denial of service attack and allows for direct administrative access to ServerProperties.html.

tags | advisory, denial of service
MD5 | c77e575f154e41b87b6dd792b4ea76b2
Posted Oct 1, 2004
Authored by Konstantin Klyagin | Site thekonst.net

SSHole 0.1 is a small program that can be useful for debugging SSL-encrypted protocols. It listens on a specified port for an incoming connection and as the handshake takes place, everything is reported to STDOUT. As feature in Software2.0 magazine.

tags | encryption, protocol
MD5 | e4fdf3681bfa2156fd5de0ece7618780
Posted Oct 1, 2004
Authored by Nourredine Himeur aka LostNoobs

The Alex PHP Guestbook suffers from a remote file inclusion vulnerability due to a lack of proper sanitization in it's chem_absolu variable.

tags | exploit, remote, php, file inclusion
MD5 | 50681ffb30663115d47d0831fcee8800
Posted Oct 1, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit that makes use of a memory allocation flaw in Chatman versions 1.5.1 RC1 and below.

tags | exploit, remote, denial of service
MD5 | 8c96d31c3538cedc5a2eb018eb7fd74c
Posted Oct 1, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Improper memory allocation in Chatman versions 1.5.1 RC1 and below leave it susceptible to a denial of service attack.

tags | advisory, denial of service
MD5 | 0c57c8b31643625ba7610ac12b13de3e
iDEFENSE Security Advisory 2004-09-27.t
Posted Oct 1, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 09.27.04 - Local exploitation of an input validation vulnerability in the ctstrtcasd command included by default in multiple versions of AIX could allow for the corruption or creation of arbitrary files anywhere on the system.

tags | advisory, arbitrary, local
systems | aix
advisories | CVE-2004-0828
MD5 | 98eb5308741634969526cb21f881d7fe
Posted Oct 1, 2004
Authored by Hugo Espuny | Site debian.org

Debian Security Advisory DSA 554-1 - When installing sasl-bin to use sasl in connection with sendmail, the sendmail configuration script uses fixed user/password information to initialize the sasl database. Any spammer with Debian systems knowledge could utilize such a sendmail installation to relay spam.

tags | advisory
systems | linux, debian
advisories | CVE-2004-0833
MD5 | a73003141a17de235cce8a6088f8e952
Clam AntiVirus Toolkit 0.80rc3
Posted Oct 1, 2004
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes and updates.
tags | virus
systems | unix
MD5 | 359d5bc28bdde382f01c308608b70b0b
Secunia Security Advisory 12662
Posted Oct 1, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PHP-Fusion that can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, php
MD5 | 278532df40737715641291e55515f131
Posted Oct 1, 2004
Authored by Chris Lowth | Site lowth.com

Cutter allows network administrators to close TCP/IP connections running over a Linux/IPtables firewall. It closes the connection in such a way as to lead both ends (client and server) to believe that it was aborted by the other.

tags | tcp
systems | linux
MD5 | e0eb377840b01e11e5cd008ae9b7d2af
Secunia Security Advisory 12661
Posted Oct 1, 2004
Authored by Secunia, Ziv Kamir | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Intellipeer Email Server, which can be exploited by malicious people to determine valid usernames.

tags | advisory
MD5 | 74cc04e19e3fd9cbf54606063188e358
Secunia Security Advisory 12655
Posted Oct 1, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP StorageWorks Command View XP, which can be exploited by malicious, local users to bypass certain access restrictions.

tags | advisory, local
MD5 | 720ef7eadcd2895f15f2bf8cb9509e9b
Secunia Security Advisory 12649
Posted Oct 1, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Baal Smart Forms 3.x, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 86577de8a1084f1e8a8c90dcb2b8cca4
Page 1 of 2

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    12 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By