exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 387 RSS Feed

Files Date: 1999-10-01 to 1999-10-31

nsat-1.08.tgz
Posted Oct 26, 1999
Authored by Mixter | Site members.tripod.com

nsat is a bulk security scanner designed for recoverable long-time scans, optimized for speed and stability, that scans and audits about 60 different services and 170 cgis. Version 1.08.

tags | tool, cgi, scanner
systems | unix
SHA-256 | eb55372260ad6fd90f349dab6565c49e8a639a33693e0a0fdcfed17433e4eeeb
suse.ypserv.txt
Posted Oct 26, 1999

Several vulnerabilities exist: ypserv prior 1.3.9 allows an administrator in the NIS domain to inject password tables; rpc.yppasswd prior 1.3.6.92 has got a buffer overflow in the md5 hash generation [SuSE linux is unaffected by this, other linux falvors are]; rpc.yppasswdd prior 1.3.9 allows users to change GECO and login shell values of other users. Affected are all linux distributions using the ypserv package. Website for patches here.

tags | overflow, shell, vulnerability
systems | linux, suse
SHA-256 | 760ce3bd92792f507a4556e1a3b80e429915e2e35a020f7efc814d176a4281a6
vetescan10-26-1999.tar.gz
Posted Oct 26, 1999
Authored by Vetesgirl | Site self-evident.com

UNIX/Win remote vulnerability exploit scanner with Fixes for Vulnerabilities. based on ben-z fts-rvscan scanner. Includes: WINSCAN (scans win/nt systems for latest trojans/remote exploits), VETE (single vuln/host scanner) VETES (single vuln/host w/o host checking), VETEMASS (mass vuln/host scanner), CMSD mass/get (a b c scanner and getter), AMD/get (mass a b c scanner and getter), MOUNTD/get ( mass a b c scanners/getter), many exploits, Fixes, and utils included.

Changes: Took all the rpcinfo processes out and it only runs rpcinfo once which makes it go faster. Added a few more vuln checks (keeping up to date with Remote vulns that have came out on bugtraq, securiteam, packetstorm, and security bugware. Updated all the mass scanners (amd,cmsd,mountd).
tags | tool, remote, scanner, trojan, vulnerability
systems | unix
SHA-256 | 99c3a3de5a307efc0d5dde9ebe1a45fbeaa0ec8158ead50ee84d677dbbe243e0
Trojans.txt
Posted Oct 26, 1999
Authored by Int 13h | Site TLSecurity.net

A list of the TCP ports which trojans use. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, tcp
SHA-256 | 798103e287d7346856c86294b48fe70090244b2a4c81c8f143677b3b4393bd76
dosfw-0.1.tar.bz2
Posted Oct 26, 1999
Authored by Martin Hinner | Site penguin.cz

DOSfw is a simple Linux netfilter firewall module which drops denial-of-service attack packets. The current version supports only two attacks and TCP Fingerprint scan, but you may expect other attacks in the (hopefully near) future.

tags | tcp
systems | linux
SHA-256 | 3e3130198ff8e4d64cc597ae528140fb041f6deea4eaa8dacc470c7fec948060
fwt126.tar.gz
Posted Oct 26, 1999
Authored by Ronnie Sahlberg | Site home.swipnet.se

FWT is a web based administration package for remote configuration and administration of the firewalling and (some) networking aspects of the Linux operating system. The tool is easy to use and can configure most useful parts of ipchains (including masquerading), policy routing, ethernet alias interfaces and redirection of TCP traffic through a masquerading firewall.

tags | remote, web, tcp
systems | linux
SHA-256 | 6fb3676c874f25ef731ce868c549790434192d7c15b75373d3bfc1240a703c97
logcolorise-1.0.7.tar.gz
Posted Oct 26, 1999
Authored by Mike Babcock

Logcolorise is a PERL script to make your syslog generated log files much more legible by colourising them (context highlighting based on keywords).

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | c63321d7d299bfb4acc2b06a4c5e8179a58c46288c934847e20ecb25751c7ee1
tailbeep-0.41.tar.gz
Posted Oct 26, 1999
Authored by Tommy. | Site soomka.com

Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)

Changes: The Ability to specify a message to speak instead of the line in the watched file (using -p), the old -p has been moved to -P to speak the line in the file, and the -V (version) and -S (sleep time) options have been added.
tags | tool, intrusion detection
systems | unix
SHA-256 | 0011bf9bb3235b1f12a7a203cf243e8db9ffb91b311a8147d9873a667d78fb33
LOGINW32.zip
Posted Oct 26, 1999
Authored by Eliptic Curve

A simple GUI trojan that when added to the autostart *see regedit* registry will log the passwords of the Novell NetWare School Vista user to c:\windows\samples .txt. Loginw31.exe is an exact duplicate of the login while Login31(2).exe is a system confirmation tricking the user to re-enter their password.

tags | trojan, registry
systems | windows
SHA-256 | 58d1a61a0dad0a8bd9fdf8856cb55f06ea965f5b92b98a29653c46aae61937c7
pr0tscan-release-1.tar.gz
Posted Oct 26, 1999
Authored by misteri0

pr0tscan was based on vetescan, but added more vulns and tried to make it run more smoother. Winscan, (scans win/nt systems for latest trojans/remote exploits). The docs include fixes for the vulnerabilities it finds.

tags | tool, remote, scanner, trojan, vulnerability
systems | unix
SHA-256 | 492897184ae35990598618bea3d466e9283d566f80648c61ea9254760a094c18
logController-0.4.tar.gz
Posted Oct 26, 1999
Authored by Trankill

logController allows you to control the size of some files that tend to become too large (logfiles). A config file allows you to define which files to monitor and the sizes not to exceed. If one or more files exceed the limit size, they are automatically truncated to a new user-defined size and the area truncated can be erased, or compressed and stored.

systems | unix
SHA-256 | 13b9e31af419c0a7b8b3fd18a2724a16c5b2e33b81f142a08655ea85d257030f
spike.sh5.zip
Posted Oct 26, 1999
Authored by Spikeman

Spikeman's DoS Attack Tool - Revision 5. 31 denial of service attacks at once.

tags | denial of service
SHA-256 | 9f930571591e3d0822220c2d809879ca668143471a6765e5e25f7583bd14d138
linux.forged.packets.txt
Posted Oct 26, 1999
Authored by Marc Schaefer

Forged packets can be send out from a Linux system, for example for NFS attacks or any other protocol relying on addresses for authentification, even when protected from the outside interfaces by firewalling rules. Most of the time, existing firewalling rules are bypassed. This requires at least a shell account on the system.

tags | exploit, shell, protocol
systems | linux
SHA-256 | 8d159590c7c839774eb2f8a7c4dddf0737f16a6cf7e3d10393036232f45f5469
walker.c
Posted Oct 26, 1999
Authored by m0f0

Walker - Compuserve 3.0 Password Decrypter. It decrypts Compuserve 3.0 ini files (cis.ini) that stores account passwords.

SHA-256 | 165027448c137a47f5149973229d79d31f0b0a137efbc4f0c01f848456b74fa8
remote.html
Posted Oct 26, 1999
Authored by pho

Pho's alternate remote OS detection techinques page has been updated. Includes information on ICMP techniques, ARP techniques, IP techniques, and UDP techniques.

tags | paper, remote, udp
SHA-256 | 8ad58add858120309dfa20fecd05c30e086888dd27674d03eb1a7771daeb0615
webfolders.txt
Posted Oct 26, 1999
Authored by Sozni

If you have installed Microsoft Office 2000 or keep current on your Windows Updates, you may have noticed a new WebFolders namespace in Windows Explorer. The fun part is that WebFolders have some significant weaknesses (inherited from FrontPage) and are such a new concept that it turns out they make a great entry point into a remote server.

tags | exploit, remote
systems | windows
SHA-256 | 01adda0b5af462be99d4d8071315e8516891937780a27b461c6b4e7ab4d80727
libnids-1.12.tar.gz
Posted Oct 25, 1999
Authored by Nergal | Site packetfactory.net

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit (quite a bit ;)), and provides convinient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you don't have to build low-level network code. If you decide to use libnids, you have got E-component ready - you can focus on implementing other parts of NIDS.

tags | tool, local, intrusion detection
systems | unix
SHA-256 | 37aab0e12817880ae502de7bec0810e0df2e1c6ee7cd328e933f0bca7751c656
versioner-04.cpp
Posted Oct 25, 1999
Authored by Vacuum, rhino9 | Site technotronic.com

Versioner 0.4: Source code. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.

SHA-256 | 83c2cb2763ce18eb7438821f2011ae0ea994e221d2cc17951c44359d0f30b101
versioner-04.zip
Posted Oct 25, 1999
Authored by Vacuum, rhino9 | Site technotronic.com

Versioner 0.4: Binary distribution. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.

SHA-256 | 91a7f19d27b6d4287ff71dda6b47654fd6d52d5659ab2e0090657f1a47004e9f
ngrep-1.35-static-linux-elf.gz
Posted Oct 25, 1999

Static linux binary for ngrep 1.35.

tags | tool, sniffer
systems | linux
SHA-256 | de58a4bda1fcf89bd2f42affba85873ba5e04bce8cb96cb71941b53188a62b11
ngrep-1.35.tar.gz
Posted Oct 25, 1999
Authored by no carrier | Site packetfactory.net

ngrep is an awesomly powerful network too which strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.

Changes: An updated udp match optimization, -v (version) is now -V, and -v has become inverted match, -d lo (null linktype) and the ability to match proto icmp have been added, along with an updated configure.in to handle old installations of pcap more gracefully.
tags | tool, udp, sniffer, tcp
SHA-256 | 8e9c02d7d666c89fcef1675ad1bb9e4d4c2c0b6f12111f29ea122e8bca9d8c4b
libnet-0.99g.tgz
Posted Oct 25, 1999
Authored by Mike Schiffman

"libpwrite" - A C library for portable packet creation. Libnet is an API to help with the construction and handling of network packets. It provides a portable framework for low-level network packet writing and handling (use libnet in conjunction with libpcap and you can write some really cool stuff).

systems | unix
SHA-256 | ce8af7b861f3663f4910d026b536b9c5bd714f68ab9422629fabd8771d4f7da2
default7.txt
Posted Oct 25, 1999
Authored by default | Site default.net-security.org

Default newsletter Issue #7. Includes Setting up a great desktop Linux, How to make safe Windows 95 based server, Web based encrypted e-mail (critic and the response), Welcome to the wonderful world of cellular phreaking, Unix logging and auditing tools, and Freedom of the speech related incidents.

tags | web, magazine
systems | linux, windows, unix
SHA-256 | 2794b94e3bc6575c0ec03735ecef55d627af7b4c60a32a0ff16b93f06766d783
adding.doc
Posted Oct 25, 1999
Authored by Nishad P. Herath

Adding new services to the Windows NT kernel (Native API) on intel X86 processors. Version 0.81.

tags | paper, x86, kernel
systems | windows
SHA-256 | c6f6384f6b9e9467c3f627de844e172d83aae5c41e789cecfda274df0f75bf2e
dopewarez.c
Posted Oct 25, 1999
Authored by nuuB

Remote exploit for dopewars-1.4.4. Exploit works for servers as well as clients. Produces a shell.

tags | exploit, remote, shell
SHA-256 | 6ba59e6009b05be123b6af5928e78b018f173818061ec3c4bfedafabca9b0987
Page 2 of 16
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close