exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-07-31 to 2000-07-31

pixlog-1.0.tgz
Posted Jul 31, 2000
Authored by Matt Post | Site cs.calvin.edu

pixlog is a utility for compiling useful reports from the syslog messages of a Cisco PIX firewall. As tens of megabytes of data can be generated by a PIX firewall per minute, pixlog cooperates with syslogd to parse the data as it comes in, generating nice looking HTML reports. Screenshot available here.

systems | cisco
SHA-256 | 510acc5a8e898f3fb0a016c28fa59aa3b71d4864e00d1590b310bec215b46cb8
overflow.txt
Posted Jul 31, 2000
Authored by venomous | Site rdcrew.com.ar

overflow.txt is a paper written in Spanish which explains buffer overflows and includes sample code.

tags | paper, overflow
SHA-256 | 9f17d1e1309b6e4f54da9b694512de4fd015917ebdd3d4700e11a02c2f009890
signatures.tgz
Posted Jul 31, 2000
Authored by Nelson Brito | Site stderr.sekure.org

Signatures.pl is a tool to check fingerprint signatures. Tested on Linux, all comments are in Portugese.

systems | linux, unix
SHA-256 | 853e57deb8cc4ec4067d2875ab05a7fcfe9615041b0d8641fc515bce387f6cd9
SFPagerV3.0.tgz
Posted Jul 31, 2000
Site securityfocus.com

The Security Focus pager v3.0 helps system administrators track content of interest to them from www.securityfocus.com, notifying the administrator when new content arrives. It provides short descriptive summaries allowing the administrator to stay updated on relevant issues in the security world including Bugtraq, vulnerabilities, news articles, software releases, and other important information. This is the linux source / binary distribution - windows binaries are available.

tags | vulnerability
systems | linux, windows, unix
SHA-256 | a6a7296b769c4ee8c8b562f7ba613a3810b3485774011fffdc0346cc6148ae62
ncsa1-3.c
Posted Jul 31, 2000
Authored by r00tabega, Xtremist | Site r00tabega.com

NCSA Httpd v1.3 remote root exploit. Tested against Slackware 4.0.

tags | exploit, remote, root
systems | linux, slackware
SHA-256 | fd048c6976c8652d858e282e552db1b774bbf2a33f9c4f5d8cbdad0d39ab5194
rivat.tgz
Posted Jul 31, 2000
Authored by r00tabega, Xtremist | Site r00tabega.com

Rivat is a distributed CGI scanner written in perl which scans for over 405 vulnerabilities.

tags | cgi, perl, vulnerability
SHA-256 | 9e90411a076c4578051a6a030e0ddf9912c74a3586dd318b2d2f7e86d6cbe206
sourcescan.pl
Posted Jul 31, 2000
Authored by r00tabega, Xtremist | Site r00tabega.com

Sourcescan.pl looks through C source code for common vulnerabilities, including strcpy, gets, strcat, sprintf, fscanf, scanf, vsprintf, realpath, getopt, getpass, streadd, strecpy, strtrns, getenv, and setenv.

tags | vulnerability
SHA-256 | 08e9707e93b71327f7308ac80c26eb28bcc78a62b4c77d056f8e210bed720e03
stealthcode.txt
Posted Jul 31, 2000
Authored by r00tabega, Xtremist | Site r00tabega.com

Many IDS systems detect buffer overflow exploitation by looking for a series of NOP's (hex 90) which are typically used to pad the buffer so the offset does not have to be exact. Instead of using NOP's, a stealthy exploit could jump to the next instruction (jmp 0x00) or jump a small number of instructions.

tags | overflow
SHA-256 | 5a83aa8429b3c9c4766634a3e4e0e6c3a972a542233b82a48fde3c8475fd483b
bajie.webserver.txt
Posted Jul 31, 2000
Authored by Wizdumb | Site mdma.za.net

Bajie is a freeware HTTP daemon written in Java has vulnerabilities which allow remote users to view any file on the system, and find out the real server path.

tags | exploit, java, remote, web, vulnerability
SHA-256 | bb0152854b73ba34c57a2533b63ba1faaf12153332b4f4aad09a36c44a8d4d19
rhsa.2000-046-02.netscape
Posted Jul 31, 2000
Site redhat.com

ReD Hat Security Advisory 46-02 - New netscape packages are available that fix a buffer overflow due to improper input verification in netscape's JPEG processing code which can result in remote compromise. It is recommended that users of netscape update to the fixed packages.

tags | remote, overflow
systems | linux, redhat
SHA-256 | 9154a8b3261c8bd167de85415172f1dd9801dbce0f66004ba3dd5ed6d8ba3ead
arping-0.7.tar.gz
Posted Jul 31, 2000
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: The ability to ping the broadcast MAC address, and a fix for an off-by-one error when counting pings.
tags | tool
systems | unix
SHA-256 | 9605f534628e2fe89ac1046bf6787b8c3728f2825f1204dd889afa780ef45374
iptraf-2.2.2.tar.gz
Posted Jul 31, 2000
Authored by Gerard Paul Java | Site cebu.mozcom.com

IPTraf is a console-based network statistics utility for Linux. It gathers a variety of figures such as TCP connection packet and byte counts, interface statistics and activity indicators, TCP/UDP traffic breakdowns, and LAN station packet and byte counts.

Changes: Fixes for some segmentation fault bugs, and fixes for DVB interfaces.
tags | tool, udp, sniffer, tcp
systems | linux
SHA-256 | 7c33cb1588b0c0496f31fdf7d1d1eb113fb9d029aa526d1cf1148f28b93a4ffc
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close