exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 104 RSS Feed

Files Date: 2008-12-31

OpenNHRP NBMA Next Hop Resolution 0.9.2
Posted Dec 31, 2008
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: pid file locking change in 0.9.1 broke daemonization.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | d3f239d55c7a1d19c1c3b149c9819311115bed08a455421b67b34e8dce6c6bc6
Rootkit Hunter 1.3.4 Is Released
Posted Dec 31, 2008
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: The changelog for this release is packed listing 4 new additions, 8 changes, and 9 bug fixes.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | d85d179850fee8ab04bc1733680c9c6dd8a1577975c12554db9c52bf4f7c50ba
RatProxy Security Audit Tool
Posted Dec 31, 2008
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

tags | tool, web, sniffer
SHA-256 | 07abd5e607305563bfb83338f034a1191ce24b39d95a1e7104a23f65ac331c5b
EzineIV.rar
Posted Dec 31, 2008
Authored by rtm | Site zonartm.org

Road Technological Minds - Essential #4 - This issue covers cracking 2Wire routers, using Bluetooth on FreeBSD, Botnet, and more. Written in Spanish.

tags | magazine
systems | freebsd
SHA-256 | d2eb298e9e0ae2bb441607f4999f6dbbcd35302dbe60470f925f038d552adde2
Essential01.rar
Posted Dec 31, 2008
Authored by rtm | Site zonartm.org

Road Technological Minds - Essential #1 - This issue covers interaction with DHCP-WINS-DNS, protecting the kernel, KGPG and GPG, and more. Written in Spanish.

tags | kernel, magazine
SHA-256 | c0fe995252fbe132f247cb7c9694b25514df755969dd670697192cc2029e6b06
Essential02.rar
Posted Dec 31, 2008
Authored by rtm | Site zonartm.org

Road Technological Minds - Essential #2 - This issue covers IPTables, cAd the trojan, visual basic, ssh use, and more. Written in Spanish.

tags | trojan, magazine
SHA-256 | 8f0a0393039f1b3c7c02e0c1092640a1a57b3abe03c7e8d8442922c997abf996
Essential03.rar
Posted Dec 31, 2008
Authored by rtm | Site zonartm.org

Road Technological Minds - Essential #3 - This issue covers emulators, password cracking, gnupg, and more. Written in Spanish.

tags | magazine
SHA-256 | 21ae29b76bdaa6b350a356df9d209e7b51d0c1fb86308d3bc712f0bb0dab1e57
Essential05.pdf
Posted Dec 31, 2008
Authored by rtm | Site zonartm.org

Road Technological Minds - Essential #5 - This issue covers fuzzing, remote file inclusion, Samurai Framework testing, and more. Written in Spanish.

tags | remote, file inclusion, magazine
SHA-256 | 984e9046fec383221a7ffb33eb13df36b9eacf849c675b8ffb8953fbeca64bff
rtm_logo.png
Posted Dec 31, 2008
Authored by rtm

RTM Logo.

tags | magazine
SHA-256 | fbb460ff17dbe262becaa336602299e35ba1181e768c0a38c30dba95e7559c60
Apache 1.x/2.x suphp Bypass Safe Mode Exploit
Posted Dec 31, 2008
Authored by Mr.SaFa7 | Site v4-team.com

Apache 1.x/2.x suphp bypass safe mode exploit that makes use of suPHP_ConfigPath.

tags | exploit, bypass
SHA-256 | df977d8826cdbbcb8a29519152ec54812d2af1a7dff1dd20582dd7f1879983d4
getaphpsite PHP Careers Search File Upload
Posted Dec 31, 2008
Authored by ZoRLu

getaphpsite PHP Careers Search suffers from a remote file/shell upload vulnerability.

tags | exploit, remote, shell, php, file upload
SHA-256 | 30070527f9e92fc727147a927fff8b05978a8212898a7115bcaeed9201409697
getaphpsite Top Sites SQL Injection
Posted Dec 31, 2008
Authored by ZoRLu

getaphpsite Top Sites suffers from a remote SQL injection vulnerability in category.php.

tags | exploit, remote, php, sql injection
SHA-256 | d9c97cb5fd40a00452f66e2d9f16853242c0ec3022da197ad2f7172f2393736c
getaphpsite e-store SQL Injection
Posted Dec 31, 2008
Authored by ZoRLu

getaphpsite e-store suffers from a remote SQL injection vulnerability in SearchResults.php.

tags | exploit, remote, php, sql injection
SHA-256 | 0f26275dd7252d6d0215d231852a2e2628f28efeda959d5b4e68b50ad21fa52d
getaphpsite Cheats SQL Injection
Posted Dec 31, 2008
Authored by ZoRLu

getaphpsite Cheats suffers from remote SQL injection vulnerabilities in categories.php and view_reviews.php.

tags | exploit, remote, php, vulnerability, sql injection
SHA-256 | 083613c916bfbf9c537ef132c14fcdc8ad3c211c5aa1dd11586a17d11b703d5a
getaphpsite Home Business Directory SQL Injection
Posted Dec 31, 2008
Authored by ZoRLu

getaphpsite Home Business Directory suffers from a remote SQL injection vulnerability in directory.php.

tags | exploit, remote, php, sql injection
SHA-256 | 0d7e690f259bc59cd4f869bd273ca70c7eb2773d20aa446381c62a2a030bf6c6
uCon 2009 Call For Participation
Posted Dec 31, 2008
Site ucon-conference.org

uCon will be held February 28, 2009, three days after the best street carnival in the world, in Recife, Brazil. It aims to bring together academics, hackers and information security enthusiasts from all over the country to share cutting-edge ideas and thoughts about their latest developments and techniques in the field.

tags | paper, conference
SHA-256 | caf17a3495cb33cc1ebc41c2d584b1efda7986cb5f9a6f817209ea19683621d5
Abarcar Florist Shop System SQL Injection
Posted Dec 31, 2008
Authored by ZoRLu

Abarcar Florist Shop System Script suffers from remote and blind SQL injection vulnerabilities in content.php.

tags | exploit, remote, php, vulnerability, sql injection
SHA-256 | becec5daa916d0a6adbfc0d4a4f46fa4e7a53b334ac481f698a967cc4be0611e
Abarcar Manufacturing System Script SQL Injection
Posted Dec 31, 2008
Authored by ZoRLu

Abarcar Manufacturer System Script suffers from remote and blind SQL injection vulnerabilities in plistings.php.

tags | exploit, remote, php, vulnerability, sql injection
SHA-256 | 0f352c42dab1da0770e2bd77b1523e74f244eef74304a00d8121fe02de2e6aa9
Project Zero Wine Malware Analysis
Posted Dec 31, 2008
Authored by Joxean Koret | Site zerowine.sourceforge.net

Zero wine is an open source research project to dynamically analyze the behavior of malware. Zero wine just runs the malware using WINE in a safe virtual sandbox (in an isolated environment) collecting information about the APIs called by the program.

systems | unix
SHA-256 | 127913ecc9ae147baf58b9cb4a644bc09171f124c54ce62693d70ab4ee9c29f7
Whitepaper - MD5 Considered Harmful Today
Posted Dec 31, 2008
Authored by Alexander Sotirov, Arjen Lenstra, Benne de Weger, Dag Arne Osvik, David Molnar, Jacob Appelbaum, Marc Stevens | Site win.tue.nl

MD5 Considered Harmful Today - Creating A Rogue CA Certificate. The authors of this paper have identified a vulnerability in the Internet Public Key Infrastructure (PKI) used to issue digital certificates for secure websites. As a proof of concept they executed a practical attack scenario and successfully created a rogue Certification Authority (CA) certificate trusted by all common web browsers. This certificate allows them to impersonate any website on the Internet, including banking and e-commerce sites secured using the HTTPS protocol.

tags | paper, web, protocol, proof of concept
SHA-256 | 7bc4a39c6558907b3bf4b6c5957b648d7c871e27bac56e6bbd00a2afbfd679f2
Inguma Penetration Testing Toolkit
Posted Dec 31, 2008
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Changes: Many new additions, various support, and a few changes have been made.
tags | tool, scanner, python
systems | unix
SHA-256 | 8d2c9670ee8b7e32c24e719d2f3be71a7d66596177066c10ed4d9db6063ef761
Pixel8 Web Photo Album 3.0 SQL Injection
Posted Dec 31, 2008
Authored by AlpHaNiX

Pixel8 Web Photo Album version 3.0 suffers from a remote SQL injection vulnerability in Photo.asp.

tags | exploit, remote, web, sql injection, asp
SHA-256 | 15915171465e700d164cdb26c665d1dc355c430384b7ced6b7faa59183ebcc54
Sepcity Lawyer Portal SQL Injection
Posted Dec 31, 2008
Authored by Osmanizim | Site osmanizim.com

Sepcity Lawyer Portal suffers from a remote SQL injection vulnerability in deptdisplay.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 082f5a4ff4441a7b5a9fd96a5f812734d25fcc65da1f0aa0685bbc000e29953b
Sepcity Shopping Mall SQL Injection
Posted Dec 31, 2008
Authored by Osmanizim | Site osmanizim.com

Sepcity Shopping Mall suffers from a remote SQL injection vulnerability in shpdetails.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 541fbf8d99ebbf95ba35c9832226ab3c45f14a787298ba49a418b8d8b90a06d2
FSpy Linux Filesystem Activity Monitoring
Posted Dec 31, 2008
Authored by Richard Sammet | Site mytty.org

FSpy is an easy to use Linux filesystem activity monitoring tool which is meant to be small, fast, and low overhead on system resources.

systems | linux
SHA-256 | 300f73e795e2e7a815787ba554bd43634752e92a91a37476c55582b4017941d0
Page 1 of 5
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close