exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-07-07 to 2000-07-08

ms00-048
Posted Jul 7, 2000

Microsoft Security Bulletin (MS00-048) - Microsoft has released a patch for a security vulnerability in Microsoft SQL Server 7.0. The vulnerability allows a malicious user who can authenticate with the SQL server to run a database stored procedure without proper permissions. Microsoft FAQ on this issue avalable here.

SHA-256 | 54ea46851968ec5669928b3dee1521a7b09d1bd84028696c575a139329dddeba
CA-2000-13.ftpd
Posted Jul 7, 2000
Site cert.org

CERT Advisory CA-2000-13 Two Input Validation vulnerabilities in FTPD. Wu-Ftpd 2.6.0 has a site exec vulnerability, and BSD ftpd vulnerability involving a missing character-formatting argument in setproctitle(). Both of these can be exploited by remote attackers to gain root access.

tags | remote, root, vulnerability
systems | bsd
SHA-256 | 956c76b0ce1114a6f1dd3c590afcf13fe4e6aff06b58ee96381ec0a95566b529
iplog-2.2.1.tar.gz
Posted Jul 7, 2000
Authored by Odin | Site ojnk.sourceforge.net

iplog is a TCP/IP traffic logger capable of logging TCP, UDP and ICMP traffic. Features a DNS cache, the ability to detect port scans, null scans, and FIN scans, "smurf" attacks, bogus TCP flags used in OS detection, Xmas scans, ICMP ping floods, UDP scans, and IP fragment attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris.

Changes: Fixed ident lookups and Fixed a bug that caused only one thread to change user or group when -u or -g was specified while the rest continued to run as root.
tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 3821967691495a98f5225dc6886657a49eedb7e6a1d8cc12a817f6fd8793ec0b
pid_fuck.c
Posted Jul 7, 2000
Authored by Wouter ter Maat

Local linux dos - fork() bomb.

tags | denial of service, local
systems | linux
SHA-256 | 0150114c259b6f8388ff58ff1ed1bf9e8d1d382a3e050a5864232da60723117d
SX-20000620-3
Posted Jul 7, 2000
Site securexpert.com

SecureXpert Labs Advisory [SX-20000620-3] - Partial Denial of Service in Check Point Firewall-1 on Windows NT. The SMTP Security Server component of Check Point Firewall-1 4.0 and 4.1 is vulnerable to a simple network-based attack which raises the firewall load to 100%.

tags | exploit, denial of service
systems | windows
SHA-256 | 61c0ad7d028e554c35d5167f8ebd20c832a6adbd1bb7c02554be5c77505b3562
SX-20000620-2
Posted Jul 7, 2000
Site securexpert.com

SecureXpert Labs Advisory [SX-20000620-2] - Multiple services on Windows 2000 Server are vulnerable to a simple attack which allows remote network users to drive the CPU utilization to 100% in an extremely short period of time, at little cost to the attacker's machine.

tags | exploit, remote
systems | windows
SHA-256 | 191c6adfd847ea402235201869f564559ee66cfe136a02c7e35f348121711f8d
SX-20000620-1
Posted Jul 7, 2000
Site securexpert.com

SecureXpert Labs Advisory [SX-20000620-1] - Denial of Service vulnerability in Microsoft Windows 2000 Telnet Server. A remote user can cause the telnet server to stop responding to requests by sending a stream of binary zeros to the telnet server. This can easily be reproduced from a Linux system using netcat with an input of /dev/zero, with a command such as "nc target.host 23 < /dev/zero".

tags | exploit, remote, denial of service
systems | linux, windows
SHA-256 | 75c77bf0657fae44cbe5c5587fc4118b7d0679ae59041f32fa493cfc21d0f95d
BIOS320.EXE
Posted Jul 7, 2000
Site 11a.nu

!Bios can decrypt the passwords used in some most common BIOS (including various bioses/versions by IBM, American Megatrends Inc, Award and Phoenix). !Bios can also save and restore the IBM standard CMOS/NVRAM memory where almost all common Bioses store the BIOS setup settings. !Bios can save the part of the RAM dedicated for the BIOS (which has security implications in some BIOSes as encryption algorithms and/or password may actually reside here in some badly coded BIOSes). !Bios can do crude, brutal attacks ("blasters") which removes password from a lot of Bioses. A bit dangerous though, can give unexpected and unwanted results. !Bios has a CMOS editor where you through a interface with similarities to several hex-editors can modify the CMOS/NVRAM memory in binary, decimal and hexadecimal ways. (only adviced for very experienced hackers) !Bios has a command line interface (CLI) and a very simple VGA-text interface, GUI. If no parameters is passed to !Bios, it starts the easy-to-use GUI, otherwise it starts the GUI. !Bios has built-in support pages which provides several tricks and tips, notes about known backdoors etc.

tags | cracker
SHA-256 | e6b3250b00edef016e7be33215b43b63879d3d2dad4f62f8f21afda6b7424770
Network Device / Switch Default Passwords
Posted Jul 7, 2000
Authored by Roelof Temmingh | Site sensepost.com

Default Passwords for many network switches and devices. Includes many 3com products, ACC, AcceleratedDSL, ADC, Alteon, Arrowpoint, AT

tags | paper
SHA-256 | 39b068457d87fe9ccdf5c7fa081a0000390236b200f7392040d582c8c91acd72
hping2-beta54.tar.gz
Posted Jul 7, 2000
Authored by Antirez | Site kyuzz.org

hping2 is a network tool which sends custom ICMP/UDP/TCP packets and displays target replies like ping does with ICMP replies. hping2 can handle fragmentation, arbitrary packet body and size and can be used in order to transfer files under any supported protocol. hping2 is useful for testing firewall rules, spoofed port scanning, testing network performance under different protocols, packet sizes, TOS, and fragmentation, path MTU discovery, file transfer even with really facist firewall rules, traceroute with different protocols, firewalk like usage, remote OS fingerprinting, TCP/IP stack auditing, and much more.

Changes: Raw IP mode, lots of bug fixes, added NetBSD support, added settable checksum, tcp sequence and ack are settable, bad checksum option, out of sequence packet counter, and documentation updates.
tags | tool, remote, arbitrary, udp, scanner, spoof, tcp, protocol
systems | unix
SHA-256 | b13bb23791aeed1de0424b28be4fef0947ceac2fd123cc3d4feaec3411a355e4
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close