exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2000-04-21 to 2000-04-22

scx-sa-02.txt
Posted Apr 21, 2000
Authored by Zoa_Chien

Securax Security Advisory #2 - When the Microsoft Windows explorer tries to access parsing a filename that contains over 129 chars in the extension, a buffer will overflow, causing explorer to crash. EIP is overwritten, remote code execution is possible.

tags | exploit, remote, overflow, code execution
systems | windows
SHA-256 | ca0475e472c074311283c6e68eb2f2b3788eee8f4ebe7e4d9c81e5bfada79c23
communigate.pl
Posted Apr 21, 2000
Authored by r00tabega, Bansh33 | Site r00tabega.com

communigate.pl is a DoS exploit against CommuniGatePro 3.1 for NT.

SHA-256 | 3c4ca0bd0f5f75d0a744d6c32d7bbbc01e060250be2da4e3f804f20d72c0e403
winsd.041900.txt
Posted Apr 21, 2000
Authored by winsd | Site win2000mag.com

Windows Security Update April 19 - In this issue: Buffer Overflow Condition in Microsoft Web Component, Registry Permissions Could Expose Cryptographic Keys, Excessive Escape Characters Can Slow IIS, Buffer Overflows: The Developer's Bane, News: F5 Networks Release SSL-Accelerator, News: Software Pirates Thrive on Auction Sites, Simplify Access to Private Data and Applications, Next Generation E-Business Virus Security Solution, Tip: How to Restore Default File Permission Settings, Windows 2000 Security: Advances in Administrative Authority, and Writing Secure Code: Avoid Buffer Overruns with String Safety.

tags | web, overflow, registry, virus, magazine
systems | windows
SHA-256 | d0496f27d3915d0f6a571345a7ebb8e3a46820dcc29cae74e7f0a161613bdbef
gibd00r3.c
Posted Apr 21, 2000
Authored by Axess | Site b0f.com

gibd00r3.c is a passworded backdoor which pretends to be an ident daemon.

SHA-256 | 7b6db7e36e91a54f7173f857cc6b40ffcb38c863277fe0fb28b5d164b0d398fd
nschecker.sh
Posted Apr 21, 2000
Authored by Axess | Site b0f.com

nschecker.sh NS Security Scanner - Uses dig to query the bind version from a list of ips.

SHA-256 | 5203f72cc2e3666b7f8f06351f3fb5b0e8001b4e13f7f85d62b9195dd6f98dbd
proxylog.pl
Posted Apr 21, 2000
Authored by Vladimir Lohov

Proxylog.pl logs all IP's of visiors who came to your site using proxy.

tags | web
SHA-256 | ae18aa3f932d9f4de9f0f2f86948f7c276bdc62cb83f701c4152740a1a37b49d
stringwiper.sh
Posted Apr 21, 2000
Authored by Axess | Site b0f.com

Stringwiper is a shell script that wipes a certain string from all files in /var/log.

tags | shell
SHA-256 | 83ca074cce0715f6488673c1ff80a80e0487525793faaf5e5d2684f97f9b3ced
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close