what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-06-16 to 2000-06-17

Sendmail Tutorial
Posted Jun 16, 2000

Sendmail Tutorial (version 2.4) - find out why Sendmail is called 'the buggiest daemon on earth'. Tons of ways to crack into big computers as well as PCs unleashed, including, of course, information on how to block these holes.

tags | paper
SHA-256 | 61d435cba5f7a1cc881d01bf9c93a9d62fef9cf6c8b8131d6a1b7dbf8b5a8a11
labs47.txt
Posted Jun 16, 2000
Site ussrback.com

USSR Advisory #47 - Remote dos attack in the Small HTTP Server ver. 1.212. Sending a malformed URL to port 80 will cause the proccess containg the services to stop responding.

tags | remote, web
SHA-256 | 86a55c2c873fe77149e6c2e21526691e7d5454b7fa64b69715c91a5e13aad66f
labs46.txt
Posted Jun 16, 2000
Site ussrback.com

USSR Advisory #46 - Remote dos attacks in the Dragon Server v1.00 and v2.00. Long FTP usernames cause the service to crash.

tags | remote
SHA-256 | 761380a3626c3a294a00311b17cecc743df14fa38155757666882760a5209070
sftp-0.9.5.tar.gz
Posted Jun 16, 2000
Authored by Brian Wellington | Site xbill.org

Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process.

Changes: Supports rmdir, mkdir, rename commands, better status output, bug fixes.
tags | remote, shell, root, encryption, protocol
SHA-256 | 898827b1a3372fb60720b04a5f21989e3f0a60ade56b701f27e71e983b5876c9
crypto-gram-0006.txt
Posted Jun 16, 2000
Authored by Bruce Schneier, crypto-gram | Site counterpane.com

CRYPTO-GRAM June 15, 2000. In this issue: News, SOAP (Simple Object Access Protocol), Java and Viruses, crypto-gram reprints, The Doghouse: Infraworks, The Data Encryption Standard (DES), and Comments from Readers.

tags | java, cryptography, protocol, magazine
SHA-256 | 73a3d2a43340b4bdb58234178ca1eb892824e2b2e7c2d20501c377a9969e00f1
inndx.c
Posted Jun 16, 2000
Authored by Wojciech Purczynski | Site elzabsoft.pl

inndx: innd remote 'news' user/group exploit. Tested on innd-2.2.2-3 default installation on RedHat 6.2.

tags | exploit, remote
systems | linux, redhat
SHA-256 | 40a254fd6187f80b20f5181e8ee23d738cce908dc6782c0452d8dc9564f32a3f
access.vba.txt
Posted Jun 16, 2000
Authored by Johnny | Site johnny.ihackstuff.com

Microsoft Access Databases are not afforded "Macro execution protection" in the manner of Word/Excel/Powerpoint documents. Attackers can insert trojan VBA code into MS Access documents to execute arbitrary commands on the remote machine.

tags | exploit, remote, arbitrary, trojan
SHA-256 | ee125bfb149060be352ecd18f260d1726c1e1597e5a2002b8d947d29c66cb513
ms00-035
Posted Jun 16, 2000

Microsoft Security Bulletin (MS00-035) - Patch Available for "SQL Server 7.0 Service Pack Password" vulnerability. Microsoft has released a patch for a security vulnerability in Microsoft SQL Server 7.0 Service Packs 1 and 2 installation routine. With some configurations, the routines record the administrator password in plain text to a log file, where by default it can be read by anyone who can read files on the server. Microsoft FAQ on this issue available here

SHA-256 | feb39363e4c4679149374ad9863858d555f192a8400d62b6ce7e2f4b909afa2c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close