exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 2000-11-29 to 2000-11-30

wap-nmap-1.0.0.tar.gz
Posted Nov 29, 2000
Site hackinthebox.org

Wap-nmap enables an nmap scan from a WAP enabled device and pumps the results back to the device.

tags | tool, nmap
systems | unix
SHA-256 | d8873fde1460eb96c27139a769aad620cf12f9a064d26483016048fd2a4a8149
netsec39.txt
Posted Nov 29, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Guide to linux kernel compilation including iptables firewalling, and more.

tags | kernel
systems | linux
SHA-256 | e8c1b3d79a4c6a5a1ecf9f95bf1c318520410369a973bfd7797400b511a0348a
free-cellcalls.txt
Posted Nov 29, 2000
Authored by Zion | Site fuxx0rs.cjb.net

How to get free cellphone calls in Germany by using a free 800 number.

tags | telephony
SHA-256 | 04f191ab63fa02fc6107a019de5729e2213250b5955684eb3be783e9a9239087
winupw.zip
Posted Nov 29, 2000
Authored by Nu Omega Tau | Site nuomegatau.com

The WinU password cracker v0.7b decrypts WinU's stored passwords from the registry. Versions 2.0-5.2 are supported.

tags | registry
SHA-256 | 9746ad0ed4c5c32758e762506040a3f4ef76890e378a06d851019b50b440ff10
bsdi_inc.c
Posted Nov 29, 2000
Authored by vade79, realhalo | Site realhalo.org

BSDI 3.0 /usr/contrib/mh/bin/inc local root exploit.

tags | exploit, local, root
SHA-256 | ed628d1321ba3d0225a71dc5d95a94974deec4e382e6feef884016cddda04dd0
debian.ghostscript.txt
Posted Nov 29, 2000
Site debian.org

Debian Security Advisory - ghostscript uses temporary files to do some of its work. Unfortunately the method used to create those files wasn't secure: mktemp was used to create a name for a temporary file, but the file was not opened safely. A second problem is that during build the LD_RUN_PATH environment variable was set to the empty string, which causes the dynamic linker to look in the current directory for shared libraries.

systems | linux, debian
SHA-256 | 79e8f4b60426ccf8b03cea104e312f9beb7dcdab7ca25bfa2fa7e73c2e28d999
ms00-090
Posted Nov 29, 2000

Microsoft Security Bulletin (MS00-090) - Microsoft has released a patch that eliminates two unrelated serious security vulnerabilities in Microsoft Windows Media Player. These vulnerabilities allow a malicious user to cause a program of his choice to run on another user's computer. Microsoft FAQ on this issue available here.

tags | vulnerability
systems | windows
SHA-256 | 934f764d4f38872dc3f2e2e12f54c2625b72402a464b87892130c38de5fbcf2c
anger-1.33.tgz
Posted Nov 29, 2000
Authored by Aleph One | Site securityfocus.com

Anger v1.33 implements a PPTP challenge/response sniffer. These c/r can be input into L0phtcrack to obtain the password, and b) An active attack on PPTP logons via the MS-CHAP vulnerability to obtain the users password hashes. Notice that this also generates the password hashes of the new password the user wanted to use, which can be put into L0phtcrack to get passwords, into a modified smbclient to logon onto a SMB sever, or into a modified PPP client for use with the Linux PPTP client.

tags | tool, sniffer
systems | linux
SHA-256 | 4c21a34d713b5921f0589ac3020b351e9fdcf9c71e20fa4f38ebe79c453e1dbb
syslog-ng-1.4.9a.tar.gz
Posted Nov 29, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng is a multi-platform syslogd replacement, with lots of new functionality. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: New stable release - Adds fixes for a remote denial of service attack. Requires libol-0.2.20.
tags | system logging
systems | unix
SHA-256 | ec216cf108e34c7e925a05fec37ab299a14666a58b69e928bf42a81ee0ddd7ee
pakemon-0.3.0.tar.gz
Posted Nov 29, 2000
Site sfc.keio.ac.jp

pakemon has been developed to share IDS components based on the open source model. Current version of pakemon monitors all traffic on a network, search given data patterns in the traffic and output session logs and summary logs of matched traffic. Tested on RedHat Linux 6.2j, OpenBSD2.7, FreeBSD 3.3, and NetBSD 1.4.

tags | tool, intrusion detection
systems | linux, redhat, netbsd, unix, freebsd
SHA-256 | 5992ae6ed8188ba3d71db6f55768563314f3c1fb07c7025082f68fc60549f9ef
listsyscalls-1.0.tar.gz
Posted Nov 29, 2000
Site low-level.net

Listsyscalls is a tool for listing contents of the syscall table on a running Solaris kernel. Has various uses, including being able to check if a syscall function has been patched or redirected.

tags | tool, kernel
systems | unix, solaris
SHA-256 | 837373505ebc89aa58cfe1ad3c257c9a6e836f110bacd8b996c00f45ccabfe33
solpromisc-1.0.tar.gz
Posted Nov 29, 2000
Site low-level.net

Solpromisc is a kernel module which you can load to detect attempts to put devices into promiscuous mode from user space via DLPI (e.g. solsniff, tcpdump, anything pcap based). It dumps the cred struct for the process, and the driver responsible, to the dmesg output buffer for collection by syslog. You are advised to read the source.

tags | tool, kernel
systems | unix
SHA-256 | 06ceaf80c902b59cb0e84800cc98a0d5632f16a49b3bf362b701a539753cd066
sendip-1.2.tar.gz
Posted Nov 29, 2000
Authored by Mike Ricketts | Site earth.li

SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, or raw IP packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.

Changes: IPv6 support, TCP options support, and lots of bugfixes!
tags | tool, arbitrary, udp, tcp
systems | unix
SHA-256 | 7865cb20c74fdf1c1f62f25faec083b51f41a24373a9a6b38d9010f52b181453
firedaemon-1.0.tgz
Posted Nov 29, 2000
Site speakeasy.org

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

tags | tool, firewall, protocol
systems | linux
SHA-256 | e79d2a17c016c8e9e314b0e89edab00c78596ba7965386795a81833d47bee29e
rpm2tar-1.0.0.tar.gz
Posted Nov 29, 2000

Converts RPMs to tar files. Very useful archive tool!

tags | tool
systems | unix
SHA-256 | 7bb90cdd971eb6eda2369ed4605dbcb8ffa75b18caab6a69fbfeae874991983a
NIT_UNICODE.zip
Posted Nov 29, 2000
Authored by Stealthmode316

Microsoft IIS Unicode remote exploit which uses tftp to obtain code to run.

tags | exploit, remote
SHA-256 | e0f403b11dab3aab5b3ee904e8e8bce6c11936552abdcf36a5b3990cd728aa32
cryptdata.pl
Posted Nov 29, 2000
Authored by Zorgon

Cryptdata.pl encrypts/decrypts files with Crypt::Blowfish perl module. It is useful to encrypt home directories.

tags | perl, encryption
SHA-256 | b68cedfd65d4cc3b13b3fa396e71959cc57c62ff32879503ad41579cce297a58
sinto.c
Posted Nov 29, 2000
Authored by s0ftpj, vecna | Site s0ftpj.org

Sinto.c is an interactive tty hijacker for Linux.

systems | linux
SHA-256 | 2545a9c0855c78b989ac5e2761936838dd95a63705a98662686aeed743282260
mmcrackz.zip
Posted Nov 29, 2000
Authored by Eric D

MMCrack is a Netbus 1.6 client installer. Attempts to avoid AV software. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | 84439652dd6bb045379985f5f8b47567778da67db948fb3b13896b6c530b24af
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close