exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-07-04 to 2000-07-05

labs48.txt
Posted Jul 4, 2000
Site ussrback.com

LocalWEB HTTP Server v. 1.20 remote dos attack - Sending a malformed URL to port 80 causes a buffer to be overflow resulting in a denial of service. Includes perl exploit.

tags | remote, web, denial of service, overflow, perl
SHA-256 | ae66ac0f9d4486258392b6e5e9de670cd146472dcf0dbc59417ba7cdc6d2c386
ethereal-0.8.10.tar.gz
Posted Jul 4, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: There is now support for decoding syslog, X11, and CLTP protocols. Ethereal can now read NetXRay 2.002 files and Linux ATM interfaces. The Win32 version now has the "Update list of packets in real time" feature.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 9ff7fcb05b8a07ee511ebc05a58ca5f30219fe52ddbcf08440e3171429e208c9
arping-0.6.tar.gz
Posted Jul 4, 2000
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: Starting icmp id=0, a new null source IP option, and warns when the alias interface is used.
tags | tool
systems | unix
SHA-256 | 20a8198a37d49a72e13aefedfa5fa5a26e5a1cdf9d49c1c66fb85fa880fcfb6b
vsl-7-1-2000.tgz
Posted Jul 4, 2000
Authored by Vetesgirl | Site self-evident.com

VetesCan Local is a shell script which checks local unix security, including checking for rootkits, log permissions, home/root directory accessability, inetd services, /etc/securetty, SUID/SGID files, World writable files, Unowned files, .rhosts, and cracks passwd/shadow.

tags | tool, shell, local, root, scanner
systems | unix
SHA-256 | b87698a55c3c26161c964db95c00a12d1ee3e098becb4a91e3438bbd9565a9b3
chkrootkit-0.15.tgz
Posted Jul 4, 2000
Authored by Nelson Murilo

chkrootkit V. 0.15 locally checks for signs of a rootkit. Includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux 2.0.x, 2.2.x and FreeBSD 2.2.x, 3.x and 4.0.

Changes: lrk5 detection, Sun/Solaris support, and Red Hat fixes.
tags | tool, integrity, rootkit
systems | linux, unix, freebsd
SHA-256 | 9e7692f3446815890da483169ccdc3ecf6042caa923cd3052ced18f3a23e3cde
chklastlog.c
Posted Jul 4, 2000

chklastlog.c v1.3 checks lastlog and wtmp for signs of tampering. It will detect most log wiping programs, such as z2 and zap.

Changes: Linux/FreeBSD port, new Red Hat compatibility.
systems | unix
SHA-256 | 5c70a4d3d2f9a170c0fb3ab5fec5a3ac1e7f46bf1c40d812bf7e23dea65d5910
chkwtmp.c
Posted Jul 4, 2000

Chkwtmp v1.1 checks /var/log/wtmp for signs of deletion, such as use of zap or z2 or similar log wiping programs. See also chklastlog.c

Changes: Linux/FreeBSD port by Nelson Murilo.
systems | unix
SHA-256 | ba47e452988bc30607f06ac77751c893e030993b529c900b16a3ba1333412053
winl_troj.zip
Posted Jul 4, 2000
Authored by Txgreg

Ginastub.dll v1.0 - A WinLogon password grabber which records every users password as they log in.

SHA-256 | 03d0a2bb3624c1ddc5346e5a71863061db2223f16de32adea0a2c10dec3b9706
lkpatch-0.2.9.tar.gz
Posted Jul 4, 2000
Authored by Theo Nolte | Site adsl-nolte1.rz.rwth-aachen.de

lkpatch is a Linux kernel patcher. It connects to the fastest mirror, checks for new versions of the Linux kernel, downloads them, and patches your kernel source. It determines the fastest mirror by keeping track of previous download times.

Changes: Added support for 2.4.0-test kernels.
tags | kernel
systems | linux
SHA-256 | 3e96d24df9fae16e241d70ec67d9a3857e4e33174e16ac269547a219708a6bf1
Getting Juno
Posted Jul 4, 2000
Authored by Djlizard

How to get the username and password for Juno.

tags | paper
SHA-256 | 931b70f501b1743f23d5148d2e962c364a3c4728582c4dc870f0ffd6e4c48c1f
bash.security.patch.tgz
Posted Jul 4, 2000
Authored by Odin | Site ojnk.sourceforge.net

Patch for Bash 2.02 and 2.03 which will log all user commands to /var/log/histories/(name), Disallow and log execution attempts when uid != euid, and sets a limit on the highest UID that can run the shell.

tags | shell, patch, bash
systems | unix
SHA-256 | a6b294895fa7688a2df91f6d204db1e74bb9c4584284bb32a4703d9d68a84cd9
iplog-2.2.0.tar.gz
Posted Jul 4, 2000
Authored by Odin | Site ojnk.sourceforge.net

iplog is a TCP/IP traffic logger capable of logging TCP, UDP and ICMP traffic. Features a DNS cache, the ability to detect port scans, null scans, and FIN scans, "smurf" attacks, bogus TCP flags used in OS detection, Xmas scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.

Changes: Much more portable, added support for a configuration file, better memory handling, bug fixes and documentation updates.
tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 8ae3c88c2f9ec0d6f417bf5889f728c4d3c94329a68a7c1c659f24c892eb0b28
imeshexp.zip
Posted Jul 4, 2000
Authored by Hitek | Site mxeleet.org

iMesh V1.02 Beta build 117 remote exploit for Windows 98. Exploits a buffer overflow to download a file from a given URL and execute it on the remote host. Includes windows binary and C source.

tags | exploit, remote, overflow
systems | windows
SHA-256 | fdac6101b44177dac984a8a1c7f42db4cc6a06d01a432a007d4b060595a4cc66
Newbie Help For July, 2000
Posted Jul 4, 2000
Authored by Steven Gurtler

This is a reference guide for the new hacker who needs to know the best websites for hacking, cracking, warez, and mp3's. July, 2000.

tags | paper
SHA-256 | aeb759c84d4999132670eea4f3844f370bc6af1b8b0a1785aa6d3ae44d6964e7
debian.canna.txt
Posted Jul 4, 2000
Site debian.org

Debian Security Advisory - The canna package as distributed in Debian GNU/Linux 2.1 can be remotely exploited to gain access. This could be done by overflowing a buffer by sending a SR_INIT command with a very long usernamd or groupname.

tags | overflow
systems | linux, debian
SHA-256 | be478a463b446020b571954efb53fbf74e2093f37d872dee19a68560f2f3dee7
getenv.pl
Posted Jul 4, 2000
Authored by vade79, realhalo | Site realhalo.org

Getenv.pl allows you to find buffer overflows in a unix binary by finding getenv() calls.

tags | tool, overflow
systems | unix
SHA-256 | 57f50d3ff335c0dfd414ed424f6a20d8849ef9b8d0e14b9e739b7a6b33927a50
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close