what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 1999-12-18 to 1999-12-19

y2k-virus.htm
Posted Dec 18, 1999

Year 2000 Computer Viruses and Hoaxes - List of the approximate number of reports the CERT/CC has received on viruses and hoaxes that reference Y2K. There are also links to anti-virus vendors having Y2K virus and hoax web pages.

tags | web, virus
SHA-256 | 76945e53c71e450c6468224359a90fd3e3fd4372c3e8b036ef211eccd2994420
y2k-cyberthreats.htm
Posted Dec 18, 1999

CERT Expectations During Y2K - "Cyber Infrastructure and Malicious Expectations during the Y2K Transition Period" discusses potential activities associated with Y2K and offers recommendations.

SHA-256 | ae21eabdf7cf09db59fca3e2ba160447a1c6a2ef9b03e26b9ab42e6fde225b6a
Y2K_FAQ.htm
Posted Dec 18, 1999

CERT Y2K FAQ - Includes information to help sites determine whether a failure is Y2K related or an attack.

SHA-256 | 2380768c6451a4cfb53db684471538c198e1fe40f50bc442053724b576f7e573
CS-99-05
Posted Dec 18, 1999

CERT Quarterly Summary #5 - Currently exploited vulnerabilities include am-utils package and RPC vulnerabilities. Also has Y2K/security Information sources.

tags | vulnerability
SHA-256 | 73d076a1d46e60bf08ea93291abe8457424ded6288f087e755102d8e05a0cbc9
Fwctl-0.22.tar.gz
Posted Dec 18, 1999
Authored by Francis Lacoste

Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. It supports multiple interfaces, masquerading and packet accounting. Fwctl doesn't replace a good security engineer, but it can make the job of the security engineer simpler.

Changes: New support for port forwarding, definitions for pptp, ipsec, ip_pkt, icmp_pkt, and udp_pkt services, and minor bugfixes.
tags | tool, firewall
systems | linux
SHA-256 | 374331b057718bb23ee61c904c9b8e9a394d3334af5e3ee44a0b97e5c2b623c2
scanner.zip
Posted Dec 18, 1999
Authored by Rob Keir | Site members.home.com

SuperScan version 2.06 - "This is a powerful connect-based TCP port scanner, pinger and hostname resolver. Multithreaded and asynchronous techniques make this program extremely fast and versatile. Perform ping scans and port scans using any IP range or specify a text file to extract addresses from. Scan any port range from a built in list or any given range. Resolve and reverse-lookup any IP address or range. Modify the port list and port descriptions using the built in editor. Connect to any discovered open port using user-specified "helper" applications and assign a custom helper application to any port. View responses from connected hosts. Save the scan list to a text file. Transmission speed control. User friendly interface."

Changes: list merging and other enhancments.
tags | tcp
SHA-256 | 92c89d8f919b34f4668f0eee16d20d496d09e42b605c4d768c713e934368c296
nav2000.dos.txt
Posted Dec 18, 1999
Authored by Kyle

Remote DoS attack in Symantec's Email protection in NAV2000. The Protection program leaves a pop server running on the local workstation NAV2000 is installed on, which is vulnerable to a buffer overflow in a long user name.

tags | exploit, remote, overflow, local
SHA-256 | aaccfd8e405ec8b7ba562a2709ab7e65d5140e07269bdaa79017d2aff4dbcb5d
ATLAS.ZIP
Posted Dec 18, 1999
Authored by Digital Monkey

Windows / Dos CGI scanner (binary only) which checks for 65 remote vulnerabilities.

tags | remote, cgi, vulnerability
systems | windows
SHA-256 | aedc3208c7a21b9e8a00fc2e2d7fb8b9fb39bfa9c14af7eedb1af8a4bb1e4f98
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close