what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files Date: 2000-07-29 to 2000-07-30

StJude_LKM-0.02.tar.gz
Posted Jul 29, 2000
Authored by Tim Lawless

Saint Jude LKM is a Linux Kernel Module for the 2.2.0 series of kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occuring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.

Changes: Fixed bug which would prevent the setreuid syscal from being restored upon exit.
tags | remote, kernel, local, root
systems | linux
SHA-256 | e6bee285fc2507dd3ee0f6b64ca1459171be968066027209d9f561350491b65d
jolt2mod.c
Posted Jul 29, 2000
Authored by Stealth_C

Jolt2mod sends a jolt2 attack without lagging the sending network connection nearly as much due to a rate limiting feature.

tags | denial of service
SHA-256 | 00e40bf51693c53612501d52fb8772bbcf1c18c7f3142b3d7afd8882d0055703
00Sub7_20.zip
Posted Jul 29, 2000
Authored by Jeff Capes | Site rendo.dekooi.nl

00[Sub]7 - The Ultimate SubSeven Logging Tool. Sets up a fake sub7 server on the default port which can send all sorts of false information to the client. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | 35bde1a83c22565aae447df36be760c1aa33e162f512ec9568a77aca6d272497
atalaya-1.2.tar.gz
Posted Jul 29, 2000
Authored by Riseman | Site sod-interactive.turincon.com

Atalaya notifies an administrator of incoming connections using /etc/hosts.allow. Includes support for Festival for speech.

tags | system logging
systems | unix
SHA-256 | a896f0cedfcc58aaee0c6576c86859f242b0cdc49caac82cba0eaafe59c600c4
ms00-052
Posted Jul 29, 2000

Microsoft Security Bulletin (MS00-052) - Microsoft has released a patch for the "Relative Shell Path" vulnerability in Microsoft Windows NT 4.0 and Windows 2000. The vulnerability enables a malicious user to cause code of his choice to run when another user subsequently logged onto the same machine. Microsoft FAQ on this issue available here.

tags | shell
systems | windows
SHA-256 | 19505d9720f984106694cee0f43b13f70d2dcda0513aa6d4a59fad74f80eee1b
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close