exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2008-05-30

kismet-2008-05-R1.tar.gz
Posted May 30, 2008
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

Changes: WRT54 fixes, multiple Darwin fixes, GPS rewrite and fixes, Nokia tweaks, and Imagemagick fixes.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | a298d44f8a6ec977021cd492a720987ded81b5c4baf5f68b36f1282a23c9f7d3
nebula-0.2.2.tar.gz
Posted May 30, 2008
Authored by Tillmann Werner | Site nebula.mwcollect.org

Nebula is a data analysis tool that automatically generates intrusion signatures from attack traces. It runs as a daemon that processes data submitted from honeypots. New signatures are published as Snort rules and can be used to defend a network from future intrusion attempts.

tags | tool, sniffer
SHA-256 | a72605776c17e6c7038972b6fcfa0d17f63a693b21e21701518d5f1e328aa4ed
nowsmsmms-overflow.txt
Posted May 30, 2008
Authored by Heretic2

Now SMS/MMS Gateway version 5.5 remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | fb10833a3ceda64288a1c504ea3f32181e19fd5494a383d7ac1447d494118766
mambomambads-sql.txt
Posted May 30, 2008
Authored by H-T Team | Site no-hack.fr

Remote SQL injection exploit for the Mambo mambads component version 1.0 RC1 Beta and 1.0 RC1.

tags | exploit, remote, sql injection
SHA-256 | 1371c22c9ff1adf3da246d12be00f789787487914587e621e5db10042902baf5
adv96-K-159-2008.txt
Posted May 30, 2008
Authored by M.Hasran Addahroni | Site advisories.echo.or.id

HiveMaker Professional versions 1.0.2 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | edecf2cabc9140694b7fe0545b10328ec7fe6f5e9483e279b9184bae6e318ab9
applemail-dos.txt
Posted May 30, 2008
Authored by David Wharton

Apple Mail versions 3.1 and 3.2 suffer from a denial of service vulnerability when reading a specially crafted e-mail.

tags | exploit, denial of service
systems | apple
SHA-256 | ee6c6052c1a8464b7f929eea3c3351ac59de5b64c5f6f924225eee4a43f255de
dotnetnuke-xss.txt
Posted May 30, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

Dot Net Nuke versions 4.8.3 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 86cd5f32cd7cd1c3674ce7d617eff9c9047049a44b5d05f092d43848ff71e81a
phpbook-upload.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

PHP Booking Calendar version 10d arbitrary file upload exploit.

tags | exploit, arbitrary, php, file upload
SHA-256 | 933684b5cca85e8930bf073739a60881ae9474d8a0eca85e813a587ee77c5b2b
cmsscratch-traverse.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

CMS from Scratch versions 1.1.3 and below suffer from a directory traversal vulnerability in image.php.

tags | exploit, php, file inclusion
SHA-256 | 3f4831f4fdb0ddc7de6a97e23e86dec24c92e7b468890d059ed9452891c221d8
phpbook-sql.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

PHP Booking Calendar version 10d remote SQL injection exploit that retrieves the administrator login and password hash.

tags | exploit, remote, php, sql injection
SHA-256 | 262259f83a4516baf4c9357afa3f71292f7b19b03e75adcd312d3bc801df029a
asus-overflow.txt
Posted May 30, 2008
Authored by Heretic2

ASUS DPC proxy versions 2.0.0.16 and 2.0.0.19 remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | 95ad9e971e97b7a96c4d56b03b003adcba794f0811d9d05a78b73dd5d0e1c8ef
Secunia Security Advisory 30406
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in RockN Audio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 31bbed62d079085c932940b06b0727c26fad8c80a5e8b277b816edbe81b6fe56
Secunia Security Advisory 30413
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for kvm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, fedora
SHA-256 | d65453f648ee2aab6c67431b793b4e19b09ff7a25c6ce05500ae782f3861199c
Secunia Security Advisory 30417
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in cbrPager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 24213dc66f50daf5f65733572602a764735d35fd4b52c987bd7c8e731ff991c6
Secunia Security Advisory 30437
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | dafb1543e61b3a1f40a74b4739a670722c03112e39f88520a5e796d243fc650d
Secunia Security Advisory 30446
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Gold Wave Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2947d335e991d9e3e2957d1c9814bf761bf9f8127ac37c4430099438d50444d2
Secunia Security Advisory 30447
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in various HiFi products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 894b9968873837b644432f9ac1fd927a52429f99bbfa9eca5fd803b33c4ad8c2
Secunia Security Advisory 30459
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in various Color7 Technology products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 740ab8393f2b72a0afb7e2247b30e656cbeeba69587095d2fab42dbf23ac3248
Page 1 of 1
Back1Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close