exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 221 RSS Feed

Files Date: 2000-08-01 to 2000-08-31

dupl.pl
Posted Aug 14, 2000
Authored by Zas | Site norz.org

dupl.pl v0.4 is a snort rules beautifier which removes duplicate rules from *-lib, vision.conf, and xxxx-rules files.

tags | tool, sniffer
SHA-256 | b76c7e112174613043dc1d689b3076f74a8e39ce5dc0a8e0ed2b5687496b215e
ICQ2000_UIN_IP.zip
Posted Aug 14, 2000
Authored by Jeff Capes

UIN tp IP Converter for ICQ 2000 - This program enables you to retrieve the IP# of any given ICQ Number (UIN) in your online list. (The ICQMAPI.DLL is included) Written in Visual Basic.

SHA-256 | 15afb0fe0cb8f0a5bd0a3ef032c756d22fb68b16b5c56b1065cfc6af41450b55
BKtspibdc.c
Posted Aug 14, 2000
Authored by Bikappa

BKtspibdc.c allows sniffing on switched networks by flooding the switch with TCP & IP & ARP requests containing spoofed MAC addresses.

tags | spoof, tcp
systems | unix
SHA-256 | 3d2385a867ce0b4d297d0ef596abb742173add20b7c3aad942ed6ac3f7b435b0
BKtrpibdc.c
Posted Aug 14, 2000
Authored by Bikappa

BKtrpibdc.c is a network tool for arp redirection which implements a man in the middle attack.

systems | unix
SHA-256 | 6708726e4c0433d5697874606ed537a26e80eecb7fb5d757762d609b588763fd
BKtclipabdc.c
Posted Aug 14, 2000
Authored by Bikappa

BKtclipabdc.c is a tool to change the mac address of your ethernet device. It doesn't change the hardware address, but just the stack implementation of it.

systems | unix
SHA-256 | f8bd82cad3394a8e8ffbbce3e28b60bcb00bff580ed81044a67a2b1a2e664187
Nmap Scanning Utility 2.54 BETA 3
Posted Aug 14, 2000
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: Added/adjusted a bunch of fingerprints, NmapFE fixes, and various small fixes/improvements.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 3cefe3bb966b2062072889ef31c89900491ab7fe7a07ae1a795d6ef84b74e1f0
wais.pl.advisory.txt
Posted Aug 14, 2000
Authored by synnergy, Scrippie | Site synnergy.net

The wais.pl CGI written by Tony Sanders provides means to access the waisq WAIS client via the webserver. Waisq contains buffer overflows allowing remote code execution which can be exploited via wais.pl. In addition, files owned by nobody on the webserver can be overwritten with arbitrary content. Includes exploit for Linux/x86.

tags | exploit, remote, overflow, arbitrary, x86, cgi, code execution
systems | linux
SHA-256 | 0a1486af2061c3b2f7952eb470c47fcbf6d3d36571a036f046ae5709356c58d1
sendmail.8.11.0.tar.gz
Posted Aug 14, 2000
Site sendmail.org

Sendmail is a Mail Transfer Agent, which is the program that moves mail from one machine to another.

Changes: Bug Fixes, minor security updates.
systems | unix
SHA-256 | bc497185b4c122db27c444e2c8a91693fe81459630c4718e6a27fa86386e78d7
zorp-0.5.10.tar.gz
Posted Aug 14, 2000
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to finetune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: Bug fixes, enhancments.
tags | tool, tcp, firewall, protocol
systems | unix
SHA-256 | 538dc3df32203b51e16efa7a67085359cc1bc106bdad261f111aaaca03b17035
wcGoph.c
Posted Aug 14, 2000
Authored by WC

Gopher+ v2.3.1p0 remote exploit - Spawns a remote shell on tcp port 36864 under the UID that the gopher+ daemon runs as. Tested against Linux Slackware 3.6 / 7.0.

tags | exploit, remote, shell, tcp
systems | linux, slackware
SHA-256 | 71aa58978ab9c730cefaa09803a9c98febeb91b69d9d601ac9a232b790ac1e41
suse.suidperl.txt
Posted Aug 13, 2000

SuSE Security Advisory - Suidperl is the perl interpreter for suid perl scripts, a part of the perl package. A maliciously implemented feature causes the interpreter to spawn the /bin/mail program, thereby passing on untrusted environment that causes /bin/mail to execute arbitrary commands as user root. SuSE security site here.

tags | arbitrary, root, perl
systems | linux, suse
SHA-256 | 014ed0af6fcd3148a794ea9fc8ef4e1118024f8702a2a3d00d41005ed9cc8956
suse.knfsd.txt
Posted Aug 13, 2000

SuSE Security Advisory - Due to incorrect string parsing in the code, a remote attacker could gain root priviledges on the machine running the vulnerable rpc.kstatd, which was distributed in the package linuxnfs or knfsd. SuSE security site here.

tags | remote, root
systems | linux, suse
SHA-256 | 4fc97e2211f496c84ae3546f1ae36d7e425e0a9e13e7d63bd4f8100763e8c53b
A0208102000.txt
Posted Aug 13, 2000
Authored by Mike Schiffman | Site guardent.com

Guardent Security Advisory - There is a vulnerability in the way the standard Unix gopherd 2.x (a.k.a. UMN gopherd) creates a gopher DES key for authentication. If properly exploited, this vulnerability allows a remote user to gain unauthorized root access to affected systems.

tags | remote, root
systems | unix
SHA-256 | 4ddb2889c185993771351800971338c2916b9b438d1abe4e842bb757b6fac085
ssexploit502x.pl
Posted Aug 13, 2000
Authored by nemo | Site deepzone.org

Statistics Server 5.02x for Windows contains a buffer overflow caused by a long GET request. Includes perl exploit which spawns a winshell with system privileges on port 8008 on Statistics Server 5.02x/Win2k.

tags | exploit, overflow, perl
systems | windows
SHA-256 | 4d5eb9ffd94b406e9662e8575bcca3692763124371afe9b77e28d789f947712f
rhsa.2000-052-02.zope
Posted Aug 13, 2000
Site redhat.com

Red Hat Security Advisory - Vulnerabilities exist with all Zope-2.0 releases - This HotFix corrects issues in the getRoles method of user objects contained in the default UserFolder implementation. Users with the ability to edit DTML could arrange to give themselves extra roles for the duration of a single request by mutating the roles list as a part of the request processing.

tags | vulnerability
systems | linux, redhat
SHA-256 | 3aae58fa2ce77f6e29e2937cd2bf1a04b0f4bc3336e8c2895523e8de5692adca
rhsa.2000-053-1.usermode
Posted Aug 13, 2000
Site redhat.com

Red Hat Security Advisory - The usermode package allows unprivileged users logged in at the system console to run the halt, poweroff, reboot, and shutdown commands without needing to know the superuser's password. While being able to halt, poweroff, and reboot is a desirable thing, an unprivileged user can also bring the system to single-user mode by running "shutdown now" with no additional flags.

systems | linux, redhat
SHA-256 | 74e1c146411d4e810234e042524b50565b60f9c341a78a1d67295a79e887a3ba
statdx.c
Posted Aug 12, 2000
Authored by Ron1n

Redhat Linux rpc.statd remote buffer overflow exploit. Tested against Redhat 6.0, 6.1, and 6.2.

tags | exploit, remote, overflow
systems | linux, redhat
SHA-256 | c1de1ba5c571d6f403a8f820e615faa4e5df066142935928a9f9d39804e2b53f
xgopher.c
Posted Aug 12, 2000
Authored by vade79, realhalo | Site realhalo.org

Gopher+ daemon v2.3 remote root buffer overflow exploit - Tested against Slackware Linux 3.6 and 7.0. Adds a line to /etc/passwd.

tags | exploit, remote, overflow, root
systems | linux, slackware
SHA-256 | 9c2f2d4a91a62e040ddd61ebd3561c42d0097168294f3951f1f9d91c91fab2e1
sara-3.1.7.tar.gz
Posted Aug 11, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Fixed false positive on latest ColdFusion, Expanded services database to reflect new definitions, Added test for Answerbook2 vulnerability, and Cleaned up configuration management routines.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 92e13c0cd01c13af6c6fe0b3089d3b96bfa48a113d785dfbf12c2dc13f29dca3
ldistfp-0.1.1.tar.gz
Posted Aug 11, 2000
Authored by scut | Site team-teso.net

Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.

systems | linux, unix, bsd
SHA-256 | a0e02ae45f7bafdea7bf1bf796fdf701738fa98fb3b7144c5532341e9495418b
CA-2000-16.ie
Posted Aug 11, 2000
Site cert.org

CERT Advisory CA-2000-16 - Internet Explorer can open Microsoft Access database or project files containing malicious code and execute the code without giving a user prior warning. Access files that are referenced by OBJECT tags in HTML documents can allow attackers to execute arbitrary commands using Visual Basic for Applications (VBA) or macros. A remote intruder can send malicious HTML via an email message, newsgroup posting, or downloaded Web page and may be able to execute arbitrary code on a victim machine.

tags | remote, web, arbitrary
SHA-256 | 2ac36051a9e4bac06affdc8d3ca68aa41aa7d1985662ba3cee9f9797a1a045b6
igmpsyn.c
Posted Aug 11, 2000
Authored by Steve Christ

igmpsyn.c sends type 1 IGMP requests with random source addresses. Appears effective against Win95 / 98.

tags | denial of service
systems | windows
SHA-256 | e586aa75def79fe1a2fe497ed40a6021a61562703e88d08b591f4aa935e9df9d
jinro.c
Posted Aug 11, 2000
Authored by Nijen Rode

Jinro.c will transmit TCP packets which generate replies containing a modem hangup sequence. This is an improved version of the old hangup bug which may circumvent firewalls / init string patch.

tags | denial of service, tcp
SHA-256 | a177990f433cf1832b454c2c6fec29700b7b6431125b5bee6189dfb3538da8d8
x1.cpp
Posted Aug 11, 2000
Authored by Dolphin

x1.cpp is a utility for extracting lists of hostnames from northernlight search engine. Uses wget - tested on Linux.

systems | linux, unix
SHA-256 | 050e801933c4356b808efa3fc09830292199ef555a08e5ad9a3052c6a9048fc7
spampl-0.20.tar.gz
Posted Aug 11, 2000
Authored by Daniel Stenberg | Site spam.sourceforge.net

spam.pl is a perl script which automates the process of sending complaint letters to spammers ISP's. It strips out the proper address from the spams mail headers, taken via stdin.

Changes: Bug fixes and enhancments.
tags | tool, perl
systems | unix
SHA-256 | a022c06c7ca2333a298d4c79b1d1c60e0f09de2419df0304950c047ad24a393e
Page 5 of 9
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close