exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2000-01-21 to 2000-01-22

Posted Jan 21, 2000
Authored by Gerard Paul Java

IPTraf 2.1.1 is an ncurses-based IP LAN monitor that generates various network statistics including TCP info, UDP counts, ICMP and OSPF information, Ethernet load info, node stats, IP checksum errors, and others.

Changes: This is a maintenance release fixing a small bug in the packet size breakdown facility resulting in inaccurate counts, and some typographical cleanup.
tags | tool, udp, sniffer, tcp
SHA-256 | 7aef3943210e51d61bcdd66e73a562b0d51d7a2a61d5d226ffc0a1067b2ede59
Posted Jan 21, 2000
Authored by Dark Spyrit, NedoDarkseed

Utility to send a trojan to any unpatched IIS 4.0 system by exploiting a buffer overflow. (Without SP6). Archive password is set to p4ssw0rd. Use at your own risk.

tags | overflow, trojan
SHA-256 | 8abefcb4d3a8d21e73681f483d24cf77218d8acc3a3b8a414dcf13843aaca94f
Posted Jan 21, 2000
Site oliver.efri.hr

If you're running BIND 8.2.2, and you have the victim.dom name servers in your cache, and victim.dom changes its server names, then any user who can make recursive queries through your cache can break your victim.dom lookups until the old records time out. The complete attack is one brief burst of legitimate packets. This is, of course, not as disastrous as BIND's next buffer overflow, but it's still an interesting example of how an attacker can use BIND's bogus "credibility" mechanism to exacerbate the effects of a seemingly minor bug.

tags | exploit, overflow
SHA-256 | c72ec0dd61841711d365e087961f01b3cc66fb2e349bb4274b3c897e6f364742
Posted Jan 21, 2000
Site oliver.efri.hr

OS tested was Windows 2000 and ICQ v99b ICQ is a very popular chat client that is affected by a exploitable buffer overflow when it parses an URL sent by another user. What this means is that arbitary assembly code can be run on the remote machine.

tags | exploit, remote, overflow
systems | windows
SHA-256 | c56d1f4e56219b6d49de977af302c96651bb3965e3248d8a7976706cedb0949c
Posted Jan 21, 2000
Site oliver.efri.hr

orel Linux comes with a program called "Corel Update" to manage the ".deb" files. This X oriented program is setuid root. The program is "get_it" and it's located in the /usr/X11R6/bin directory. If you can run it, it's easy to get root privileges in your system.

tags | exploit, root
systems | linux
SHA-256 | 638e23401a5d45ff0435f80bdbe0006c13f71306efdb836fc11c7244771cbff7
Posted Jan 21, 2000
Authored by Omachonu Ogali | Site tribune.intranova.net

Patch to sh(1) that adds denying and logging features (user ID, username, process ID, parent process ID, parent process name, login name). Checks against /etc/sh.deny and if the parent/calling program is listed then execution is halted and logged.

systems | unix
SHA-256 | e7f2e3bc323b328a675b4a4435ca103b1eb24ea40133b716e01a44446063df6e
Posted Jan 21, 2000
Authored by Michal Zalewski

nsuncat 0.01b - Unix socket connectivity from the command line. (works just like netcat for tcp/udp sockets)

tags | tool, udp, tcp
systems | unix
SHA-256 | 49088a575ee48d6c5401773d67d701fbde1b7fe01256a0d55e04ed9c19f06f5b
Posted Jan 21, 2000
Authored by Carcin0gen | Site carcin0gen.gq.nu

Dust v0.2 is a shell script which runs 22 DoS attacks discovered in 1999. Linux only.

tags | denial of service, shell
systems | linux
SHA-256 | 6ee872e397c22ba40d1d8534251ba7aa9c8a767b1cfdc42d379004c10d933253
Posted Jan 21, 2000
Authored by Karellen | Site members.xoom.com

Pretty Simple Password Generator (PSPG) is a small and fast password generator for creating secure, non-pronounceable passwords which are harder to break.

Changes: This release features code modularization, documentation updates and a ChangeLog.
systems | unix
SHA-256 | d45a1367af53af6cdfdcecd6c7047ac0e26fb1907028ea08ad53ab7e83009b33
Posted Jan 21, 2000
Authored by Jon Rifkin | Site sp.uconn.edu

ipaudit records network activity. It stores a count of bytes and packets exchanged for every combination of host/port pairs and protocol. It can be signalled after a fixed interval (30 minutes is typical) to output results. It's useful for identifying heavy bandwidth users, intrusive telnet sessions, denial of service attacks, scans, etc. There is also an option (like tcpdump) to save raw packet headers for detailed analysis with packages such as tcpdump or ethereal.

Changes: Bug fixes.
tags | tool, denial of service, sniffer, protocol
SHA-256 | 1b4a2f607b16ee8714ad2c63bb1e5bb45fcae275e760e2ca06fa870c52bb64db
Posted Jan 21, 2000
Authored by Jon Squire

Packet Storm Contest Entry - GNIDS - Early Detection of Unknown Threats.

tags | paper
SHA-256 | 27506f2302d5ac51fe2ff3d94a76ad42b306262c323ecb385ae8749bb1bd76ae
Posted Jan 21, 2000
Authored by Mixter, 000 Prize Winner!

Winning Packet Storm Contest Entry - Protecting Against the Unknown - A guide to improving network security to protect the Internet against future forms of security hazards.

tags | paper
SHA-256 | 0e6222b8be5665deed5eefcf97e95600e15395e70fc048b75e1a1963cb6c8da9
Posted Jan 21, 2000
Authored by rain forest puppy, NightAxis

Packet Storm Contest Entry - Purgatory 101: Learning to cope with the SYNs of the Internet.

tags | paper
SHA-256 | acbfe437758ef4ccfb79fde7993aac9a5d2d865fa6ba4948cd195b2923ef09cf
Posted Jan 21, 2000
Authored by Richard Kay

Packet Storm Contest Entry - What pure or applied technical measures can be taken to protect the Internet against future forms of attack?

tags | paper
SHA-256 | b0be1a071bb2e0cd451041db46a6141f23ffb470c2a62f0f376fd69b529fbbf4
Posted Jan 21, 2000
Authored by Simple Nomad

Packet Storm Contest Entry - Strategies for Defeating Distributed Attacks.

tags | paper
SHA-256 | adbb93cf6584385ff3b5f74b554128ad787340889c56f79cd9fcd7d9e7965277
Posted Jan 21, 2000
Authored by Tim Yardley

Packet Storm Contest Entry - Distributed Attacks and the Way To Deal With Them.

tags | paper
SHA-256 | 1a42adf4a368ec5cf3cb42e9d92d3461129fdbe6b553d0b6eeedf486e1da348e
Posted Jan 21, 2000
Authored by Martin Roesch | Site clark.net

PowerPoint presentation on Snort - Lightweight Intrusion Detection for Networks.

tags | paper
SHA-256 | ad624664b0dd306cea5ff87e2c546a2310c71bff4dd37c3c5130db342db4cad9
Page 1 of 1

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By