Twenty Year Anniversary
Showing 1 - 18 of 18 RSS Feed

Files Date: 2008-05-30

kismet-2008-05-R1.tar.gz
Posted May 30, 2008
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

Changes: WRT54 fixes, multiple Darwin fixes, GPS rewrite and fixes, Nokia tweaks, and Imagemagick fixes.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
MD5 | 6ee365d36354b4dee4945e67f8149294
nebula-0.2.2.tar.gz
Posted May 30, 2008
Authored by Tillmann Werner | Site nebula.mwcollect.org

Nebula is a data analysis tool that automatically generates intrusion signatures from attack traces. It runs as a daemon that processes data submitted from honeypots. New signatures are published as Snort rules and can be used to defend a network from future intrusion attempts.

tags | tool, sniffer
MD5 | 9d388753e6bf14c9811a92a586ce8cfa
nowsmsmms-overflow.txt
Posted May 30, 2008
Authored by Heretic2

Now SMS/MMS Gateway version 5.5 remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
MD5 | 49f4abb982903edd29a7f3ca736e3bc5
mambomambads-sql.txt
Posted May 30, 2008
Authored by H-T Team | Site no-hack.fr

Remote SQL injection exploit for the Mambo mambads component version 1.0 RC1 Beta and 1.0 RC1.

tags | exploit, remote, sql injection
MD5 | 7e0907265c933df3d0299268dbe846e6
adv96-K-159-2008.txt
Posted May 30, 2008
Authored by M.Hasran Addahroni | Site advisories.echo.or.id

HiveMaker Professional versions 1.0.2 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 3559711ae15bdf164869ffb27f37c04d
applemail-dos.txt
Posted May 30, 2008
Authored by David Wharton

Apple Mail versions 3.1 and 3.2 suffer from a denial of service vulnerability when reading a specially crafted e-mail.

tags | exploit, denial of service
systems | apple
MD5 | ce912545b903fa38b3114b0702de84f7
dotnetnuke-xss.txt
Posted May 30, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

Dot Net Nuke versions 4.8.3 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 904a25b30b16bbaf6000063abbc27ac0
phpbook-upload.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

PHP Booking Calendar version 10d arbitrary file upload exploit.

tags | exploit, arbitrary, php, file upload
MD5 | d402515882cf622d34091b2b8760dbd2
cmsscratch-traverse.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

CMS from Scratch versions 1.1.3 and below suffer from a directory traversal vulnerability in image.php.

tags | exploit, php, file inclusion
MD5 | 1e43ee740d022518e2dd23dad1963f5f
phpbook-sql.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

PHP Booking Calendar version 10d remote SQL injection exploit that retrieves the administrator login and password hash.

tags | exploit, remote, php, sql injection
MD5 | b6350f88a0485a428470e288c73a9dde
asus-overflow.txt
Posted May 30, 2008
Authored by Heretic2

ASUS DPC proxy versions 2.0.0.16 and 2.0.0.19 remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
MD5 | 699076b2a1cd858005940e45fc27c360
Secunia Security Advisory 30406
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in RockN Audio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 216dfa0e83b81fabb0273ec3b0a083f5
Secunia Security Advisory 30413
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for kvm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, fedora
MD5 | 6c9067022c9d9e78641862c37278bf12
Secunia Security Advisory 30417
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in cbrPager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 395999732a8feb65fed669d1d9648c97
Secunia Security Advisory 30437
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 4bca7998adbcff4c1c4d8f84c90830f5
Secunia Security Advisory 30446
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Gold Wave Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 065a74dd6e514b6c019f7e9090671416
Secunia Security Advisory 30447
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in various HiFi products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 2442facb2806348082b4dbb96bf8d7be
Secunia Security Advisory 30459
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in various Color7 Technology products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 8f1b71c7f51b64500709e345f01405db
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

April 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    5 Files
  • 2
    Apr 2nd
    17 Files
  • 3
    Apr 3rd
    11 Files
  • 4
    Apr 4th
    21 Files
  • 5
    Apr 5th
    17 Files
  • 6
    Apr 6th
    12 Files
  • 7
    Apr 7th
    1 Files
  • 8
    Apr 8th
    6 Files
  • 9
    Apr 9th
    21 Files
  • 10
    Apr 10th
    18 Files
  • 11
    Apr 11th
    42 Files
  • 12
    Apr 12th
    7 Files
  • 13
    Apr 13th
    14 Files
  • 14
    Apr 14th
    1 Files
  • 15
    Apr 15th
    1 Files
  • 16
    Apr 16th
    15 Files
  • 17
    Apr 17th
    20 Files
  • 18
    Apr 18th
    24 Files
  • 19
    Apr 19th
    20 Files
  • 20
    Apr 20th
    7 Files
  • 21
    Apr 21st
    10 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close