exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 91 of 91 RSS Feed

Files Date: 1999-12-17 to 1999-12-18

pact.txt
Posted Dec 17, 1999

Prefix Access Code Translator

tags | telephony
SHA-256 | c3210f7407a391f96ee7f76822f647165fe8761e6ec33a601ea1c5533906c64b
remob.txt
Posted Dec 17, 1999

Remote Observation docs

tags | remote, telephony
SHA-256 | dab765619e4a1797bc57e8a8828f367c4ac8b3a412a633a10d0efaf0d2f752ac
sigsys.txt
Posted Dec 17, 1999

Worldwide used signalling systems

tags | telephony
SHA-256 | fedee9c0cedfcdb076188ee63ea04ecfd291131ec568f91e8652660a7108270d
ss7div.txt
Posted Dec 17, 1999

SS7 Based Diversion

tags | telephony
SHA-256 | 4d84897a271c45382c86e1af44172e8a484e1a98ccda26204303f13ad4e27070
swbwc.txt
Posted Dec 17, 1999

Southwestern Bell Lineman codes

tags | telephony
SHA-256 | 0238cfe969ea9e3d8d7ba66daa5a245d6bee7abb7b73a8b96d0e286d90b421db
syst75.txt
Posted Dec 17, 1999

Brief Guide to Definity G Series PBXes

tags | telephony
SHA-256 | d42fdb816f766fc33f9356f0ac922d4a86f3c3297e8fa27ae9eec47362664b2f
syste75.txt
Posted Dec 17, 1999

Sys75/85 Configurations

tags | telephony
SHA-256 | dccc5ec62887b31fe3afc269bc43a1c55d2f12ff7180bbf5f919ee15d57cb444
tcca.txt
Posted Dec 17, 1999

Telephone Company Customer Apps

tags | telephony
SHA-256 | e4d7f2b566ce943b89a94b13abb5e6976ed9a6e4d205390cb428f5c8dccb9b75
telacro.txt
Posted Dec 17, 1999

Telephony Acronyms

tags | telephony
SHA-256 | 15421b83026bd156f48d2cedf86278990ea94690ec386bd8ab846d8b884f63b4
unddms.txt
Posted Dec 17, 1999

Understand the Digital Multiplexing System

tags | telephony
SHA-256 | 48072547e9780f85989310ac69df97154b3cbfb815beefe8a2eac7869a4cf07f
1aessdoc.txt
Posted Dec 17, 1999

The History of the 1AESS Switch

tags | telephony
SHA-256 | 7f19cce6a67e68528e041d23d8022f554d88dfa5c1c5bf05518f106eae7c21b8
nai.99-12-16.lsa
Posted Dec 17, 1999

Network Associates, Inc. Security Advisory - Windows NT LSA Remote Denial of Service. An implementation flaw in the Local Security Authority subsystem of Windows NT, known as the LSA, allows both local or remote attackers to halt the processing of security information requiring the host to be restarted. This new vulnerability affects all Windows NT 4.0 hosts including those with Service packs up to and including SP6a. ms99-057 addresses this vulnerability. NAI homepage here.

tags | remote, denial of service, local
systems | windows
SHA-256 | d0c637cd4cedf750ac593d89bda9710934543e70938f9ef2d5f35184d7963107
bindview.syskey.txt
Posted Dec 17, 1999
Authored by Todd Sabin

BindView Security Advisory - Windows NT's SYSKEY feature. SYSKEY does not fully protect the SAM from off-line attacks. Specifically, dictionary and brute-force password cracking are still possible, even when SYSKEY is enabled and the attacker is not in possession of the SystemKey.

tags | exploit
systems | windows
SHA-256 | ed21462fc63b5f9e8702adc0dc85afa7134cb844786d5211b01a9c25a543ad2d
cisco.99-12-15.cache
Posted Dec 17, 1999

Cisco Advisory - Cisco Cache Engine Authentication Vulnerabilities. A vulnerability exists that could allow an unauthorized person to substitute arbitrary material in place of legitimate content for a specified website. This arbitrary content would be viewable only by users of the affected (or "polluted") Cache Engine. A second vulnerability exists that could allow unauthorized persons to view performance information via the web interface of the Cache Engine. A third vulnerability existed that allowed a null username and password pair to be accepted as valid authentication credentials.

tags | web, arbitrary, vulnerability
systems | cisco
SHA-256 | a8efa2af873816da9ebec30ae0cbaadb68c7bb522fbb5f9db63d23edd5e6078f
ms99-057
Posted Dec 17, 1999

Microsoft has released a patch for a vulnerability in Windows NT. The vulnerability could allow a malicious user to cause a Windows NT machine to crash. Microsoft FAQ about this vulnerability is here.

systems | windows
SHA-256 | 7d1a00ccde2db636cbc6c7a1b3648ea7ab13d34ea7bb42e32d36c009dda7101a
imap3.c
Posted Dec 17, 1999
Site hack.co.za

Yet another Imapd remote overflow.

tags | exploit, remote, overflow
SHA-256 | c43a603aed41521971bf354ca7740bbd46771fe3281339c85ea4273a7d9b48dc
Page 4 of 4
Back1234Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close