what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-06-27 to 2000-06-28

Posted Jun 27, 2000
Authored by Tom Pycke | Site linuxave.net

Recover is a tool to help undelete files in linux by automating some steps as described in the ext2-undeletion howto. It indexes all the deleted inodes with debugfs, then asks a series of questions about the deleted file. All deleted files which match your criteria are dumped to a directory.

tags | tool
systems | linux, unix
SHA-256 | e2fc9192f8fea4444fe4164dbd1554ce284504f8217b06fdb7d2839e400a645a
Posted Jun 27, 2000
Authored by Todd T. Fries

The ISC dhcp client contains a remote root hole. If the DHCP server gives out addresses containing backticks, shell commands can be run on the clients.

tags | exploit, remote, shell, root
SHA-256 | eef34ca1565e47d927a25f800efe9a7431b1dbae5b0b5733ac6817b7b74dc94f
Posted Jun 27, 2000
Authored by Wizdumb | Site mdma.za.net

Java source to remotely crash LeafChat clients.

tags | exploit, java
SHA-256 | 111817cbf650dae4d8d9a1dcd33e4c66c71ecc474ea139cbb49939ee45e73755
Posted Jun 27, 2000
Authored by Raymond Dijkxhoorn

Glftpd 1.18 through 1.21b8 has a serious problem with the privpath directives. Users with accounts can access directories on the site which they should not have access to.

tags | exploit
SHA-256 | 447c8a95b7dd4d4d1f722081716ea2532f24a35d179abdb468144e471fc765c9
Posted Jun 27, 2000
Authored by Vigilante | Site vigilante.com

Netscape Enterprise Server for Netware 5.0 and Netware 5.1 contain remote vulnerbailities. By issuing a malformed URL it is possible to cause a denial of service situation and/or execute arbitrary code on the server with the privileges of the web server.

tags | exploit, remote, web, denial of service, arbitrary
SHA-256 | 87b98315b06d4cb218a9eb746cb54ba814c7a256db807a3dd35fbfaddd3befa1
Posted Jun 27, 2000
Authored by Ryan Rhea | Site northernlights.bizland.com

Nutcracker is a simple, fast, and effective password cracker for UNIX and Linux systems. It is faster than the other crackers available. Disabled accounts and accounts with no password are detected. Results are shown in a nicely-formatted table. A sample password file and dictionary file are included, although you can use any word list you wish (including the file '/usr/dict/words' included with most Linux distributions). Nutcracker will work with '/etc/passwd' or '/etc/shadow' files.

Changes: Uses the Perl Module Screen.pm for improved display, including the ability to view a status line showing the current activity. Several new command line options and runtime commands have been added.
tags | cracker
systems | linux, unix
SHA-256 | e7b8f62387296013de85198f7f51e2bf5494178987fd0ba798a78b2b1225e13f
Posted Jun 27, 2000
Site suse.de

SuSE Security Advisory - Linux Kernel 2.2.x allows local root up to linux-2.2.16.

tags | kernel, local, root
systems | linux, suse
SHA-256 | c0076bac48adc2c9e2c3573d080067b19b42213b21a688c388da664bd56f11b2
Posted Jun 27, 2000
Site suse.de

SuSE Security Advisory - The wu-ftp FTP server does not do proper bounds checking while processing the SITE EXEC command, allowing a remote attacker to execute arbitrary machine code as root on a FTP server using wu-ftpd. SuSE recommends using the audited 2.4er version of wu-ftpd.

tags | remote, arbitrary, root
systems | linux, suse
SHA-256 | f75a345da50da0a1aeeb54882a3fe6fce1b92f2b6cf41bf6bbc6704dd7b20178
Posted Jun 27, 2000
Authored by vade79, realhalo | Site realhalo.org

xfwm buffer overflow exploit for Linux / x86. This will give you a euid=0 shell if /usr/X11R6/bin/xfwm is SUID(=4755), which isn't anywhere by default.

tags | exploit, overflow, shell, x86
systems | linux
SHA-256 | 43eac56faef522e18d373dc452cee020f39fd7369f6f0bda40e910c89734352f
Posted Jun 27, 2000
Authored by vade79, realhalo | Site realhalo.org

xwhois buffer overflow, for Linux x86. This will give you a euid=0 shell if /usr/X11R6/bin/xwhois is SUID(=4755), which isn't anywhere by default.

tags | exploit, overflow, shell, x86
systems | linux
SHA-256 | cd3e6d87b5d6caa673ead4be3dac43675e7efaff01e57544d0ab5add0bd7a2fc
Posted Jun 27, 2000
Authored by Tyler Lu | Site web.refute.org

Qrack is a simple, fast, and quick unix password cracker. It brute forces ciphertext generated by the crypt() function. It can report disabled accounts as well as accounts with no passwords, a 2400 word dictionary file is included. Ideal for system administrators to look for weak passwords. Written in Perl, and tested on FreeBSD and Linux but should work on any Unix variety with Perl installed.

tags | cracker, perl
systems | linux, unix, freebsd
SHA-256 | 71db8c2bdc8b704a167349136c571d20bc502560957c657a6c0a0dcb3434d43e
Posted Jun 27, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 19 - 26.06.2000 - Covers weekly roundups of security related events. In this issue: Writing buffer overflow exploits for the PowerPC, JRun 2.3.x sample code vulnerabilities, BlackICE vulnerable to BO, Net Tools PKI Server exploits, Panda Antivirus allows remote access, and more.

tags | remote, overflow, vulnerability
SHA-256 | e7e5335419f90eb9fea557c2aadfbaa2c9d0465df424890c66d70d1a25edcab9
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By