seeing is believing
Showing 1 - 25 of 67 RSS Feed

Files Date: 2005-08-17

kismet-2005-08-R1.tar.gz
Posted Aug 17, 2005
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data. Full changelog here.

Changes: This fixes several potential security problems. ALL USERS SHOULD UPGRADE.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
MD5 | 17edb7688e04dd28028d5268a77d0ce7
aircrack-2.22.tgz
Posted Aug 17, 2005
Authored by Christophe Devine

Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.

Changes: Now compatible with madwifi CVS 2005-08-14.
tags | tool, wireless
MD5 | fe605ecca951ce4b05bb288ebf5036b2
plash-1.11.tar.gz
Posted Aug 17, 2005
Authored by Mark Seaborn | Site cs.jhu.edu

Plash (the Principle of Least Authority Shell) is a Unix shell that lets you run Unix programs with access only to the files and directories they need to run. In order to implement this, the filesystem is virtualized. Each process can have its own namespace, which can contain a subset of your files. Plash is implemented by modifying GNU libc and replacing the system calls that use filenames. For example, open() is changed so that it sends a message to a file server via a socket. If the request is successful, the server sends the client a file descriptor. Processes are run in a chroot jail under dynamically-allocated user IDs. No kernel modifications are required. Existing Linux binaries work unchanged.

Changes: The major new feature in this version is the plash-run-emacs program.
tags | tool, shell, kernel
systems | linux, unix
MD5 | bcb730e87b8f6596c693ddb17a1854f3
Nmap Scanning Utility 3.83 Defcon 13 Version
Posted Aug 17, 2005
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.

Changes: Defcon special release version. Added the ability for Nmap to send and properly route raw ethernet packets containing IP datagrams rather than always sending the packets via raw sockets. Added ARP ping. Applied a massive OS fingerprint update from Zhao Le (about 350 fingerprints). Integrated hundreds of nmap-service-probes signatures from Doug Hoyte. Check the changelog for the rest.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 9ec032e7b02ec8722fc9a0e4149f95f5
phpwebsite0101.txt
Posted Aug 17, 2005
Authored by matrix killer | Site h4cky0u.org

phpWebSite 0.10.1 Full is susceptible to a SQL injection attack.

tags | exploit, sql injection
MD5 | 40292ad74f638c980c5ddda4c59fd430
SSRT4874.txt
Posted Aug 17, 2005
Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Ignite-UX, where unsafe file permissions could be remotely exploited to allow an unauthorized user to access and alter Ignite-UX client data on the Ignite-UX server.

tags | advisory
systems | hpux
MD5 | bc90dfd0144d9edffdef5d7d0225956d
Debian Linux Security Advisory 776-1
Posted Aug 17, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 776-1 - Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is vulnerable to integer overflows when handling the TNEF, CHM and FSG file formats.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2005-2450
MD5 | 8767948e561430c9ea52c0a7982b4c68
bypassing-win-heap-protections.pdf
Posted Aug 17, 2005
Authored by Nicolas Falliere

Whitepaper detailing a new way to bypass Microsoft Windows heap protection mechanisms. The methodology explained here is different from the method introduced by Alexander Anisimov.

tags | paper
systems | windows
MD5 | bbe8f8d36f5ad8e3f1c34915ce9660aa
Corsaire Security Advisory 2004-11-23.2
Posted Aug 17, 2005
Authored by Martin O'Neal, Corsaire

Corsaire Security Advisory - The aim of this document is to clearly define a vulnerability in the HP Ignite-UX product, as supplied by HP Inc., that would allow unauthenticated write access to the host filesystem, both remotely and locally.

tags | advisory
advisories | CVE-2004-0952
MD5 | 0e7bdc0b6c0e6b677a35bd77cda5a9bd
Corsaire Security Advisory 2004-11-23.1
Posted Aug 17, 2005
Authored by Martin O'Neal, Corsaire

Corsaire Security Advisory - The aim of this document is to clearly define a vulnerability in the HP Ignite-UX product, as supplied by HP Inc., that would allow unauthenticated access to a copy of the /etc/passwd file.

tags | advisory
advisories | CVE-2004-0951
MD5 | c9de2dfd7c6bc5f65ffb613f96e1dfed
SUSE-SA-2005-046.txt
Posted Aug 17, 2005
Site suse.com

SUSE Security Announcement - A security flaw was found in the Apache and Apache2 web servers which allows remote attacker to smuggle requests past filters by providing handcrafted header entries.

tags | advisory, remote, web
systems | linux, suse
advisories | CVE-2005-2088, CVE-2005-1268
MD5 | 67adcaa61c279edeb699dc82eda6ff2b
persianblog.txt
Posted Aug 17, 2005
Authored by trueend5 | Site KAPDA.ir

PersianBlog.com, with 63,000 blogs, is susceptible to SQL injection attacks.

tags | advisory, sql injection
MD5 | 8a4587cd0e2bf8dcbf7fc28ec7459c16
Exploit Labs Security Advisory 2005.10
Posted Aug 17, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Mac OS X Weblog Server version 10.4.0 is susceptible to cross site scripting attacks.

tags | exploit, xss
systems | apple, osx
advisories | CVE-2005-2523
MD5 | e5ce4d28fb2dfcc5e952b605f9659858
sakeru.txt
Posted Aug 17, 2005
Authored by sinhack research labs

Sakeru version 0.1 is a URL filtering bypass proof of concept tool that takes advantage of weaknesses in Websense, etc.

tags | exploit, proof of concept
MD5 | 27a51ade94086288debec3a7f8de6f40
ECWshop.txt
Posted Aug 17, 2005
Authored by John Cobb | Site NoBytes.com

ECW Shop version 6.0.2 suffers from cross site scripting, various injection, and disclosure vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 75c91c659c362bb159406bb366bc7aff
linkBypass.txt
Posted Aug 17, 2005
Authored by Steve Scherf

It appears that firmware version 4.50.6 for the Linksys WRT54GS (hardware version 1) wireless router allows wireless clients to connect and use the network without actually authenticating.

tags | advisory
MD5 | 40f8151b9699e060317f59b5f6db0c3d
httpsplit.txt
Posted Aug 17, 2005
Authored by Amit Klein

This technical note describes a detection/prevention technique that works in many cases both with HTTP Response Splitting and with HTTP Request Smuggling.

tags | paper, web
MD5 | 6dd02db0137701d3c42986ed49b1c661
browser_ident.pdf
Posted Aug 17, 2005
Authored by Shreeraj Shah | Site net-square.com

White paper discussing web browser identification and how proper identification can enable a remote site to know what attacks to use against a visitor.

tags | paper, remote, web
MD5 | 41bc2d63f1daf1ac8281fe64670ec968
Gentoo Linux Security Advisory 200508-8
Posted Aug 17, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-08 - Xpdf, Kpdf and GPdf do not handle a broken table of embedded TrueType fonts correctly. After detecting such a table, Xpdf, Kpdf and GPdf attempt to reconstruct the information in it by decoding the PDF file, which causes the generation of a huge temporary file. Versions less than 3.00-r10 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-2097
MD5 | f5e7aaa9d14558063c205a22bf0362c8
Gentoo Linux Security Advisory 200508-6
Posted Aug 17, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-06 - Brandon Perry discovered that Gaim is vulnerable to a heap-based buffer overflow when handling away messages (CVE-2005-2103). Furthermore, Daniel Atallah discovered a vulnerability in the handling of file transfers (CVE-2005-2102). Versions less than 1.5.0 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-2102, CVE-2005-2103
MD5 | 5e88786744ee45009abe6e0ebf21b81a
Gentoo Linux Security Advisory 200508-7
Posted Aug 17, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-07 - When using a URLPlugin, AWStats fails to sanitize Referrer URL data before using them in a Perl eval() routine. Versions less than 6.5 are affected.

tags | advisory, perl
systems | linux, gentoo
advisories | CVE-2005-1527
MD5 | 968624b00553ade6a2d38f93a4193ad3
x_osh2.pl.txt
Posted Aug 17, 2005
Authored by Charles Stevenson

Operator Shell (osh) 1.7-12 local root exploit. New version of an old exploit.

tags | exploit, shell, local, root
MD5 | bbc767844763edfbf4e168e6b994939b
ajax.txt
Posted Aug 17, 2005
Site cpaint.sourceforge.net

The makers of CPAINT Ajax Toolkit have discovered code execution vulnerabilities in their software. All versions prior to version 1.3-SP are affected.

tags | advisory, vulnerability, code execution
MD5 | 38b6380e7746efd7b49f17b8520af8bd
Hardened-PHP Project Security Advisory 2005-15.67
Posted Aug 17, 2005
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

A vulnerability in the PHP XML-RPC libraries allows injection of arbitrary PHP code into eval() statements. Versions 1.1.1 and below are affected.

tags | advisory, arbitrary, php
advisories | CVE-2005-2498
MD5 | 03cdcfb82b17f83a0ae9398b28b52019
Hardened-PHP Project Security Advisory 2005-14.66
Posted Aug 17, 2005
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

A vulnerability in the PEAR XML-RPC libraries allows injection of arbitrary PHP code into eval() statements. Versions 1.3.3 and below are affected.

tags | advisory, arbitrary, php
advisories | CVE-2005-2498
MD5 | e3247149263b94ad7dcbb5463e849e7c
Page 1 of 3
Back123Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close