exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 1999-11-01 to 1999-11-02

pringles.c
Posted Nov 1, 1999
Authored by misteri0

Sends spoofed ICMP packets containing user specified strings. Can be used to exploit the +++ DOS bug in some modems, or for testing networks. Tested on redhat 6.0 k 2.2.5-15.

tags | denial of service, spoof
systems | linux, redhat
SHA-256 | b6c81717cbf20d290d24ae2303fd1d4ddc7638e5ec01ce8bb0b846862eebaa10
RFP9906.txt
Posted Nov 1, 1999
Authored by rain forest puppy | Site wiretrip.net

Windows NT remote denial of service and compromise (RFPoison). When sent a specific packet, it's possible to get srvsvc.dll to choke, and cause services.exe to reference a bad memory location. The impact is pretty severe. Services.exe handles named pipes for the system. Once this crashes, everything named-pipe-based goes with it. Combined with the AEDebug vulnerability, remote compromise is possible.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 30fdab853650e808fbeaf377b9dc6694e8c922c4a560d2c7c3d2c1b33d0ec56a
pmfirewall-1.1.tar.gz
Posted Nov 1, 1999
Authored by Rick Johnson

PMFirewall is an Ipchains Firewall and Masquerading Configuration Utility for Linux. It is designed to allow a beginner to to build a custom firewall with little or no ipchains experience. This firewall should work for most Workstations, Servers, and Dual NIC routers using either a dialup or LAN setup. It is restrictive to outside attacks while still being as transparent as possible to those inside. Currently only Redhat 6.x and Mandrake 6.x are supported, but support for other distributions is being developed.

tags | tool, firewall
systems | linux, redhat, mandrake
SHA-256 | 0b88f75e439b857e40fd8caedaeb1aab26ea6c182fc8bb496e06c56799d7a2e9
traffic.c
Posted Nov 1, 1999
Authored by Andrae Muys | Site uq.edu.au

Simple parser for tcpdump output. Gives the fields Time, Src Addr, Src Port, Dst Addr, Dst Port, Proto, and Len.

tags | tool, sniffer
SHA-256 | 358ea57b1f788c4274924e853c12cfe7f2a9c9a5ef65a9f468968aea83992abb
ipac-1.05.tar.gz
Posted Nov 1, 1999
Authored by Moritz Both

ipac is an IP accounting package for Linux. It collects, summarizes and nicely displays IP accounting data. The output of ipac can be a simple ascii table, an ascii graph or even gif images with graphs showing traffic progression. ipac can be used for IP traffic analysis and for accounting purposes.

systems | linux
SHA-256 | 31efc81a3731e96a193614d7a0254e922dd13f0fd5d59127fe0557fe34295759
versioner-06a.zip
Posted Nov 1, 1999
Authored by Vacuum, rhino9 | Site technotronic.com

Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.

Changes: Now recognises versions from more types of binaries, as well as some misc. code cleanup.
SHA-256 | 1d3cbed2b9137aee4d2cfecd7df8d1e6dcf953368ea781a96e98c9777ad2e7eb
versioner-06b.zip
Posted Nov 1, 1999
Authored by Vacuum, rhino9 | Site technotronic.com

Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.

Changes: I dramatically decreased the runtime by making it so the MD5 Hash is computed only once per file by adding a second stream to MD5Print() and MD5File(). Runs 50% faster on my machine.
SHA-256 | f3e913fc67f67366fc1c66c76ff7163b11247131ff8bb66f1083fbce7ddce2e6
optfdeniser.txt
Posted Nov 1, 1999
Authored by OpticFiber

Microsoft IIS 4.0 can be crashed by simply running several recursive wget's on it.

tags | denial of service
SHA-256 | 25d4c8e3a7132496738d9f3829a54f04c7a2c357c2b3b45b4516560fbeec6cae
browsing.tgz
Posted Nov 1, 1999
Authored by Mephystos

Perl script designed to audit forgotten directories on a web server.

tags | web, cgi, perl
systems | unix
SHA-256 | c238e0532f6df2049121aa790a45f76be7caf8273cb55b7e00edde30dfed0eae
b00ger-rpc.tar.gz
Posted Nov 1, 1999
Authored by b00ger

Remove RPC vulnerability scanner, optimized for speed. It scans for rstatd, nfsd, ypserv, mountd, rexd, ypudated, cmsd, ttdbserver, autofsd, pcnfsd and amd. It also checks what os the remote host is using, and then uses this info to work out whether it's likely to be vulnerable or not.

tags | tool, remote, scanner
systems | unix
SHA-256 | 2868057177f4c95856c184a477bc5c2f0d100747a5cbf64741e0ae662832dfc3
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close