what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 330 RSS Feed

Files Date: 1999-11-01 to 1999-11-30

pan_online_95_b2.zip
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 Online for Windows 95/98 BETA 2 - Online point and click attacking of Novell Netware from Windows 95/98. Unzip and run the setup.exe program. DO NOT FORGET TO INSTALL THE PACKET DRIVER OR THIS PROGRAM WILL NOT WORK!

systems | windows
SHA-256 | 36c2d370416cc675506924ffe914c39de77ba897ac6e9152960d99152ccfd8e3
pan_offline_pentium_b2.zip
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 Offline for Windows 95/98/NT BETA 2 - Offline Novell password auditing for the Windows platform. Unzip and run the setup.exe program. Fully optimized for Pentium platforms to maximize password cracking.

systems | windows
SHA-256 | be5edd61749ef0a35dd50d9a007f8fe9b8e55331a82504bdb76d99e71a1b07ea
proftpd.mod_sqlpw.txt
Posted Nov 20, 1999
Authored by Todd C. Campbell

If proftpd has the mod_sqlpw.c optional module compiled in, the last command will display passwords instead of usernames.

tags | exploit
SHA-256 | ec7d82abc3be27d87dddd381e6122c6d188a6c5e42de20b16c051adac8a7c83a
TracePackage-0.9.0.tgz
Posted Nov 19, 1999
Authored by Karim Yaghmour | Site opersys.com

Linux Trace Toolkit is a tool used to reconstruct the dynamic behavior of a linux system. LTT fills the gap left by tools such as gprof, strace, ps and many others when attempting to know what is going on with your linux system at every moment by providing it's user with all the information required to reconstruct a system's behavior during a certain period of time. One can know exactly the dynamics of a system. Why do certain synchronization problems occur? What exactly happens to an application when a packet is received for it? Overall, where do all the applications that I use pass their time? Where are the I/O latencies in a given application? etc. Requires kernel patch.

tags | kernel
systems | linux
SHA-256 | 62c058b496848eb4487ce3a762be80f4829bc513c2c92b5356b3d2653e071fd5
zetamail-2.1.txt
Posted Nov 19, 1999
Authored by Underground Security Systems Research

ZetaMail 2.1 POP3/SMTP server is vulnerable to a buffer overflow caused by a long username / password. Binary / Source for the DoS exploit here.

tags | exploit, overflow
SHA-256 | 05ab8f61d142aacfec12a6ab466acd75890a08dc2d75bd8809207b0e15a17a65
lids-0.4-2.2.13.tar.gz
Posted Nov 19, 1999
Authored by Xie Hua Gang

lids is an intrusion detection system patch for the Linux kernel; it can protect important files from being changed. When it's in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.

Changes: Seal the kernel program, mounted filesysten protection, loaded modules protection, running processes protection, and more safty and detailed logging. lids homepage.
tags | kernel, root
systems | linux
SHA-256 | 4f6f7925ca1f194d7d0c5f3f6c351e96fe52e41607c32e8906779badde1514b9
digital.voodoo.zip
Posted Nov 19, 1999
Authored by Kurruppt2k

PSS gets "texts for newbies" by the bucketload. However, this is quite different. It has the "newbie hacking basics" presented in a tasteful and useful manner. Later, it goes into "novice/intermediate" tactics that many as piring (though not yet leet) hackers will find usefull. And finally, in sections such as Firewall Penetration experienced hackers will find valuable theroritical and practical tactics and techniques. All in all, Digital Voodoo is a great reference and resource for hacker and security specialist alike.

tags | paper
SHA-256 | 2b4e0acd7c6e89e30072ee3d3f99aab6d5fe8681f729269c134adc5d676f52de
NSS_251.tar.gz
Posted Nov 19, 1999
Authored by Narrow

Narrow Security Scanner is a perl script which checks for 177 remote vulnerabilities. Tested on Slackware 4.0, Red Hat (4.2, 5.0, 6.0), SuSE 6.1, FreeBSD 3.0 & OpenBSD 2.5.

Changes: Bugfix release.
tags | tool, remote, scanner, perl, vulnerability
systems | linux, redhat, unix, freebsd, suse, slackware, openbsd
SHA-256 | 957bdf614696996026ae4b75da6ff416b20c67a32a74a057df9ff5656ed3a6e1
tcp1.htm
Posted Nov 19, 1999
Authored by Erik Iverson

Dragonmount Networks has released Part 1 of a multipart series on the Transmission Control Protocol. This first discussion is geared towards those new to the Internet who want an overview of the processes involved in client/server communications. A brief history of the Internet, discussion of ports, the 3-way handshake, and SEQ/ACK numbers are all included.

tags | protocol
SHA-256 | f3bcf352a2c27fc77330298259a54d48d655f8a17860eee8facd4fce4ee33641
xscreensaver-3.21.tar.gz
Posted Nov 19, 1999
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. More than 100 display modes are included in this package.

Changes: Fixes for some visual selection bugs (nVidia should work now) and improvements to the GTK xscreensaver-demo UI.
tags | root
systems | unix
SHA-256 | 2fce3ff66937668106e28b2feab9d4a2f6fb72fb1b1e105818a2026174f56368
RawPortTCP10.exe
Posted Nov 18, 1999
Site btinternet.com

A low level interface to a TCP/IP socket for Windows. Send exactly what you want in hex or ascii, receive information formatted in a logical manner. Full diagnostic window to assist you in debugging problems. Great if you're a programmer wanting to learn how protocols work, or to experiment.

tags | tcp, protocol
systems | windows
SHA-256 | 127b4dea28a1cdd133d7f0ba1b85643ea949646eacabb730f2ee920cb9ebf091
lynx-2.8.x.txt
Posted Nov 18, 1999
Authored by Michal Zalewski

Lynx has mechanisms to avoid spoofed 'special URLs'. The protections are insufficient and can result in local compromise.

tags | exploit, local, spoof
SHA-256 | 572c27a381354f90a31a76977dccc10442db4065337602fbc6a83efbba50ffb1
sftp-0.3.tar.gz
Posted Nov 18, 1999
Authored by Brian Wellington | Site xbill.org

Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process.

Changes: New features include readline support, an autoconf script, setting of the remote user and server pathname and misc. cleanup.
tags | remote, shell, root, encryption, protocol
SHA-256 | 3283fdf6cd25602716adccdc1295928d6c5af282f603fde9b0c9394c7acf3226
psting-1.0.tar.gz
Posted Nov 18, 1999
Authored by Anthony Osborne

Ping Sting 1.0 - pingsting is an application that monitors networks for ICMP Echo Requests and attempts to determine what application generated the ICMP packets. The method and weaknesses of this method are described at the end of this document.

tags | system logging
systems | unix
SHA-256 | dda27dc367e0fec9588170a585b726379286ad739cb535249fdeb7f60e3ba3dc
cgi-check99v4.r
Posted Nov 18, 1999
Authored by deepquest | Site deepquest.pf

CGI Check 99 v0.4. Checks for 119 remote CGI vulnerabilities and other remote issues. Written in rebol to be extremely portable (37 os's).

Changes: Now gives the Bugtraq ID or X-Force ID when available.
tags | remote, cgi, vulnerability
systems | unix
SHA-256 | b4015369ea7391e4a7d4a18d610dfc675f3883cf684c00b8838d7b78c4725ae8
ms99-043
Posted Nov 18, 1999

Re-release: Microsoft has learned of a vulnerability in Microsoft(r) Internet Explorer that could allow a malicious web site operator to read files on the computer of a user who visited the site, under certain circumstances. A patch is now available.

tags | web
SHA-256 | 7537dc57932b2b135676443a6008da4a5072403722fde739836a368f2a9cf0b3
brscan06.c
Posted Nov 18, 1999
Authored by Larry W. Cashdollar

Broad Scan 0.6 something I wrote when I wanted to search my internal network for systems running certain services but didnt want to run a full blown portscanner. This allows you to scan an IP address range for a specific port.

tags | tool, scanner
systems | unix
SHA-256 | 09caa1b8801a1763b606926f7d05278fe17d3575ed02ef8ef33ba17daa254fa2
ppc.shellcode.txt
Posted Nov 17, 1999
Authored by Palante

Power PC shellcode. LinuxPPC and BSD (darwin?) versions are included.

tags | paper, shellcode
systems | unix, bsd
SHA-256 | 90c4607349c3839a253a0f9763beb1cc9b88e2bca9499223eb1a0fc0cb33140a
suse.thttpd.txt
Posted Nov 17, 1999

A security hole was discovered in thttpd server, distributed with SuSE 6.2 and 6.3. When overflowing a static buffer in tdate_parse() an attacker could remotely execute commands on the thttpd host with the permissions of thttpd. Patches available here.

tags | overflow
systems | linux, suse
SHA-256 | 8b5e0fbf85086d789ebdff5f9083447393cac48f65be5b050868c8efa4cf1cff
g6ftp.dos.txt
Posted Nov 17, 1999
Authored by Underground Security Systems Research

Remote DOS Attack in G6 FTP Server v2.0 (beta 4/5) caused by a buffer overflow in a long user name.

tags | exploit, remote, overflow
SHA-256 | 10a81014393e2e851e86f1b981ebf6ad5d458b73177cd286b8726538c086aa92
debian.bind.txt
Posted Nov 17, 1999

The version bind that was distributed in Debian GNU/Linux 2.1 has a vulnerability in the processing of NXT records that can be used by an attacked in a Debian of Service attack or exploited to gain root access to the server. This has been fixed in version 8.2.5p5-0slink1, and we recommend that you upgrade your bind package immediately. Debian security homepage here.

tags | root
systems | linux, debian
SHA-256 | c0348f836c6ccdfcc5aeb64b724e1fe239dc1ecf33461b0f5ec14ecd6023e62d
pgp.txt
Posted Nov 17, 1999
Authored by Raven

Don't know anything about PGP? Wanna know what is it good for? How to use it? What are the advantages of encrypting your files and your Email? How PGP works? Why is it so hard to crack? Want a simple tutorial to teach you all this? Then go for this one! Simple, easy to understand and relatively small.

tags | paper
SHA-256 | 4463f8f5e7bbb27c5b104cb8b41cfd2dd3abc45de190a40487ed476b83466913
rhupdmgr-0.4.tar.gz
Posted Nov 16, 1999
Authored by Adam Jacob

rhupdmgr is a script which sends an email to the sysadmins when a machine has fallen out of sync with the RedHat Updates. It works by checking a generated list of RPMs to be updated.

systems | linux, redhat
SHA-256 | 3a6a0e3d372afb9568dbaa46859fdd949cc34d08709f1b62dbb0a86b5919b6d1
Samhain File Integrity Checker
Posted Nov 16, 1999
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a tool for verifying the integrity of files. It uses the TIGER message digest algorithm to generate a database for files and directories listed in the configuration file. After initializing the database, samhain can run as a background process, performing checks at user-defined intervals. Results can be written to a log file and/or forwarded to another host by e-mail. Log file entries are signed to prevent tampering. The current version is tested on Linux only.

tags | tool, intrusion detection
systems | linux, unix
SHA-256 | 1505f8f9c2445ed1a8767f0ce6bdd68622d0740af23fed22db953ce348336066
xipdump-1.5.2.tgz
Posted Nov 16, 1999
Authored by Vianney Rancurel

Xipdump is a protocol analyzer and tester. It's a kind of graphical tcpdump(8) which adds the possibility of changing packet values and resending them. The graphical representation of a packet is intended to offer a complete, customizable view at a glance.

Changes: A port to Solaris.
tags | tool, sniffer, protocol
SHA-256 | f82d39df7996146a48b3a60381c93fb0c2698dc5a99fcbb5873d1423e1519eb8
Page 4 of 14
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close