exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2000-03-07 to 2000-03-08

Posted Mar 7, 2000
Authored by Fflewddur

BsdScan is a light-weight port-scanner designed for the BSD operating system. It currently supports scanning single hosts, subnets, logging results, scanning ports in a random order, specifying a port range, and a speed option to only scan commonly used ports.

Changes: A start on implementing syn/ack stealth scanning, and lots of code cleanup.
tags | tool, scanner
systems | unix, bsd
SHA-256 | 27fd77407440bfc8afb4b33cd5141e11c00fc20838f2287c65bc86f03127699e
Posted Mar 7, 2000
Authored by Infernal Pulse

Flog.c crashes Win95/98/se webservers by sending GET /con/con HTTP/1.0.

Changes: This one works.
tags | exploit, web
systems | windows
SHA-256 | a3f74e82a510d0b46f247c9d9e3f13987429393849fd1e3158d7cf980d73b61e
Posted Mar 7, 2000

Linux binaries for Mirkforce, a program that allows you to load a lot of clones from a server using subnet addresses.

systems | linux
SHA-256 | c31abe3099a57cc0151a77566e8b5eecc27883c25b21b5722723652d2d3c2462
Posted Mar 7, 2000
Authored by Mixter | Site mixter.void.ru

LibMix v1.05 is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

tags | spoof
SHA-256 | a43c83e60f1526ed38138346b9102a4cb27bc1531e235eb0bd78c583dea8a013
Posted Mar 7, 2000
Authored by Carlos Eduardo Oliveira

Windows script which modifies the registy to include c:/con/con, rendering the system useless and unfixable. May affect win2k as well.

systems | windows
SHA-256 | 1c39e09e3a612fedf7f5c10fa1610f20eafa27439a1e9ce8e3e609e05ae63b37
Posted Mar 7, 2000
Authored by Obecian | Site celerity.bartoli.org

The Nemesis Project is designed to be a commandline-based, portable human IP stack for UNIX/Linux. The suite is broken down by protocol, and should allow for useful scripting of injected packet streams from simple shell scripts.

Changes: This fixes a major oversight in 1.0pre1 that was only injecting packets that only had payloads (non-payload crafted packets weren't getting injected). This is the final release (the successor to nemesis will be suited more to blackhat oriented scenarios (eg spoofing entire connection streams, brute force ISNs, man in the middle attacks, etc).
tags | tool, shell, protocol
systems | linux, unix
SHA-256 | a6549adc745d3a4304fb9415e1eb04d4e93da7b25029d3357b80736a9b670921
Posted Mar 7, 2000

Decrypts the password for VNC, a pcanywhere like program. Tested on linux.

tags | cracker
systems | linux
SHA-256 | c0bb7af09e2cf5afe223bde134e56cb0b828bc093f449015ecd4038ba47f4ea4
Nmap Scanning Utility 2.3 BETA 15
Posted Mar 7, 2000
Authored by Fyodor | Site insecure.org

Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: Added --resume option to continue a large network scan where you left off. Added --append_output option which causes nmap to append to the logfile rather than overwrite it. Also added portability, segfault, and configure fixes.
tags | tool, remote, tcp, nmap
systems | unix
SHA-256 | 86c6a9516b37a8d40a8d0e486108ba132671ea300cf7475fcc3dce808f8db0bc
Posted Mar 7, 2000
Authored by Damien Miller | Site openssh.com

This is a Linux port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Several fixes including an important RSA key generation fix for systems that lack /dev/random.
tags | encryption
systems | linux, openbsd
SHA-256 | 32240fec30cfa854063857665a09d523aa02e01fc9144d8994e6626c45b0db88
Posted Mar 7, 2000

Microsoft Security Bulletin (MS00-015) - Microsoft has released a patch for a security vulnerability in the Microsoft^n Clip Art Gallery. The vulnerability allows a malicious party to cause hostile code to execute on the computer of a user of the Clip Art Gallery. Microsoft FAQ on this issue here.

SHA-256 | 310740e2c39043811bb56afff2bb1ad0c2a35cd79d701fe58fcf807058d88de0
Posted Mar 7, 2000
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.

Changes: SLIP/PPP support, redhat bugfixes, and IP address display when no /etc/ethers exists.
tags | tool, sniffer
SHA-256 | 058f6409dbd1fa202f9163eb2bcaf41b97951ec500a2dcfe61eed416e3629225
Samhain File Integrity Checker
Posted Mar 7, 2000
Authored by Rainer Wichmann | Site samhain.sourceforge.net

samhain is a distributed host integrity monitoring system. It consists of monitoring agents running on individual hosts, and a central log server collecting reports from these agents via authenticated TCP/IP connections. On single hosts, it is possible to run a standalone monitoring agent. Currently, agents may monitor the integrity of files and directories, and watch for login/logout events. In addition to forwarding reports to the log server, other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. samhain has been tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: A module to watch for login/logout events has been added, deleted files are recognized now, a race condition has been fixed, write permission to critical files is checked more strictly, logging thresholds have a more syslogish syntax, messages are queued for delivery during temporary mail delivery failures and log server downtimes, some minor bugs have been fixed, and a test script has been added for better testing. New DB format.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | c4bec6eae7b835c7924032b004d61e27b74c80010826672f9a8458c4206485d7
Posted Mar 7, 2000
Authored by Narrow | Site legion2000.cc

Narrow Security Scanner 2000 searches for 365 remote vulnerabilities. Written in perl, tested on Redhat, FreeBSD, and OpenBSD, Slackware, and SuSE.

Changes: More vulnerabilities added.
tags | tool, remote, scanner, perl, vulnerability
systems | linux, redhat, unix, freebsd, suse, slackware, openbsd
SHA-256 | 9c539e9abaebbcf70c50b50ed202344fa15cbc9becec2ac8e9b5f4f61e1a7373
Posted Mar 7, 2000
Authored by Farrell McKay | Site fortify.net

Fortify provides full strength, 128-bit encryption facilities to the export editions of Netscape Navigator and Communicator. These facilites are used when connecting to an encrypting web server (with the SSL protocol). Fortify also adds the ability to generate 1024-bit RSA keys internally (these are typically used for client certificates), plus the ability to send and receive e-mail messages using strong 128-bit encryption (with the S/MIME protocol).

Changes: This is a transitionary release to support Communicator 4.72.
tags | web, protocol
SHA-256 | bb0d88da5722e9beb5f5a958b5f5b9babf828479e69482df28acca997165df11
Page 1 of 1

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    18 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    31 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By