exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 1999-10-26 to 1999-10-27

Posted Oct 26, 1999
Authored by Mixter | Site members.tripod.com

fwmail is a small secure daemon for inetd that forwards incoming smtp traffic to another sendmail server, acting as a gateway, and optionally anonymizing the senders origin. Version 1.1.

systems | unix
SHA-256 | aa50ed680dff4ba963354310ae65f519721901b409409b2ad2f3d944d5b6794b
Posted Oct 26, 1999
Authored by Mixter | Site members.tripod.com

nsat is a bulk security scanner designed for recoverable long-time scans, optimized for speed and stability, that scans and audits about 60 different services and 170 cgis. Version 1.08.

tags | tool, cgi, scanner
systems | unix
SHA-256 | eb55372260ad6fd90f349dab6565c49e8a639a33693e0a0fdcfed17433e4eeeb
Posted Oct 26, 1999

Several vulnerabilities exist: ypserv prior 1.3.9 allows an administrator in the NIS domain to inject password tables; rpc.yppasswd prior has got a buffer overflow in the md5 hash generation [SuSE linux is unaffected by this, other linux falvors are]; rpc.yppasswdd prior 1.3.9 allows users to change GECO and login shell values of other users. Affected are all linux distributions using the ypserv package. Website for patches here.

tags | overflow, shell, vulnerability
systems | linux, suse
SHA-256 | 760ce3bd92792f507a4556e1a3b80e429915e2e35a020f7efc814d176a4281a6
Posted Oct 26, 1999
Authored by Vetesgirl | Site self-evident.com

UNIX/Win remote vulnerability exploit scanner with Fixes for Vulnerabilities. based on ben-z fts-rvscan scanner. Includes: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner) VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass/get (a b c scanner and getter), AMD/get (mass a b c scanner and getter), MOUNTD/get ( mass a b c scanners/getter), many exploits, Fixes, and utils included.

Changes: Took all the rpcinfo processes out and it only runs rpcinfo once which makes it go faster. Added a few more vuln checks (keeping up to date with Remote vulns that have came out on bugtraq, securiteam, packetstorm, and security bugware. Updated all the mass scanners (amd,cmsd,mountd).
tags | tool, remote, scanner, trojan, vulnerability
systems | unix
SHA-256 | 99c3a3de5a307efc0d5dde9ebe1a45fbeaa0ec8158ead50ee84d677dbbe243e0
Posted Oct 26, 1999
Authored by Int 13h | Site TLSecurity.net

A list of the TCP ports which trojans use. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, tcp
SHA-256 | 798103e287d7346856c86294b48fe70090244b2a4c81c8f143677b3b4393bd76
Posted Oct 26, 1999
Authored by Martin Hinner | Site penguin.cz

DOSfw is a simple Linux netfilter firewall module which drops denial-of-service attack packets. The current version supports only two attacks and TCP Fingerprint scan, but you may expect other attacks in the (hopefully near) future.

tags | tcp
systems | linux
SHA-256 | 3e3130198ff8e4d64cc597ae528140fb041f6deea4eaa8dacc470c7fec948060
Posted Oct 26, 1999
Authored by Ronnie Sahlberg | Site home.swipnet.se

FWT is a web based administration package for remote configuration and administration of the firewalling and (some) networking aspects of the Linux operating system. The tool is easy to use and can configure most useful parts of ipchains (including masquerading), policy routing, ethernet alias interfaces and redirection of TCP traffic through a masquerading firewall.

tags | remote, web, tcp
systems | linux
SHA-256 | 6fb3676c874f25ef731ce868c549790434192d7c15b75373d3bfc1240a703c97
Posted Oct 26, 1999
Authored by Mike Babcock

Logcolorise is a PERL script to make your syslog generated log files much more legible by colourising them (context highlighting based on keywords).

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | c63321d7d299bfb4acc2b06a4c5e8179a58c46288c934847e20ecb25751c7ee1
Posted Oct 26, 1999
Authored by Tommy. | Site soomka.com

Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)

Changes: The Ability to specify a message to speak instead of the line in the watched file (using -p), the old -p has been moved to -P to speak the line in the file, and the -V (version) and -S (sleep time) options have been added.
tags | tool, intrusion detection
systems | unix
SHA-256 | 0011bf9bb3235b1f12a7a203cf243e8db9ffb91b311a8147d9873a667d78fb33
Posted Oct 26, 1999
Authored by Eliptic Curve

A simple GUI trojan that when added to the autostart *see regedit* registry will log the passwords of the Novell NetWare School Vista user to c:\windows\samples .txt. Loginw31.exe is an exact duplicate of the login while Login31(2).exe is a system confirmation tricking the user to re-enter their password.

tags | trojan, registry
systems | windows
SHA-256 | 58d1a61a0dad0a8bd9fdf8856cb55f06ea965f5b92b98a29653c46aae61937c7
Posted Oct 26, 1999
Authored by misteri0

pr0tscan was based on vetescan, but added more vulns and tried to make it run more smoother. Winscan, (scans win/nt systems for latest trojans/remote exploits). The docs include fixes for the vulnerabilities it finds.

tags | tool, remote, scanner, trojan, vulnerability
systems | unix
SHA-256 | 492897184ae35990598618bea3d466e9283d566f80648c61ea9254760a094c18
Posted Oct 26, 1999
Authored by Trankill

logController allows you to control the size of some files that tend to become too large (logfiles). A config file allows you to define which files to monitor and the sizes not to exceed. If one or more files exceed the limit size, they are automatically truncated to a new user-defined size and the area truncated can be erased, or compressed and stored.

systems | unix
SHA-256 | 13b9e31af419c0a7b8b3fd18a2724a16c5b2e33b81f142a08655ea85d257030f
Posted Oct 26, 1999
Authored by Spikeman

Spikeman's DoS Attack Tool - Revision 5. 31 denial of service attacks at once.

tags | denial of service
SHA-256 | 9f930571591e3d0822220c2d809879ca668143471a6765e5e25f7583bd14d138
Posted Oct 26, 1999
Authored by Marc Schaefer

Forged packets can be send out from a Linux system, for example for NFS attacks or any other protocol relying on addresses for authentification, even when protected from the outside interfaces by firewalling rules. Most of the time, existing firewalling rules are bypassed. This requires at least a shell account on the system.

tags | exploit, shell, protocol
systems | linux
SHA-256 | 8d159590c7c839774eb2f8a7c4dddf0737f16a6cf7e3d10393036232f45f5469
Posted Oct 26, 1999
Authored by m0f0

Walker - Compuserve 3.0 Password Decrypter. It decrypts Compuserve 3.0 ini files (cis.ini) that stores account passwords.

SHA-256 | 165027448c137a47f5149973229d79d31f0b0a137efbc4f0c01f848456b74fa8
Posted Oct 26, 1999
Authored by pho

Pho's alternate remote OS detection techinques page has been updated. Includes information on ICMP techniques, ARP techniques, IP techniques, and UDP techniques.

tags | paper, remote, udp
SHA-256 | 8ad58add858120309dfa20fecd05c30e086888dd27674d03eb1a7771daeb0615
Posted Oct 26, 1999
Authored by Sozni

If you have installed Microsoft Office 2000 or keep current on your Windows Updates, you may have noticed a new WebFolders namespace in Windows Explorer. The fun part is that WebFolders have some significant weaknesses (inherited from FrontPage) and are such a new concept that it turns out they make a great entry point into a remote server.

tags | exploit, remote
systems | windows
SHA-256 | 01adda0b5af462be99d4d8071315e8516891937780a27b461c6b4e7ab4d80727
Page 1 of 1

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By