exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2000-05-03 to 2000-05-04

Internet Security Systems Security Advisory May 3, 2000
Posted May 3, 2000
Site xforce.iss.net

Internet Security Systems (ISS) has identified a vulnerability in id Software's Quake3Arena that could allow an attacker to read or write files on a computer that has the software installed. This vulnerability is important to network administrators who may be unaware that users are accessing potentially malicious Quake3Arena servers outside their network.

SHA-256 | 8a4d017e58a2be864d22ccf98c21f702854bcc48268c04bd1317160450a209b9
coopersniff01.zip
Posted May 3, 2000
Authored by Brett Cooper | Site www4.50megs.com

NT Sniffer 0.01 - For NT4.0 includes a packet driver. Sniffs packets from networks and displays full information for: Ethernet, IP, TCP (data also), and UDP.

tags | tool, udp, sniffer, tcp
SHA-256 | c8c50c798895bc540413534177006b7c4fe4d2bd9758eb5f974dc33a198194a5
agents.txt
Posted May 3, 2000
Authored by Lenny Zeltser | Site zeltser.com

The Evolution of Malicious Agents. This paper examines the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the possibility of a new breed of malicious agents currently being developed on the Internet.

tags | paper, worm, trojan
SHA-256 | a10ecef1e5e13582371d8c84dcc65e8d8f741b6f00a1563c581b35984387104d
SPJ-003-000.txt
Posted May 3, 2000
Authored by s0ftpj, FuSyS | Site s0ftpj.org

s0ftpr0ject Security Advisory 003-000: Remotely Exploitable Buffer Overflow in Sniffit. Possibly all systems running Sniffit (0.3.7beta and all versions logging mail headers). Successful attacks depend on being able to craft shellcodes so they can bypass input filter.

tags | overflow, shellcode
SHA-256 | a304b30bb689966880a997812a854919d1e4be60e485e7b36713ff31343e60ac
exman.c
Posted May 3, 2000
Authored by teso | Site team-teso.net

exman.c is a new man exploit.

SHA-256 | 832e578f11428c863468dabddea6bce1956334bf36020dad8673f91d5be34f3b
outp.c
Posted May 3, 2000
Authored by teso | Site team-teso.net

outp.c will convert .s files to shell code.

tags | shell
SHA-256 | a73e95b1db0a4a21d695a880d2485a1846a07cce539dcd13bafb1682d7bf7492
RFParalyze.txt
Posted May 3, 2000
Authored by rain forest puppy, Evan Brewer

Through a netbios session request packet with a NULL source name, Windows 9[5,8] show a number of odd responses. Everything from lockups, reboots and "the blue screen of death", to total loss of network connectivity. Source code included. Reverse engineered from a binary exploit already in use.

tags | exploit
systems | windows
SHA-256 | f3538a492ff6e70e86c22b289cde727edd32fe6a78aeb81e4c21dbecb58b573c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close