what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2000-01-22 to 2000-01-23

WinGateVacuum1.0b3PPC.sit
Posted Jan 22, 2000
Authored by WeeDo | Site freaky.staticusers.net

Wingate VaccuuuUUuuUUum 1.0b3 for Macintosh - This is a program to easily get a large list of proxies out of Undernet IRC servers. Put it your favorite undernet server - it checks their ban list and scans the IP's for proxies.

SHA-256 | c3548e40f5e2dee49ed8f44ad5a8fc82c0e01be38bd74fce526e2a06376adb57
MacPork1.5b.sit
Posted Jan 22, 2000
Authored by DarkSider | Site freaky.staticusers.net

MacPork 1.5 is a CGI scanner for the Macintosh platform which scans for 130 vulnerabilities and can use 45 of them to retrieve a passwd file.

tags | cgi, vulnerability
SHA-256 | 8f7c6d70bc77f5959424563436e427dee2180c15f9dea40d94224c70804500c5
freebsd.sa-00.01.make
Posted Jan 22, 2000

FreeBSD Security Advisory - The -j option to make uses /tmp in an insecure mannor, making it vulnerable to a race condition. All versions of NetBSD and OpenBSD are also believed to be vulnerable to this problem. Other systems using a BSD-derived make(1) binary may also be vulnerable.

systems | netbsd, freebsd, bsd, openbsd
SHA-256 | 9f13080452f421de034e128ba41795769a2accb1bdbe6066e58cc5c59e60b039
RFPoison.c
Posted Jan 22, 2000
Authored by rain forest puppy | Site wiretrip.net

Source for the RFPoison, a NT remote DOS. NT 4.0 server and workstation are vulnerable, even with SP level 1, 3, 5, or 6.

Changes: AVP no loger thinks this is a trojan, and it no longer reboots the machine it is running on.
tags | remote
SHA-256 | 97b128e117f9dab3ea840c5462d01811717f598125ea7c7d49bde330c80268b9
pc-1.1-dist.zip
Posted Jan 22, 2000
Authored by Steve Lodin | Site noncon.org

PalmCrack, the password testing tool for the Palm Computing Platform. Designed to help security professionals determine the strength of passwords, PalmCrack is able to check UNIX and NT passwords against a dictionary and decrypt certain Cisco router passwords. PalmCrack runs on PalmOS 2 and PalmOS 3 devices, including the PalmPilot Professional through the PalmVII and the IBM WorkPad series.

Changes: Includes programs to allow you to create your own wordlist databases.
tags | cracker
systems | cisco, unix, palmos
SHA-256 | 30ddc35fea2c97c26d0534740ff97a9b3d14916047daeb78d640586e04c04891
checkpoint-fw1.vuln.txt
Posted Jan 22, 2000

Outlines two basic vulnerabilities in Checkpoint's Firewall-1. The first is an authentication problem which allows easy brute force attacks; the second allows you to use the first to remotely administer someone else's firewall without their knowledge.

tags | exploit, vulnerability
SHA-256 | ab7c8cb66cb9a649b887f0163e7e820092e38e0740ba667e59b9a4fe71b8851a
Bastille-1.0.2.tar.gz
Posted Jan 22, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible and educational Security Hardening Program for Red Hat Linux 6.0. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Bug fixes including a fix to the "Bastille breaks useradd" bug.
systems | linux, redhat
SHA-256 | 3e8041edc8e93e09f2073ba51a9a55ad52fd9f773bd2a40fa8cd0a2dbde14990
cuteftp-012000.txt
Posted Jan 22, 2000
Authored by Black Hand | Site 2600.org.au

Exploits the weak encryption scheme utilized in CuteFTP.

tags | cracker
SHA-256 | 7f8b4575b9310dcbb0d90b820a3be19249f5529bda8ff71e6ae00c10f9d4343c
nscache-0.2pl2.tgz
Posted Jan 22, 2000
Authored by Stefan Ondrejicka | Site idata.sk

nscache is a simple program to browse the Netscape cache directory with a GTK UI. It shows the contents of the browser cache in a three level hierarchy of files: protocols, servers and documents. nscache permits you to files to the cache, remove files or gather various information about specific files.

Changes: UI reorganization, minor bug fixes and portability fixes.
tags | tool, protocol
systems | unix
SHA-256 | f1e405bc2594085f686f2fdec6896a31979f5af419e62004b24dd37fb2dc98b9
triplight.tar.gz
Posted Jan 22, 2000
Authored by Snupe | Site linux.rice.edu

Triplight 0.01 - Triplight is an intrusion detection, and integrity monitor system. It is a simpler version of tripwire, developed in perl. This release is rather unpolished (you need to hack up a crontab file, and to set a file path in the perl source), but fully functional. To accomplish it's design goals, it reads in a list of files stored in flat ASCII, and uses md5sum to check their integrity against that recorded earlier in a database. If the database is placed on a read-only medium such as a write-protected floppy, then it should provide an infallible record against remotely installed trojan horses. Thus by monitoring the integrity of the system, triplight will serve as an aid in intrusion detection.

tags | tool, trojan, perl, intrusion detection
systems | unix
SHA-256 | baa51be89fc7c72738e393cfffa962c00a3b094149ca05f7e7fc58cf820b6ea7
saint-1.5.beta2.tar.gz
Posted Jan 22, 2000
Authored by Sam Kline | Site wwdsi.com

Security Administrator's Integrated Network Tool Version 1.5 beta 2 - Includes new options, including the ability to read a list of target hosts from a file. This release also has many new checks for UNIX and Windows, including nine new checks for backdoors in Windows hosts. Several bug fixes are implemented in this release, in conjunction with more efficient OS typing.

tags | tool, scanner
systems | windows, unix
SHA-256 | 8d01e18171c155737e17050e29d7e2731bc83c7bc84124795c62caf283e239c8
uw-ppptalk.c
Posted Jan 22, 2000
Authored by Shane A. Macaulay

UnixWare 7 exploit for /usr/bin/ppptalk.

tags | exploit
systems | unixware
SHA-256 | 10de24aa93dd63689988d573d193dad1b34aff38e4811d4a1f12d1f1b2c411f6
vcasel.htm
Posted Jan 22, 2000
Site oliver.efri.hr

Vcasel (Visual Casel) is apparently intended as some sort of addon to Novell Netware 3.X and above. The program does succeed in limiting the names of the files executed, but there is no path verification.

tags | exploit
SHA-256 | 1afd8be0e8218ce48904ec923ced26cfb2a7d6b7676222d7ce79c396c4c63c18
vwall3.htm
Posted Jan 22, 2000
Site oliver.efri.hr

Sending an SMTP message with a malformed attachment, it is possible for malicious code to avoid detection by Trend Micro's InterScan SMTP scanner version 3.0.1 for Solaris. Other versions may be affected as well, but were not tested.

tags | exploit
systems | solaris
SHA-256 | 52dbfec4c390c07ad3b30020cf3ca2c0d7eced0ce691fdf7b2622e5b31dddd6b
stream-dos.txt
Posted Jan 22, 2000
Authored by Tim Yardley

Explanation and Code for stream.c issues. This DoS targets FreeBSD, Linux, and Solaris and floods the host with ACKs coming from random IPs with random sequence numbers. Unofficial freebsd patch here.

tags | denial of service
systems | linux, solaris, freebsd
SHA-256 | 2c71e2f1f680ea8109d20d13e3b83e2a90313a0e4c2d9f72f9fc8f9bdbed7cf8
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close