exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2000-05-05 to 2000-05-06

tcpstat-1.1.tar.gz
Posted May 5, 2000
Authored by Paul Herman

tcpstat reports certain network interface statistics much like vmstat does for system statistics. It gets its information by either monitoring a specific interface, or by reading previously-saved tcpdump data from a file.

tags | tool
systems | unix
SHA-256 | 1ea53182cab13b540301f88d750a465f53b542f915f02bede7e12a9d968458a0
oMBRa.c
Posted May 5, 2000
Authored by s0ftpj, FuSyS | Site s0ftpj.org

Linux kernel 2.2.x implementation of the CaRoGNa 2.0.x module Secret technique of the divine HOKUHACKO school [ Hokuto No Ken rules ;)] Sacred Strike of the Modular Renewal that bumps root down.

tags | kernel, root
systems | linux
SHA-256 | 2bf133e86ea4fc0e68826e775d8668b2e43f6fcbf8405c0482cbca6bbceed460
N0Sp00f.c
Posted May 5, 2000
Authored by s0ftpj, FuSyS | Site s0ftpj.org

Simple module to prevent lame people from using your box as a launch base for spoofed ip packets. Intercepts the socketcall() system call looking for the IP_HDRINCL parameter passed via setsockopt().

tags | spoof
SHA-256 | f2a3456b36ee72088bb3f22154d0d0757742823d0a1f5aa1bbe881390873b18e
LuCe.c
Posted May 5, 2000
Authored by s0ftpj, FuSyS | Site s0ftpj.org

Linux Loadable Kernel Module to keep an eye on the system, and add security 'on the fly' to a prexisting running box. Contains a simple implementation of BSD securelevels, while waiting for the official 'in-distro' arrival of Linux Capabilities [POSIX 1.e] in 2.4.x and strong ACLs.

tags | kernel
systems | linux, bsd, osx
SHA-256 | acb13ad23d34d3ac027d69404c713c283d541fe9f98969f2779ff97bcff33812
aurora.tgz
Posted May 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

Project aurora is lamagra's non-blind LAN spoofing project. It can be used to create TCP connections from a non-existing box or another box in the network. The biggest problem while spoofing was guessing the sequence numbers to acknowledge and that the other box always sends back a reset when it receives a SYN|ACK. This used to be solved by abusing small bugs in the tcpip stack.

tags | spoof, tcp
SHA-256 | 3468997662e967b3bb4c11bacb27971f09a1cd20742f8a53d195e8f32028fcc6
spider.tgz
Posted May 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

fs-spider is a multi-threaded bad permissions finder (user defined). It

SHA-256 | ea68f5abf6cbd21c366e7f35e65fb23ac152291db0553eeb4e10dfb206e2ff1a
connect.c
Posted May 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

This shellcode creates a connection to a host/port and starts a shell. This should be more anti-IDS then the others and it can go through a firewall.

tags | shell, shellcode
SHA-256 | d50e538d758dd930f5ec6b120b1229f2cdae67049c11ce1d22075a1a803c46f2
LoveLetterAnalysis.txt
Posted May 5, 2000
Authored by Lamagra | Site lamagra.seKure.de

An overview and Analysis of the LOVE-LETTER-FOR-YOU virus/worm.

tags | paper, worm, virus
SHA-256 | 91e72ac403333b1d6fa854a57c316306f67a39f3f33d59b7d9fe29d968376dcd
ascan.tar.gz
Posted May 5, 2000
Authored by Zucco | Site w3.swi.hu

Ascan v1.6 is a tiny port scanner written in perl.

tags | tool, scanner, perl
systems | unix
SHA-256 | 6c5ec2677be4951efd97f769f24403c0b0fa3530fd11cbda9ef6e90904f70160
apache-owned.gif
Posted May 5, 2000
Site torn.kaapeli.net

A screen shot from when apache.org was defaced with a Microsoft logo.

systems | unix
SHA-256 | 38f0cf3e545b9c2464873f3a18258c0b9275ff649438fc40fe2c60612ab725ef
mycio.loveletter.update
Posted May 5, 2000
Site mycio.com

myCIO.com is issuing an update to the Love Letter virus. Two new variants of the virus have been found.

tags | virus
SHA-256 | 73be9de186bc0eb00aa3d6c24ea39a891553a8135706bbc4f326a3079bb660de
mycio.loveletter
Posted May 5, 2000
Site mycio.com

myCIO.com is issuing a HIGH RISK OUTBREAK ALERT for this virus and is making available remediation tools at their website.

tags | virus
SHA-256 | 84fa732a01d6f1c13ddac3cf28f5126bc4ca97b8ab1d14b9e75eee114631fb9f
FIX_TO_LOVE.zip
Posted May 5, 2000
Authored by Nathan X | Site geocities.com

Divorce the Love Letter virus. Cleans the rubbish out that the Virus caused. Not elegant but does the job! Read then run the Run_Fix.bat. Use at your own risk.

tags | virus
SHA-256 | f8b8322a8efd0771596276ebaf05a1e132dbf3f08833e9ffcc6dc278c4adc7ff
elm-smash.c
Posted May 5, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

This exploit spawns an EGID mail shell on the default Slackware 4 install.

tags | exploit, shell
systems | linux, slackware
SHA-256 | d1e67efe4126f2f7afd3ac7d85e4649457759a6fd8ea24490ca70370881514ab
CA-2000-04.loveletter
Posted May 5, 2000
Authored by CERT | Site cert.org

CA-2000-04 - The "Love Letter" worm is a malicious VBScript program which spreads in a variety of ways. As of 2:00pm EDT(GMT-4) May 4, 2000 -- the CERT Coordination Center has received reports from more than 250 individual sites indicating more than 300,000 individual systems are affected.

tags | worm
SHA-256 | eaa8b55e8f6adc9cf76c31e3a64b42a148c5e59896510ac22b2d81f85aedb93f
nhc.kp.txt
Posted May 5, 2000
Authored by ipfreely | Site newhackcity.net

It is possible to cause a kernel panic on systems running NetBSD by sending a packet remotely with an unaligned IP Timestamp option.

tags | exploit, kernel
systems | netbsd
SHA-256 | b747da0110e154b2b2628b961c38ca2f85826139b358295e0e193ac45d7cae61
Internet Security Systems Security Alert May 4, 2000
Posted May 5, 2000
Site xforce.iss.net

A dangerous Visual Basic Script (VBScript) virus, dubbed the LoveLetter or ILOVEYOU virus, has been spreading itself across the Internet through email via Microsoft Outlook and through Internet Relay Chat (IRC) using a popular IRC client named mIRC. The virus is susceptible to activation whenever the Windows Script Host features are enabled.

tags | virus
systems | windows
SHA-256 | fba2c99bda6968dbb189d98fd36cb2615406aa0d8be416faaf4a6c7b36fb06cc
httpvereply.c
Posted May 5, 2000

Very simple yet affective http daemon version reply. Makes a simple http connection to the host then head's the version and prints to stdn, simple no? Written by rossex.

tags | tool, web
systems | unix
SHA-256 | 0b73d12b01b62b751ef57a035c7e3daa5f085e44089b41fdf5a776994e9a54d7
win2k.0503
Posted May 5, 2000
Authored by win2k | Site win2000mag.com

Windows 2000 Magazine Security UPDATE, May 3, 2000 - Peek Under the Hood of Distributed Denial of Service Attack Software, Cassandra NNTPServer Subject to Denial of Service Attacks, Cart32 Software Contains Backdoor, News: New Distributed Denial of Service Software Discovered, News: More Derogatory Netscape References, HowTo: Advanced Security in Exchange 2000, Part 1, and more.

tags | denial of service, magazine
systems | windows
SHA-256 | c56e05b025985897ac16ada81bfff5b5f3302bd044d64bd0f26a1a4939f5e4a6
STC3.zip
Posted May 5, 2000
Authored by SnakeByte | Site KryptoCrew.de

STC 3.0 is a multipurpose tool for Windows, which does the work of 30 seperate programs. Includes a .htaccess Brute-Forcer, Anonymous FTP Scanner, List of Bios Master Passwords, tiny CD-Player *g*, CGI-Vulnerability Scanner, Country Codes List, Dictionairy Generator, DNS, DomainScannerr, File Compare (Patch Engine), FTP Brute-Force, Service Scanner, Cached ISP Passwords Retriever, Hex/bin/dex/ascii converter, HTML Grabber, IRC Channel Brute-Force, IRC_Flooder, Link-Looker, NetBios Password Cracker, Password Generator, Ping / Traceroute, Port2Service, Portflooder, Portscanner, PortCheck (checks for open Ports), Port Watcher, Screensaver Password Retriever, Anonmailer / Mailbomber, OOB Nuke, Telnet Brute-Force and Whois lookup.

tags | cgi
systems | windows
SHA-256 | b9f0c6897072c8793d04a9bf3f0836ee4b916a00f2aeb152ba45bb29fd8e5a26
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close