what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 431 RSS Feed

Files Date: 2000-05-01 to 2000-05-31

cproxy.c
Posted May 19, 2000
Authored by TDP | Site hack.co.za

Remote Denial of Service for CProxy v3.3 - Service Pack 2 for Windows NT.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 9ac11023436a234df248b583ff8d03b1479376974e945735da16e7d03204fcf6
xsol-x.c
Posted May 19, 2000
Authored by Larry W. Cashdollar | Site vapid.dhs.org

/usr/local/games/xsoldier local root exploit. Tested under Mandrake 7.0.

tags | exploit, local, root
systems | linux, mandrake
SHA-256 | 2efbf7e734506a09a852e6b3154a6163a11aff489a05f01d6c99f70a70026d5b
anti_sniff_researchv1-1-1.tar.gz
Posted May 19, 2000
Site l0pht.com

Antisniff Unix Researchers (free) version 1-1-1 - This is a command line only version that runs many of the same tests to determine if a sniffer is running on the local network that the Windows NT/98/95 GUI does. Currently only Solaris and OpenBSD are supported.

Changes: This release fixes a security hole - all users should upgrade.
tags | tool, local, sniffer
systems | windows, unix, solaris, openbsd
SHA-256 | dd2bed88c7d033d59f684e267fe00741d2bfc83be7a3225eaee07c753a830bf0
as-1021.zip
Posted May 19, 2000
Site l0pht.com

AntiSniff v1.021 - Antisniff is Windows software which will detect if any sniffers are running on the network. Works on Win 95, 98, and NT, but not Win2k.

Changes: This release fixes yet another security hole - all users should upgrade again.
tags | tool, sniffer
systems | windows
SHA-256 | bb828aaed4b5cb305ee28ab3566af719abcdf3ee090afcefe89f9c54d7527ed8
klogin.c
Posted May 19, 2000
Authored by Duke

BSDI 4.0.1 klogin remote root buffer overflow. The bug is actually in the kerberos library so this affects all kerb services (kerbIV). This code should need minimal (if any) modification to use on other kerberos services.

tags | exploit, remote, overflow, root
SHA-256 | 1b0f7877e7927a3a5a48023fc649c6dac7e3795fa63faecbebcd4b1f20ef1e42
0004-exploits.tgz
Posted May 19, 2000
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for April, 2000.

tags | exploit
SHA-256 | c99c256ff819c4f91780a7fd9543561a63cf4ac7107e11f7e6f8b3b06263b4d3
0003-exploits.tgz
Posted May 19, 2000
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for March, 2000.

tags | exploit
SHA-256 | 9f748d3bdcbb353ef839d0fa1b4cc33475d72f25779d4224b03144f06df0bd8c
beos5-dos.txt
Posted May 19, 2000
Authored by Visi0n | Site aux-tech.org

AUX Technologies Security Advisory - Be/OS Remote Denial of Service. The Be/OS Operating System version 5.0 has a vulnerability in the tcp fragmentation which can lock up the system, requiring a cold reset. The bug can be reproduced using ISIC-0.05.

tags | exploit, remote, denial of service, tcp
SHA-256 | 5ebd3591f9625aeabd9c74fdf640c918466886138b9473eb70cb816cd9b82463
RFP2K05.txt
Posted May 19, 2000
Authored by rain forest puppy | Site wiretrip.net

NetProwler 3.0, a network based intrusion detection system, has a remote denial of service vulnerability. The software crashes when two fragmented IP packets are sent to an IP address that it is profiling. Netprowler must be profiling ftp in order for the exploit to work. Please note that Netprowler logs all incoming alerts to a Microsoft .mdb file. Please read RFP2K04.txt for more information.

tags | exploit, remote, denial of service
SHA-256 | 01dfbeff982172b700a96a3ad3afd0f8babfbb62d8508a80fe57958e3f4d2e87
l0phtl0phe-kid.c
Posted May 19, 2000
Authored by teso, scut | Site team-teso.net

l0phtl0phe-kid.c - Easy antisniff v1.02 exploit. l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks. This version has been made easy enough for script kiddies to use - to avoid that "doesn't work" lamer claim.

tags | exploit
SHA-256 | bd31032131862d82287cf734e1ae6420cdb563449a5eb13f9c348e7266dd300d
arpmitm-0.1.tar.gz
Posted May 18, 2000
Authored by teso, xdr | Site team-teso.net

Arpmitm.c is another tool for using arp man-in-the-middle attacks which keeps sending the packets. Requires Libnet 1.00.

SHA-256 | a19ed2757a2e4c0b49f24c7b64aee902e263d54e73f80c0eec793933f61e7856
l0phtl0phe.c
Posted May 18, 2000
Authored by teso, scut | Site team-teso.net

l0phtl0phe.c - antisniff exploit (1.02 included). l0pht messed up the fix for their problem in antisniff by not regarding the type signedness properties of the char and int values used, resulting in a cool of method bypassing the extra length + strncat checks.

tags | exploit
SHA-256 | 936d433c03025bd9a3d606c0f3d43a479b07e715b0201d0e5f316e3adcac8c05
winsd.051700.txt
Posted May 18, 2000
Authored by winsd | Site win2000mag.com

Windows Security Digest - May 17, 2000. In this issue: Backpedaling towards security, SECURITY RISKS: Emurl 2.0 exposes Users' Mailboxes, Office 2000 UA Control Scripting, NTMail 5.x Contains an Open Proxy, IIS Denial of Service and Code Exposure, IIS Denial of Service. SECURITY ROUNDUP: Feature:NTFS Access Control Security Enhancements, HowTo: Encrypting Files for Added Security. NEW AND IMPROVED: Message Attachment Scrubbing and Virus Protection, Increase Network Security in Small and Midsized Businesses. SECURITY TOOLKIT: Book Highlight- Cyberwars: Espionage on the Internet, Tip: Detecting Email Worms in Outlook.

tags | worm, denial of service, virus, magazine
systems | windows
SHA-256 | 0490e918e02438b399b4b0df5d700c3bd9189fbfb1337b1bcec380fd43dba94c
FreeBSD Security Advisory 2000.18
Posted May 18, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory SA-00:18 - The gnapster port (version 1.3.8 and earlier), and the knapster port (version 0.9 and earlier) contain a vulnerability which allows remote napster users to view any file on the local system which is accessible to the user running gnapster/knapster.

tags | remote, local
systems | freebsd
SHA-256 | f2d4875ee2a6597cc2a94c6118a4d88b60ed4746d0f0b055496f531d15e77b46
FreeBSD Security Advisory 2000.8
Posted May 18, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory SA-00:08 - lynx revised. Versions of the lynx software prior to version 2.8.3pre.5 were written in a very insecure style and contain numerous potential and several proven security vulnerabilities. A malicious server which is visited by a user with the lynx browser can exploit the browser security holes in order to execute arbitrary code as the local user. The Lynx development team conducted an audit of the source code, and have corrected the known vulnerabilities in lynx. As of lynx-2.8.3pre.5, we consider it safe enough to use again.

tags | arbitrary, local, vulnerability
systems | freebsd
SHA-256 | 2a92410e2c400253c2509ab21b18153feab913a2c915ded15e727eccdab16a13
gnomelib.sh
Posted May 18, 2000
Authored by Bladi, Almudena

SuSE 6.3 and 6.4 Glomelib local root exploit. All gnome apps have an exploitable buffer overflow when getting the DISPLAY environment variable.

tags | exploit, overflow, local, root
systems | linux, suse
SHA-256 | 9fe0131a24c1749a6647ad05e7ca960d784f79dbeb652d98418ed7fb5e7813b7
ADMDNews.zip
Posted May 18, 2000
Authored by ADM, Joey__

ADMDNews_v2 - WinNT/Win2K x86 exploit for NetWin (www.netwinsite.com) DNews server (v5.0f - v5.3e3) gupcgi.exe/dnewsweb.exe CGIs. This program exploits the buffer overflow condition in gupcgi.exe/dnewsweb.exe CGIs while processing the "cmd" parameter. Tested and confirmed under WinNT 4.0 SP5/SP6 & Win2K Beta 3 RC2 (build 2128).

tags | exploit, overflow, x86, cgi
systems | windows
SHA-256 | a06f88d7f2ddcc83936b33dc931f7f8e3122cf05e01ce50bac5e4b98045a4016
sniffit.c
Posted May 18, 2000
Authored by FuSyS | Site s0ftpj.org

Sniffit 0.3.7beta Linux/x86 Remote Exploit. Tested on RedHat 5.2, 6.0, 6.2.

tags | exploit, remote, x86
systems | linux, redhat
SHA-256 | 23c271cadbc52f8891f04dff58f2d091757e47858573b3d9b6ea26e75ffc4906
ms00-033
Posted May 18, 2000

Microsoft Security Bulletin (MS00-033) - Patch Available for "Frame Domain Verification", "Unauthorized Cookie Access", and "Malformed Component Attribute" Vulnerabilities in Internet Explorer 4 and 5. The "Frame Domain Verification" vulnerability allows a malicious web site operator to read files on the computer of a visiting user. The "Unauthorized Cookie Access" vulnerability allows a malicious web site operator to access "cookies" belonging to a visiting user. The "Malformed Component Attribute" vulnerability which allows a malicious web site operator to run arbitrary code on the computer of a visiting user. Microsoft FAQ on this issue available here.

tags | web, arbitrary, vulnerability
SHA-256 | 05b71ced167d1c779f3c854da8924dacc1bb5a17e4682cda75e9ddf2feab1b82
CA-2000-06.kerberos
Posted May 18, 2000

CERT Advisory CA-2000-06 - Multiple Buffer Overflows in MIT Kerberos Authenticated Services. Several buffer overflow vulnerabilities exist in the Kerberos authentication software version 4, including implementations included for backwards compatibility in Kerberos 5 implementations. The most severe vulnerability allows remote intruders to gain root privileges on systems running services using Kerberos authentication. If vulnerable services are enabled on the Key Distribution Center (KDC) system, the entire Kerberos domain may be compromised. All known Kerberos 4 implementations derived from MIT sources are believed to be vulnerable. krshd has a remote root vulnerability and v4rcp and ksu have local vulnerabilities. MIT Kerberos team advisory here.

tags | remote, overflow, local, root, vulnerability
SHA-256 | 34bf1975d8471e284aeeac511729987b56648498c8905a7bb14b4b07f08285f1
dsniff-2.0.tar.gz
Posted May 18, 2000
Authored by Dug Song | Site monkey.org

dsniff is a suite of utilities that are useful for penetration testing. It consists of the following programs: arpredirect intercepts packets from a target host on the LAN intended for another host on the LAN by forging ARP replies. findgw determines the local gateway of an unknown network via passive sniffing. macof floods the local network with random MAC addresses. tcpkill kills specified in-progress TCP connections. dsniff is a simple password sniffer which handles many protocols. mailsnarf outputs all messages sniffed from SMTP traffic in Berkeley mbox format. webspy sends URLs sniffed from a client to your local Netscape browser for display, updated in real-time.

Changes: Major dsniff rewrite! Add configurable decode triggers and debug traps to dsniff, rewrote dsniff RPC framework, added portmap, NFS, mountd, PostgreSQL, Meeting Maker, poppass, RIP, OSPF parsing dsniff decoders. Made dsniff savefile format portable, fixed RSET handling in mailsnarf.
tags | tool, local, sniffer, tcp, protocol
SHA-256 | 4411ee32799cac95096d37b654d30296e78e4da6da85a4406e3b21247fdcddda
netopia.advisory.r9100
Posted May 17, 2000
Authored by Steve Friedl

The Netopia R9100 permits a user not authorized with a special security password to neverthless modify the SNMP community strings, including enabling SNMP access that should be disabled.

tags | exploit
SHA-256 | 3168f68634d059aaa9ea3f13c15e52e139e10b5ab83eef2a37fba5ca881c8d62
lids-0.9.4-2.2.15.tar.gz
Posted May 17, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Additional checking is done when adding acls, fixes when the kernel is reading lids.conf, fixes for inherit and no_inherit flags, and fixes for lidsadm.
tags | kernel, root
systems | linux
SHA-256 | e1a309b1d4ba5f70b379ec1c9f7df7feac42c3e88f93cca4acce45e095801be6
preventing.worms
Posted May 17, 2000
Authored by Woody Thrower, Stan Burnett, Gary Wahlquist | Site www2.axent.com

Prevent Current and Future E-Mail Worms.

tags | worm
SHA-256 | b1751241071df22894da713215dce7423eeb70171bb6e5eafc67ab315fb54b15
Emurl2.0.windows
Posted May 17, 2000

Users can access the mailbox's content of anybody on the system. They can also steal their POP passwords since Emurl allows you to fetch your POP email from more than one source.

tags | exploit
SHA-256 | 35e647237c0a38d4a34398da868edd6414f0a0f6309e46a65ff713c97f3e4d78
Page 5 of 18
Back34567Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close