exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 280 RSS Feed

Files Date: 2000-09-01 to 2000-09-30

NDiff-0.03.tar.gz
Posted Sep 28, 2000
Authored by James Levine | Site vinecorp.com

NDiff compares two nmap scans and outputs the differences. It allows monitoring of your network(s) for interesting changes in port states and visible hosts. NDiff should be useful to network administrators, security analysts, and other interested parties who need to monitor large networks in an organized fashion.

Changes: Performance improvements to the ndiff program. Tweaks/workarounds to silence pod2man complaints when installing. These changes have not been heavily tested. You are hereby warned.
tags | tool, nmap
systems | unix
SHA-256 | 9972d8b39599589019567236844c30ea8201f40105147f24b065d8b0658dd263
tcpip_lib2.zip
Posted Sep 27, 2000
Authored by Barak Weichselbaum | Site komodia.com

Tcpip_lib V2 is a library for Windows 2000 which allows arbitrary packet creation. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.

Changes: now works also with NT (regular async sockets), supports regular sockets (async and blocked) and added ICMP. (samples like traceroute, ping, TCP server, simple attacker).
tags | arbitrary, spoof, protocol
systems | windows
SHA-256 | 50cb614842e4fcbd9f5a423290c0e712b640e2ac42a72ba7595215b13f28c4ed
Internet Security Systems Security Alert September 27th, 2000
Posted Sep 27, 2000
Site xforce.iss.net

On July 26th, Thomas Lopatic, John McDonald, and Dug Song released vulnerability information at the Black Hat 2000 briefings that exposed the following security holes in Check Point FireWall-1:

tags | vulnerability
SHA-256 | eeedaa029a78ab96887ffba13275188e14b08454b5f8db03caf6f28381fdf2b1
ENG-IISfilter.zip
Posted Sep 27, 2000
Authored by Dimitri

Batchfile for Windows NT with Internet Information Server. This script automates jobs. If there is an attack on your server, starting this script manually enables you to see if something has happened.

systems | windows
SHA-256 | f4e162bc9abb6263212ba4527e010ded527477b033e511a6fd7cd498ee5064cf
Sqlpoke.zip
Posted Sep 27, 2000
Authored by Xaphan

Sqlpoke is a NT based tool that locates MSSQL servers and tries to connect with the default sa account. A list of SQL commands is executed if the connection is successful. Win32 source included.

systems | windows
SHA-256 | 0e32d5348e71edf6b856f7663bf1789acfc15a29486062760aba27989754798c
labs53.txt
Posted Sep 27, 2000
Site ussrback.com

USSR Advisory #53 - Malformed Embedded Windows Media Player 7 "OCX Attachment" Vulnerability. The USSR Team has found a problem in the Windows Media Player 7 ActiveX control, which could be used in a denial of service attack against RTF-enabled e-mail clients such as Outlook 2000 and Outlook Express.

tags | denial of service, activex
systems | windows
SHA-256 | 6887a0efab15dca3948af2af037e0e47e29102b12b701b773f27ea873ae55235
ms00-068
Posted Sep 27, 2000
Site microsoft.com

Microsoft Security Bulletin (MS00-068) - Patch Available for "OCX Attachment" Vulnerability. Microsoft has released a patch for a security vulnerability in Microsoft Windows Media Player (WMP) 7 but primarily affects e-mail applications. This vulnerability would enable a malicious user to create an e-mail that, when closed after being read, would cause the e-mail application to fail. A FAQ regarding this vulnerability is available here.

systems | windows
SHA-256 | 2267d9828b2c026ecdf9f241a379d1a2a8f799b2fd1043179eb35d86fbac4d1d
brwgate-dos.c
Posted Sep 27, 2000
Authored by Incubus | Site securax.org

Denial of service for NetcPlus BrowseGate 2.80 for Windows NT and 2000 when you sned more than 8000 characters in a GET / http-request, causing the system to crash.

tags | exploit, web, denial of service
systems | windows
SHA-256 | d3ef954f1000d0d320d818df9bf2c1cb98834ce4871086275220da6bfdf2fb14
pine421.txt
Posted Sep 27, 2000
Authored by Arkane

Proof of Concept. There exists a vulnerability in Pine 4.21 involving the portion of code in charge of peroidically checking email when a pine client is open.

tags | exploit, proof of concept
SHA-256 | 4c381d3dd367cf74ed25122f66d5999b745e2e0d8ac761b2a7d1dd33c1d5f17c
alabanza.txt
Posted Sep 27, 2000
Authored by Weihan Leow

This hole is for the control panel of all Alabanza based resellers/hosts. There could be more bugs. This is serious enough since you can delete all resold domains for a particulr webhosting company. You can also change the default MX and CNAME records of all associated domains.

tags | exploit
SHA-256 | 53801f2b11521cbfb88f3a244efe6da453e8cf7c77bc1c4480c79b3231bb1fc6
PSBUX0009-121.txt
Posted Sep 27, 2000

A problem lies in that there is a Java SNMP MIB Browser Object ID parsing problem which can cause a Denial of Service. Platforms affected are: HP9000 Series 700/800 running HP-UX releases 10.XX and 11.XX, Sun Microsystems SOLARIS releases 2.X, plus under Microsoft Windows NT4.X/ Windows 2000 running NNM 6.1, NNM 5.01, and NNM 4.11.

tags | java, denial of service
systems | windows, solaris, hpux
SHA-256 | f03861bd000202508283bfa2dda6e995d3c9b8dc31e44a7a007686ff9f282852
klogd.exploit.txt
Posted Sep 27, 2000
Authored by Esa Etelavuori | Site iki.fi

Klogd Local Exploit. Envcheck is a Linux/x86 kernel module which strips dangerous environment variables before executing a new program, and which can be used to log these probably threatening events. However, a recent format string handling bug in klogd allows an attacker to overflow its buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary, x86, kernel, local
systems | linux
SHA-256 | 00657f3b775f48ad572550dfdff266b0e9640533df27a3bbd59dfc91f83192eb
CSSA-2000-033.0.txt
Posted Sep 27, 2000

Caldera Advisory - There is a format bug in the LPRng printer daemon that could possibly be exploited to obtain root privilege. This problem is particulary severe because it can be exercised remotely.

tags | root
SHA-256 | ce5a6fb6fa064fe5353a6cbce23cc3f20fc3c1a670d00d8478d93f4ce3f4b9ec
snorticus-1.0.tar.gz
Posted Sep 27, 2000
Authored by Paul Ritchey | Site snorticus.baysoft.net

Snorticus is a collection of shell scripts designed to allow easy managment of Snort sensors. It allows you to routinely collect Snort sensor data, analyze the data via SnortSnarf, and easily maintain rule files.

tags | tool, shell, sniffer
SHA-256 | f8d621dd59448d2e46229ef059992ce0cfe7c5db402e9a1ab1da4508c3cef260
smurftools.tar.gz
Posted Sep 27, 2000
Authored by satya

A simple ICMP Source Address spoofing utility. A smurfing utility that also comes with log parsers, etc.

tags | denial of service, spoof
SHA-256 | b4cd3707d8384f81947841c466f336ddc9c621a62110e789eee6623266d1b408
motion-2.1.tar.gz
Posted Sep 26, 2000
Authored by Jeroen Vreeken | Site motion.technolust.cx

motion uses a video4linux device as a motion detector. It will make snapshots of the movement it sees, making it usable as an observation or security system. It can send out email, SMS messages, or invoke an external command when detecting motion.

Changes: Added night_compenstate for dark pictures, Added realmotion option, changed default configuration.
systems | linux
SHA-256 | 5761b4027e68c677bfe479a1acd8f22d1969f4e02bf412e6b2e9262ed9caf2dd
mailscan-0.1.tar.gz
Posted Sep 26, 2000
Site andykruger.com

MailScan is an email scanner that plugs into Sendmail which passes all messages into MailScan for scanning/filtering/optional-virus-scanning before being delivered or quarantined.

tags | virus
systems | unix
SHA-256 | add036fef0973e4e77e2fc11c74d42252a733d4b7366b8c77fd4eb9e1419f564
nc_twofish.tgz
Posted Sep 25, 2000

Netcat with encryption for Linux and Windows - This is the classic network utility Netcat, with Twofish encryption. Includes Windows and Linux source and binary. To make it secure you need to change the hardcoded key.

tags | tool
systems | linux, windows, unix
SHA-256 | cf11fce4287f940060b85a4699609e2f2417a7624c704d34506a3b3f1255f35e
openssl-0.9.6.tar.gz
Posted Sep 25, 2000
Authored by The OpenSSL Team | Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: This stable release includes bugfixes and extra documentation in addition to new sign and verify options to 'dgst' application, support for DER and PEM encoded messages in 'smime' application, and new 'rsautl' application (low level RSA utility.)
tags | encryption, protocol
SHA-256 | 5215b670c2674df9a642565ea68a67e6d955d8efcca1aa1b4e6a5b4fd2744ee8
floppyfw-1.0.6.img
Posted Sep 25, 2000
Authored by Thomas Lundquist | Site zelow.no

floppyfw is a router and simple packet filtering firewall on one single floppy. It uses Linux ipchains firewall capabilities and includes a simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It is simple to install, you only need to edit one file on the floppy.

Changes: This release includes kernel 2.2.17, security updated glibc, syslogd, and klogd.
tags | tool, firewall
systems | linux
SHA-256 | c4ee0cc409ce5159047ffb4720cc535cc3ad0e999007da716a12168559b00f9f
closefd.tar.gz
Posted Sep 25, 2000
Authored by Ulisses alonso Camaro

closefd v1.1.3-ok is a kernel module which closes a file of any process for Linux 2.2.x. It works on regular files, sockets, directories, pipes, etc.

Changes: Fixes many bugs.
tags | kernel
systems | linux, unix
SHA-256 | 7e8579d112cfa2997f916dcd06416a458ac32692645c6ce587b357f40e93b8fe
cisco.tar.gz
Posted Sep 23, 2000
Authored by Doom, Netsym | Site 8op.com

Denial of service exploit for CiscoSecure ACS for Windows NT Server prior to release 2.4(3), as described in cisco.00-09-21.ciscosecure. Sends an oversized URL to TCP port 2002, causing the CSAdmin module to crash.

tags | exploit, denial of service, tcp
systems | cisco, windows
SHA-256 | d76e6d70deea1e08c86802aa50e2b1dc8d782a0cb82ae1a351ea663e9c68ef64
cisco.00-09-21.ciscosecure_acs
Posted Sep 22, 2000
Site cisco.com

Cisco Security Advisory - This advisory highlights three vulnerabilities found in the CiscoSecure Access Control Server for Windows NT. The first bug is a buffer overflow in the CSAdmin module that allows a malicious user to execute arbitrary code or crash the module by sending an oversized packet to TCP port 2002. The second vulnerability involves sending an oversized TACACS+ packet to the CiscoSecure ACS thereby creating an unstable condition within the system conducive to denial of service attacks. Lastly, the enable password can be bypassed to gain unauthorized access to a router or switch if the interaction is between an LDAP server that allows null passwords and a CiscoSecure ACS for Windows NT. All releases of CiscoSecure ACS for Windows NT Server up to and including 2.1(x), 2.3(3), and 2.4(2) are vulnerable. CiscoSecure ACS for UNIX is not affected.

tags | denial of service, overflow, arbitrary, tcp, vulnerability
systems | cisco, windows, unix
SHA-256 | c230ea8e43185ba2ece9c31b2ac308f4498d45ee881a3a4a2f35e0351d9bdc5f
ms00-067
Posted Sep 22, 2000

Microsoft Security Bulletin (MS00-067) - Microsoft has released a patch for the "Windows 2000 Telnet Client NTLM Authentication" vulnerability in the telnet client that ships with Microsoft Windows 2000. The vulnerability allows a malicious user to obtain cryptographically protected NTLM logon credentials from another user by creating a HTML document that, when opened, attempts to initiate a Telnet session to a rogue telnet server. Microsoft FAQ on this issue available here. By

systems | windows
SHA-256 | 34c0e50c48ca898fba0caa41c3a1760910f4f14b482584bf5b5a60d7a1017fb5
vpnd-1.1.0.tar.gz
Posted Sep 22, 2000
Site sunsite.auc.dk

The virtual private network daemon vpnd is a daemon which connects two networks on network level either via TCP/IP or a (virtual) leased line attached to a serial interface. All data transfered between the two networks are encrypted using the unpatented free Blowfish encryption algorithm. Functional overview available here.

Changes: Minor fixes, FreeBSD Port.
tags | tool, tcp, firewall
systems | unix
SHA-256 | 06c9ef950e12a1ff05a6ef5cb69bbc937c548492d3d5baa9cec8315e126f9cd6
Page 2 of 12
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close