what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 2,403 RSS Feed

Files Date: 1999-09-01 to 1999-09-30

proftpd.1.2.0pre6.txt
Posted Sep 28, 1999

proftpd 1.2.0pre6 patch

tags | exploit
SHA-256 | 5bdc9aa9e1d57b44dbf88aab490454e6434e8ff5c0144e794f2d95918ae4b618
linux_GNOME_exploit.txt
Posted Sep 28, 1999

Virtually any program using the GNOME libraries is vulnerable to a buffer overflow attack!

tags | exploit, overflow
SHA-256 | 27f7d493a0ad77755b1b1284a650c04745451802d22a2093bee4bdecf5682a29
FreeBSD_DoS.txt
Posted Sep 28, 1999

FreeBSD vfs_cache.c in version 3.0 and later is vulnerable to a denial of service attack as there is no way to purge entries from the cache.

tags | exploit, denial of service
systems | freebsd
SHA-256 | bd076457f63ba433e668902ae2abeed4b04f14b8d13e7b4cff6f2455d620f582
FreeBSD-SA-99.05.fts.txt
Posted Sep 28, 1999

fts library routine vulnerability. Local users could gain root access.

tags | exploit, local, root
SHA-256 | ce67cec1e5bb2748fc8ef9819ef8460f79229b6f4d78e7caeef04af037340737
dtaction.digital.unix.vuln.txt
Posted Sep 28, 1999

The dtaction vulnerability in CDE can be exploited for local root compromise on Digital Unix systems. Also verified for Solaris 7, 2.6, 2.5.1.

tags | exploit, local, root
systems | unix, solaris
SHA-256 | 08bb78d647b3cfbf293215485277311b70d46215f6a653d950b61923933445d6
cfingerd_bof.txt
Posted Sep 28, 1999

cfingerd version 1.4.2 is vulnerable to local buffer overflow attack through not checking the gecos field properly. Exploit for FreeBSD provided.

tags | exploit, overflow, local
systems | freebsd
SHA-256 | a9308af867b771b47b698b1ab88fa06596b04bd7896758bfc21b5aca3cf68770
amd.patch
Posted Sep 28, 1999

Patch for amd. Prevent remote users from executing arbitrary code as root in the amd daemon context.

tags | exploit, remote, arbitrary, root
SHA-256 | 90eb9d58c8d1ac2665e015cc26a337f33de00361023b565d00bf182ab2bf0db0
ActiveX_bof.txt
Posted Sep 28, 1999

Several ActiveX buffer overruns

tags | exploit, overflow, activex
SHA-256 | 13bd59cd10996e713aab1f5b0125964949f126215dfa17b70e3575a56425c3ef
ch4x-5.txt
Posted Sep 28, 1999
Authored by ch4x

ch4x0rzine #5 - "canada h4xor" e-zine devoted to hacking/phreaking in Canada. This issue includes: how to spoof your own IP, a perl http server, editing the NT register, DMS 100 and blue boxing prevention, and more.. ch4x web site, thanks to phaceman.

tags | web, perl, spoof, magazine
SHA-256 | 8c97e9e7c0fa29dbd77013790399c44943432970233ec9169479ed4dafcc94cf
mason-0.13.0.92-0.src.rpm
Posted Sep 27, 1999

Mason 0.13.92 developer's release source rpm.

tags | tool, firewall
systems | unix
SHA-256 | 1d974829e08250dc818457eb5ad58cd651b2f418ea59f2dc422558ef2e0592e1
mason-0.13.0.92-0.noarch.rpm
Posted Sep 27, 1999

Mason 0.13.92 developer's release noarch rpm.

tags | tool, firewall
systems | unix
SHA-256 | 557ef1f1ded3c624575a24037f59519d2c8881b335b489d7f100f94c33723b71
mason-0.13.0.92.tar.gz
Posted Sep 27, 1999
Authored by Bill Stearns

Mason is a Linux based firewall, but none like you've ever used. In short, you put Mason into learning mode and run the services to the Internet you wish to support. Mason will then take these log entries and turn them into a set of packet filtering rules. Pretty cool eh? No ACK compliment rules to worry about, no "what was that service port again?" decisions to worry about, simply plug it in, let it learn and off you go. :)". Mason is a tool that interactively builds a firewall using Linux' ipfwadm or ipchains firewalling. You leave mason running on the firewall machine while you are making all the kinds of connections that you want the firewall to support (and want it to block). Mason gives you a list of firewall rules that exactly allow and block those connections. Developer's release. Official Site: here.

tags | tool, firewall
systems | linux, unix
SHA-256 | 249c66c51f2c56b89ed111fd6cfcd3bd3fc296654b618fb7b42b811bfe7aa222
snort-1.3.tar.gz
Posted Sep 27, 1999

Snort 1.3, the lightweight network intrusion detection system. This version has a number of new features, including four new command line switches, three new rule options, two new rule operators, performance enhancements, and bug fixes. The official Snort homepage is here

tags | tool, sniffer
SHA-256 | 1cbe8322edbc66f8cf71a5cd16a16cc8e46c0a1f5de46f209d4799ffb56baa70
zodiac-0.2.25.tar.gz
Posted Sep 27, 1999
Authored by scut smiler

Zodiac is a portable, extensible and multithreaded DNS tool. It is meant to be used as a DNS packet monitor and DNS protocol test and debuging tool. It's basic features are: sniffing of DNS datagrams on an ethernet device, decoding of all types of DNS packets, including safe decompression (partly finished, SOA record are, for example, not decoded yet), nice display and gui, if you like ncurses and text based frontends, always interactive in all situations through built in command line, threaded and flexible design. Advanced features include: local DNS spoof handler, jizz DNS spoof, exploiting a weakness in old bind implementations, determines jizz-weakness, id-prediction and resolver type remotely, id spoofing, exploiting a weakness in the dns protocol itself, implements some advanced DNS denial of service attacks, including flood, label compression and unres attack, advanced DNS smurf.

tags | denial of service, local, spoof, protocol
systems | unix
SHA-256 | ddfb57fde535b5fbb24daa4e791eb0f00d2bf8d868d1fd62333fccdc80bec37c
ShokDial4-1.tgz
Posted Sep 27, 1999
Authored by Matt Conover

ShokDial 4.1, an excellent war dialer for linux. Another great tool from w00w00. (

tags | tool, wardialer
systems | linux
SHA-256 | 6aa7cc188631daa5591a9acabe45496868ad48f504156338dcca6f633bc30452
cracking.txt
Posted Sep 26, 1999

Cracking, Part I (version 1.0) - learn how to crack programs.

SHA-256 | b611ef16197fa5d62fae6c0ef18bdc6f470e18b6049b47773df700dc86e21c40
tryseg-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

Test for catching the SIGSEGV or SIGBUS without crashing and combined with try{}catch(){}.

SHA-256 | 433fc3dd738edd7c15e31f6955b42940c9811cbd42f2c5eeb0cdb4401538fd0a
segvbus-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

Test for catching the SIGSEGV and SIGBUS without crashing and with setjmp()/longjmp().

SHA-256 | b44e45195454362e4fd93b7b68e5e0b35b9007c4f48fe8964e280152d0409c16
liberty-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

This will fill up all available memory, if no ulimit is set in the kernel.

tags | kernel
SHA-256 | 1fa0f799e52a1ff1903c899432298c98d4ac33f32697f3a9e95aeec19e670396
ia.txt
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

IP Aliasing - How to set it up on a unix host.

systems | unix
SHA-256 | 80d76dd96e4f94ca4b4fa85648152292de875304c4ad03e27236424663471b96
tcp_relay-unix.c
Posted Sep 25, 1999
Authored by synnergy, Guidob | Site synnergy.net

A tcp relay. For more details, read the source.

tags | tcp
SHA-256 | bc1dddec1caaa8ee6987e15cf35f25c757e2dc844010474a9ea661fe76ebef93
ethereal-0.7.5.tar.gz
Posted Sep 25, 1999

Ethereal is a network protocol analyzer for Unix. It allows you to examine data from a live network, or from a capture file on disk. One of the goals of the project is to have an application that is similar in functionality to Network Associates' NetXRay or the AG Group's EtherPeek. Although these are both excellent products, neither of them runs under Unix.

tags | tool, sniffer, protocol
systems | unix
SHA-256 | abc62ff58d844dd758e9f8b7d6709c5f9083a5c17ebffb0cb35b052a90d7c413
inet-3.txt
Posted Sep 25, 1999
Authored by InET

InET Issue #3. In spanish.

tags | magazine
SHA-256 | c423a141058a37fa4493100fea0d5f0eab821ac7da09885f08a68b112c3df311
inet-3.zip
Posted Sep 25, 1999
Authored by InET

InET Issue #3. In spanish.

tags | magazine
SHA-256 | 4f3b41fbae11248e96902d071a0be2869d8ffb8704efcf169185b9d90a07b42b
inet-1.txt
Posted Sep 25, 1999
Authored by InET

InET Issue #1. In spanish.

tags | magazine
SHA-256 | 76312a7076af8a5ec1d05d4a7136f4bef071d9a4fd9fd3d98bd77b8339819535
Page 2 of 97
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close