what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 388 RSS Feed

Files Date: 1999-10-01 to 1999-10-31

Posted Oct 25, 1999
Authored by Raven | Site blacksun.box.sk

Gives you access to the registry, dos, display properties etc' (control panel too in the next version). Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, registry
SHA-256 | c0e7602f9f22d7569c787cf797f50f6eaed01dba30d5b509ba3d1ea16f6564b9
Posted Oct 25, 1999
Authored by Raven | Site blacksun.box.sk

Tired of all those annoying windows trojans? are you a sysadmin who's afraid that unsuspecting users on his/her network might run trojans and then come to him with complaints? wanna help your friends by scanning them for trojans? wanna be the greatest script kiddie in the world? then download this super-fast local/remote remote administration trojans scanner (scans for hundreds of annoying trojans).

tags | remote, local, trojan
systems | windows
SHA-256 | 5c15520fefd5605f5657f5a949af8ad6ed654a62e971f0b206e27b9b80e8e7c6
Posted Oct 25, 1999
Authored by Sil

Well written paper on securing linux for newbies. Lots of good and updated info. Version 1.1.

tags | paper
systems | linux, unix
SHA-256 | dd27f287c4429d8d76381c494dc21d247077b1a81c69eb8810e41786d60f5274
Posted Oct 25, 1999
Authored by Sil

These calculations show that Microsoft may be guilty of murder, on order of several people per day.

systems | unix
SHA-256 | 23297b92fb766ca9043cf40b8f3d40fae47a45104b5f56247da2fb43da000a2d
Posted Oct 22, 1999
Authored by Unyun

imagemap CGI which is distributed with OmniHTTPd 1.01 and Pro2.04 has a buffer overflow bug, I coded an exploit which can execute any command on the victim host. The Shadow Penguin Security.

tags | exploit, overflow, cgi
SHA-256 | 934905f1f9f1cb9de1cc562db508da34d8ccefe4d46bd6355fecc4455384cec2
Posted Oct 22, 1999
Authored by Tommy. | Site soomka.com

Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)

Changes: Speech (through speechd) and a debug option.
tags | tool, intrusion detection
systems | unix
SHA-256 | 44c568b15d10d6153f5b49137e01ff1d3ba63549b16e672d0a3990bf420a5186
Posted Oct 22, 1999
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: New protocol decoders include BPDU, SNA, RIPng, PIM, Yahoo Messenger and Pager Protocol, NTP, BGP, AFS and RX, and VLAN (802.1q). Many more protocols now have fields that are filterable via Ethereal's display filter engine, the syntax for filtering on byte strings has been extended, protocol decoders that have been updated include IPv6, SMB, OSPF, POP, NBNS, and DNS, the TCP Follow window can now convert from EBCDIC, Ethereal can now read HP-UX's nettl trace-file format and some bugs were fixed as well.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | e223e4d6dedfe7e08e074834e8a728a44ba1f8ad4dcc95e5c893a7a1988e832f
Posted Oct 22, 1999
Authored by Marcelo Gornstein

Easy TcpIp Library is useful to add basic TCP/IP support to your applications by simply linking it in.

tags | paper, tcp
SHA-256 | c49cd25eebd1db8f427ebdbdf7fcec255bce3bcdea3f7f433d77f240fa31ee01
Posted Oct 22, 1999

Microsoft has released a new version of the Microsoft(r) virtual machine (Microsoft VM) that eliminates a security vulnerability that could allow a Java applet to take unauthorized actions on the computer of a web site visitor. Although no standard Java compiler can generate such an applet, a Java applet constructed by hand with a Java bytecode assembler could bypass the sandbox and take virtually any action on the computer that the user would be capable of taking.

tags | java, web
SHA-256 | 8c02eaa1084336b7cffb85cbeeee6bbe73094d24374f1495e1fc5018b391ad3f
Posted Oct 22, 1999
Authored by winsd

[ Windows Security Digest ] 1999 - October 18. Excel Symbolic Links, JavaScript Redirect, Anatomy of an Intrusion, Getting the Drop on Network Intruders, State of Security 2000, So You Want to Be a Cryptographer, C2 Compliance Check. www.ntsecurity.net

tags | javascript, magazine
systems | windows
SHA-256 | b52d9e47f72f9bd6daa0001926b02ea197343a60b323bde7dd34592350f20bdf
Posted Oct 22, 1999
Authored by S. Krahmer | Site cs.uni-potsdam.de

Linux accounting-tool for 2.2.x.

systems | linux
SHA-256 | 9fea4c4d1397cf298dd5a4cfdd58e5ccac4e42e2a9f5fa8af2913c2db86a3676
Posted Oct 22, 1999
Authored by Lamagra

Tutorial on a new way of exploiting buffer overflows (ret-into-libc).

tags | paper, overflow
systems | unix
SHA-256 | 71f6c76b0584c12d0217a57f3052e0e21eedfa5cd3d63661e5ed666690b0ac17
Posted Oct 21, 1999

Three vulnerabilities have been identified in WU-FTPD and other ftp daemons based on the WU-FTPD source code.

tags | vulnerability
systems | linux, redhat
SHA-256 | 314cdbabefb2fd1a366c6c7a8928005c0869880293006ac05ea1331cf7ba7078
Posted Oct 21, 1999
Authored by Phil Jones | Site firepool.com

weedlog is a packet logger designed to help in debuging network connections on non-router systems. It currently supports the ICMP, TCP, and UDP protocols, but is still early in development. weedlog supports sending output to stdout, a file, or to syslog.

tags | tool, udp, sniffer, tcp, protocol
SHA-256 | 4af20a3f32c977be013ef49b7281dfa1d164849226ad1734d8406b36d7697291
Posted Oct 21, 1999
Authored by Sergey V. Kolychev

Net::RawIP is a Perl extension for easy manipulation of raw IP packets with an interface to libpcap. This package provides a class object which can be used for creating, manipulating and sending raw IP packets and optional manipulation of ethernet headers.

Changes: Bugfixes, non-integer sleep delays.
tags | tool, perl, sniffer
SHA-256 | e0bbe7a9d1a230489cc894a9cab1bfb990f2cf34c00443fe2c8e43dbd4ac02d1
Posted Oct 21, 1999
Authored by Vipul Ved Prakash | Site vipul.net

Ricochet is an automated agent for tracing and reporting internet junk mail (a.k.a Spam). Ricochet analyses the headers of a spam to identity the machines used for its injection, looks up the email addresses of the machine owners and mails out a complaint to them. Ricochet uses various network information resources like nameserver records, MX records and Whois databases worldwide to collect and verify this information.

systems | unix
SHA-256 | 2477d1f734ac9aefe76f35d11e2f03d1e18a6ddde71f2e20b39a218b2f5e53a9
Posted Oct 21, 1999
Authored by Kurt Seifried | Site securityportal.com

Linux Administrator's Security Guide - Newest snapshot. Updated October 21st 1999, 15:24 EST. The LASG has been updated some more, and the license has changed. The LASG is now OpenContent, I am doing this in the hopes it will encourage the community to contribute.

systems | linux
SHA-256 | 364bf63df4d0edb9f33de00dc7b3b625f0a0db164b25d8971319353e4d1a075d
Posted Oct 21, 1999

The version of screen that shipped with Red Hat Linux 6.1 defaulted to not using Unix98 ptys. Since screen is not setuid root, this means that it leaves the ptys with insecure permissions. The updated packages restore the Unix98 pty support. Red Hat 6.1 security advisories

tags | root
systems | linux, redhat
SHA-256 | f33ebb3f1b35ebf58232d75ce2af6c8a8396a3cdf5da9ead2d3659feb29b75cd
Posted Oct 21, 1999
Authored by Chad Renfro | Site renfro.homepage.com

Rpc_Gotcha is a network based intrusion detection tool for detecting rpc based scans and attacks (buffer overflows). The program will passively sit on the network perimeter and process packets while analyzing the rpc message data payload looking for signs of a possible attack. Rpc_Gotcha will log all rpc calls made to the network and display payload data for possible attacks. Changes : This version has some major bug fixes , memory leaks and signature issues. It will also read tcpdump capture files in a batch mode.

tags | tool, overflow, intrusion detection, memory leak
systems | unix
SHA-256 | 47e916295ba31b13f5d2c3e1ee1298ccbaa67084f08de4d1c4ed07f5a57002d2
Posted Oct 21, 1999
Authored by Taeho Oh, Postech Laboratory for Unix Security, Postech Linux User Group

Paper on writing advanced buffer overflow exploits. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nice features. For example, passing through filtering, opening a socket, breaking chroot, and so on. This paper will attempt to explain the advanced buffer overflow exploit skill under intel x86 linux.

tags | paper, overflow, shell, x86
systems | linux, unix
SHA-256 | 2e4ea3806ea648290a4bc015d162ee5889ff5d38e9961098e03e606b4897fb15
Posted Oct 21, 1999

Generic shellcode for i386. Supports FreeBSD, netBSD, openBSD, and linux. CyberPsychotic

tags | shellcode
systems | linux, netbsd, unix, freebsd, openbsd
SHA-256 | 221de581651c3ee9ebc9f9eb960abe2560e3e4d9fbc246668595b818a6544346
Posted Oct 21, 1999
Authored by JD Glaser | Site ntobjectives.com

NT OBJECTives, Inc. Presents - Seek and Destroy Network Tools. NTO Tools includes four new tools: Lservers[tm], NTOLog[tm] and NPList[tm] and NTODrv[tm]. NTOLog[tm] is a Powerful, network wide backup/clear utility for NT logs.i LServers[tm] is a NetBIOS name dumper. NPList[tm] is a NT network process dumper. NTODrv[tm] is a NT network driver/service dumper. Download NTO Seek/Destroy Tools[tm].

SHA-256 | ed8828e22d4b2702b5da0a6830008e334e58b0e5d79651ef004727657c22c2e0
Posted Oct 21, 1999
Authored by Underground Security Systems Research

Decrypt MSN passwords from the registry.

tags | registry
SHA-256 | 39d31c20ce35636f487d14d1a9689cd6c76ec2a764f117a267a0289c392355c2
Posted Oct 21, 1999
Authored by Vacuum | Site technotronic.com

Winfingerprint 219: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQL SERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, Enumerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes. New features: contains new GUI frontend and some bugfixes.

tags | remote, registry
systems | windows
SHA-256 | 637342d7cba4ea483d9ce52a271eaab3a898997dc8dcb6ab3c71f4dbe833f86f
Posted Oct 21, 1999
Authored by Vacuum, rhino9 | Site technotronic.com

Versioner 0.3: Source code. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.

SHA-256 | 28bbb22f26396a6e8197e439794bb2e3e2a85e69452559a6606698ebb15ffda9
Page 3 of 16

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    17 Files
  • 26
    Sep 26th
    3 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By