exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 477 RSS Feed

Files Date: 2000-01-10 to 2000-01-11

Posted Jan 10, 2000
Authored by Amir, Pisang

Clone.c mutation - Clonebot IRC war script.

tags | denial of service
SHA-256 | aaa31957a35cc46bb46b173b0eff597201a4590d2decf46f8351852f60114306
Posted Jan 10, 2000
Authored by winsd

Windows NT security update - Georgio Guninski discovered a problem with Internet Explorer that may allow the circumvention of the browser's domain security. Microsoft is aware of the issue, however no response was known at the time of this writing. Details here.

tags | magazine
systems | windows
SHA-256 | 3d8453baf779aa48a54279be429ddc72af319e8be0ef01cc23d83f7fbab12591
Posted Jan 10, 2000

Wu-ftpd 2.4 remote root exploit for SuSE. Tested on SuSE 6.0 running Wu-ftpd 2.4.2-beta18.

tags | exploit, remote, root
systems | linux, suse
SHA-256 | 862433a85c3fe8dac027facc9893261265443d119f46a08313455648da4c343a
Posted Jan 10, 2000
Authored by Ytcracker

Remote exploit for PowerScripts PlusMail (all versions to current). Plusmail is an extremely popular cgi-based administration tool that allows you to remotely administer your website with a graphical control panel interface. The password file, however, is set with permissions rw enabled. All platforms are affected.

tags | exploit, remote, cgi
SHA-256 | 3a4c5c187df76131d4ae05c24665c8c7ee7290abe354df60a05f00210e06f59c
Posted Jan 10, 2000
Authored by Icer | Site ic3d.tsx.org

This program is a fake logon screen for Altavista's Free Internet Service (FreeAV). It automaticly logs the password and username and date in a log file. Screenshot here. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | 073be178a4d39072eea70fa81cbf4575c56001c8472fc66a1f820836fa33b57e
Posted Jan 10, 2000

A security bug was found in userhelper; the bug can be exploited to provide local users with root access.

tags | local, root
systems | linux, redhat
SHA-256 | fc3a85f9ccd212e3b0bcadc3eaae214af2b8f7c2b9310450a380508e3ed8aca2
Posted Jan 10, 2000

Two security vulnerabilities exist in the lpd (line printer daemon) shipped with the lpr package. First, authentication was not thorough enough. If a remote user was able to control their own DNS so that their IP address resolved to the hostname of the print server, access would be granted, when it should not be. Secondly, it was possible in the control file of a print job to specify arguments to sendmail. Through careful manipulation of control and data files, this could cause sendmail to be executed with a user-specified configuration file. This could lead very easily to a root compromise.

tags | remote, root, vulnerability
systems | linux, redhat
SHA-256 | 56b741d61ee2576a5d24470f80029e501accafe37d6d997f5fa992cf0d973d00
Posted Jan 10, 2000
Authored by Thomas Lundquist | Site zelow.no

floppyfw is a router and simple firewall on one single floppy. It uses Linux basic firewall capabilities and have a very simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It has a simple installation, mostly only needed to edit one file on the floppy.

tags | tool, firewall
systems | linux
SHA-256 | 3bfa89b8fab1ead497e119f9cc1b129783e0c86f449a72c0ac952df65a4a9f6d
Posted Jan 10, 2000
Authored by Rusty Russell | Site samba.org

netfilter is a framework for arbitrary packet mangling. So far, a new NAT system and packet-filtering system have been built on top of it, as well as compatibility modules for ipfwadm and ipchains. Netfilter is a work-in-progress, but should be fairly robust for non-exotic work.

Changes: Support for kernel 2.3.38, and accumulated fixes.
tags | tool, arbitrary, firewall
systems | linux
SHA-256 | 5c408a9ccdfb46e1d8fa414673cca5538332fbf428a258088e7938ed700858a9
Posted Jan 10, 2000
Authored by Mike

Checksums takes a file of predetermined MD5 checksums and compares with the current sum. It can be installed as a command line tool, or as a CGI which will allow you to upload the sums file remotely. In either case it is a useful tool to detect changes in your system files, such as a trojan.

tags | tool, cgi, trojan, intrusion detection
systems | unix
SHA-256 | 96a42c4516d93a85f9e64561995083aa0404bd3dd489339bcc99aca203398fbe
Posted Jan 10, 2000
Authored by R. Gregory | Site linuxmafia.org

gShield (formerly Godot's Modified Modular Firewall), is an aggressive, modular, ipchains-based firewall script. Features include: easy configuration through a BSD-style configuration file, optional IPmasq support, TCPwrapper-like funtionality for service access, and extremely restrictive defaults. It hopes to make administrating a comprehensive firewall easier, as well as offering robust protection.

Changes: Various typo fixes, an option to drop traceroutes, a safety option to ensure remote X connections are dropped, various ip_masq_mod tweaks, fixes for POP3 errors, fixes for incorrect cable DHCP port designations, and readdition of various winclient trojan protection.
tags | tool, firewall
systems | linux, bsd
SHA-256 | 2b2b2f05385266ea208312a5a7ef5622705f625a29c02d2dc8a2f145be1702a1
Posted Jan 10, 2000
Authored by Ian Zepp | Site islc.net

Kmap is a QT/KDE front-end to nmap, a popular and powerful console portscanner. Kmap allows quick and easy access to all of nmap's features, with much less hassle. Kmap also sorts the output from nmap into usable sections, so you easily extract the information you want.

Changes: Fixed install problem.
tags | tool, nmap
systems | unix
SHA-256 | de9be336a87deb7dc42bf57855679326caf55bfe92d50ce1ccbc0986d25c4f20
Posted Jan 10, 2000

The version of nvi that was distributed with Debian GNU/Linux 2.1 has an error in the default /etc/init.d/nviboot script: it did not handle filenames with embedded spaces correctly. This made it possible to remove files in the root directory by creating entries in /var/tmp/vi.recover. Debian security homepage here.

tags | root
systems | linux, debian
SHA-256 | 6d4d0a9f29c0d75e85c71619ed6c28d2c170f546ad98962ee9eee00a03583594
Posted Jan 10, 2000
Authored by Jason | Site technotronic.com

When you write buffer overflows you need to put the opcodes, not the actual assembly in the script, or file or whatever. This program allows you to insert the assembly into the program, and then it outputs it to a text file in string format so you can put it directly into a char buffer in a C\C++ program.

tags | overflow
SHA-256 | ee23bb2efd95ce84c852fdf6822d8cf9332d4492a2ce0ee628408c5fd17e3726
Posted Jan 10, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: This release fixes a lot of bugs that crept into the 0.8.0 release, and provides a workaround for problems when capturing with libpcap from RedHat 6.1 (and perhaps some other recent libpcaps). Some new GUI and printing options are avialable, plugin settings can now be saved, and an L2TP decoder has been added.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 0eedca5debe6af6a5af845337e86808bb47200e01fa50d69a0c58f3e3d9b74ba
Posted Jan 10, 2000
Authored by Spirit | Site s0ftpj.org

NetRaider - Remote W9x/2000 Administration Tool. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
SHA-256 | e379315a4b8a5841d6ef735084a467af6ec33712111b63d7ade2831308b070da
Posted Jan 10, 2000
Authored by s0ftpj, Pigpen

Gcc 2.7.2.x Exploit - C version.

SHA-256 | 867a0fdc26a013485e3d1f9f158a953de2b5612c8ef8f16856d92774668eb453
Posted Jan 10, 2000
Authored by s0ftpj, Pigpen

LKMs to forge and detect spoofed packets on your host.

tags | spoof
SHA-256 | 63eeed4aae44fadc07265a1c0556b5a934b034ff55fa486354a70e0a716427c9
Posted Jan 10, 2000
Authored by Dark Schneider

Covert Tunnelling in ICMP 0x00 ECHO REPLY messages for Windows.

systems | windows
SHA-256 | 4262694dbb61e796e99741c6d41e263dbe37a5eee399e98fdd70e9d047dc32cc
Posted Jan 10, 2000

The version of lpr that was distributed with Debian GNU/Linux 2.1 and the updated version released in 2.1r4 have a two security problems - Local users can obtain root access and remote users can access the print server. Debian security homepage here.

tags | remote, local, root
systems | linux, debian
SHA-256 | 76f28548f53eab0c17b0e5cb003d08d19470656cb9af609506e56f57b0c25ed8
Posted Jan 10, 2000
Authored by s0ftpj, Ma

Reverse Engineering Winamp - How to modify windows binaries to do anything you want. Uses reverse engineering winamp to read encrypted mp3's as an example.

systems | windows
SHA-256 | b205c7aa737490b5282634163d7d5c96864e4fc24cac7d39c30de010ec9c410e
Posted Jan 10, 2000
Authored by r00tabega, Bansh33 | Site r00tabega.com

This script will upload a trojan to an RDS vulnerable site running NT and execute the trojan.

tags | exploit, trojan
SHA-256 | 103493a4c6051cab304f220b22274a4ca432f01306d62d03af4825d7c7bf7105
Posted Jan 10, 2000
Authored by misteri0

Opens a password protected backdoor and lets you execute commands, and then hides in the background. Based on gs.c.

tags | tool, rootkit
systems | unix
SHA-256 | 118f42a1b5e7124b4e829331a89a5b9f25e3c7b3cc532e337fd5d7b50f328bc9
Posted Jan 10, 2000


SHA-256 | 7e0972b43759005224b7400e4fe364e662a155b0eb2f90c90a42b372f8cd141e
Posted Jan 10, 2000

The Audio Security File is world writable on HP9000 Series 7/800 running HP-UX releases 10.X and 11.X. Denial of service, increase in capabilities possable.

tags | denial of service
systems | hpux
SHA-256 | 40cdf8e217100d575b7d1230b20a876d147c01cfb06025595a9f49baf3429cce
Page 1 of 20

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By