ignore security and it'll go away
Showing 101 - 125 of 192 RSS Feed

Files Date: 2001-01-01 to 2001-01-31

tcpdump-xploit.c
Posted Jan 15, 2001
Authored by Zhodiac | Site hispahack.ccc.de

Tcpdump v3.5.2 remote root exploit - Tested against X86 Linux. Exploits an overflow in the AFS packet parsing which requires the snaplen (-s) to be set to 500 or greater. Fixed in v3.62.

tags | exploit, remote, overflow, x86, root
systems | linux
MD5 | 289510d424aa0a665ee3161b20c9abab
arpexp.c
Posted Jan 13, 2001
Authored by Sor Pablo Sebastian, Dave Ahmed | Site securityfocus.com

Solaris /usr/sbin/arp local root stack overflow exploit.

tags | exploit, overflow, local, root
systems | solaris
MD5 | 9c79d0fb32487641840dd6b081e6d8fa
ms01-001
Posted Jan 13, 2001

Microsoft Security Bulletin (MS01-001) - The Web Extender Client (WEC), a component that ships as part of Office 2000, Windows 2000, and Windows Me, does not respect the IE Security settings regarding when NTLM authentication will be performed - instead, WEC will perform NTLM authentication with any server that requests it. If a user established a session with a malicious user's web site - either by browsing to the site or by opening an HTML mail that initiated a session with it - an application on the site could capture the user's NTLM credentials. The malicious user could then use an offline brute force attack, or with specialized tools, could submit a variant of these credentials in an attempt to protected resources. Microsoft FAQ on this issue available here.

tags | web
systems | windows, 2k, me
MD5 | 3708ea76c97b3c3e5fc79df8f41bf0ca
sms.200.arp
Posted Jan 13, 2001
Site sunsolve.sun.com

Sun Microsystems Security Bulletin #200 - The arp utility prior to Solaris 8 has stack overflows, allowing local users to execute code as root. Vulnerable versions include Solaris 7, 7_x86, 2.6, 2.6_x86, 2.5.1, 2.5.1_x86, 2.5, 2.5_x86, 2.4 and 2.4_x86.

tags | overflow, local, root
systems | solaris
MD5 | 750d8c6708ba5c638679197739fb3b24
proftpDoS.java
Posted Jan 13, 2001
Authored by Jet Li

ProFTPd remote dos attack - Exploits multiple USER ftp commands to consume all available memory. Does not require an account. Written in java. Tested against ProFTPd 1.2.0rc1 and rc2.

tags | java, remote, denial of service
MD5 | bcd1b66a5e62ce3143fac63f9ca84c64
ethereal-0.8.15.tar.gz
Posted Jan 13, 2001
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Ethereal 0.8.15 has one of the biggest GUI changes in recent history; display filters can now be constructed via an easy-to-use point-and-click interface. Protocol dissectors now exist for: NFSv4, Mobile IPv6, X.25 over TCP, LAPBETHER, DEC LANBridge Spanning Tree Protocol, X.25 over LLC, Frame Relay, MTP3 User Adaptation Layer, and ISDN Q.921 User Adaptation Layer. Many other dissectors and core features were improved, and bugs were squashed. The wiretap library can now read Sniffer Frame Relay files.
tags | tool, sniffer, protocol
systems | unix
MD5 | eb6d5e17ac03921bbeb3c4577397db95
RHSA-2001:001-05.glibc
Posted Jan 13, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:001-05 - A couple of bugs in GNU C library 2.2 allow unprivileged user to read restricted files and preload libraries in /lib and /usr/lib directories into SUID programs even if those libraries have not been marked as such by system administrator. This allows users to create or overwrite a file he did not have permissions to.

systems | linux, redhat
MD5 | e583e63bed31acda6237c08d3cb651d0
telnetfp_0.1.2.tar.gz
Posted Jan 13, 2001
Authored by teso, Palmers | Site team-teso.net

Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 72 OS fingerprints.

Changes: More fingerprints, bugfixes, interactive mode.
tags | remote
MD5 | d33ddb5cbc2ef98af89df5e2eb0a7212
accp.exe
Posted Jan 13, 2001
Authored by Haris Bjelak

Accp.exe recovers lost passwords on MS Access 97 mdb files. Ported from Java.

tags | java
MD5 | aa40aee2369d860225a440c113052fd5
pudding01.tar.gz
Posted Jan 13, 2001
Authored by Roelof Temmingh | Site sensepost.com

Pudding is a proxy which recodes HTTP requests using most of RFP's IDS evasion encoding methods, plus random UTF-8 encoding support. Allows any web aware program/exploit/cgi-scanner to evade IDS without modification of the original code. Encoding methods include all uppercase, hex encoding, /./ directory insertion, fake parameters, premature URL endings, windows delimiters, and random UTF8 encoding.

tags | web, cgi
systems | windows, unix
MD5 | c59f537e8c2babca36afbce55c28089b
enabler.c
Posted Jan 13, 2001
Authored by Norby | Site avatarcorp.org

Enabler.c attempts to find the enable password on a cisco system via brute force. Tested on Cisco 2600's and 12008's and has support for login-pass as well as login-only devices.

systems | cisco
MD5 | 5a3644f71725f36ef010f4e0d84b33c4
CA-2001.interbase
Posted Jan 13, 2001
Site cert.org

CERT Advisory CA-2001-01 - Interbase is an open source database package that had previously been distributed in a closed source fashion by Borland/Inprise. Both the open and closed source versions of the Interbase server contain a compiled-in back door account with a known password which allows any local or remote user able to access port 3050/tcp [gds_db] to manipulate any database object and run arbitrary code on the system.

tags | remote, arbitrary, local, tcp
MD5 | 4ccfa403993e47c8ebf067e978169831
whois.pl
Posted Jan 13, 2001
Authored by Marco van Berkum

Whois.pl is a remote exploit for Fastgraf's whois.cgi perl script.

tags | exploit, remote, cgi, perl
MD5 | cab6f0b2ef5ed6f5bb75170b42fd55ac
analisis-remoto-de-sistemas.txt
Posted Jan 13, 2001
Authored by Honoriak

Port Scanning and OS Fingerprinting - In Spanish.

tags | paper, protocol
MD5 | b4d894cbc192bce67cd91bc869bb0807
gShield-2.0.0.tgz
Posted Jan 10, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Conversion to iptables, adding support for multiple NATs, support for routable addresses and protection, DMZ support, integrated port-forwarding, MAC-specific filtering for administrative hosts, and stateful tracking has been added.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | 7455acf0b872ad3625cccb72daa7eb67
lids-1.0.4-2.4.0.tar.gz
Posted Jan 10, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Ported to 2.4.0, minor bug fixes. Changelog available here.
tags | kernel, root
systems | linux
MD5 | 8cef87ae1898d25364c8568fb1cd1842
zorp-0.7.11.tar.gz
Posted Jan 10, 2001
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize out of band authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: HTTP and core bugfixes, and the start of a feature freeze.
tags | tool, tcp, firewall, protocol
systems | unix
MD5 | 23fec4809b22ab683ff6a65a29e52918
lomac-v1.0.1.tar.gz
Posted Jan 10, 2001
Site pgp.com

LOMAC is a security enhancement for Linux that uses Low Water-Mark Mandatory Access Control to protect the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised root daemons. LOMAC is implemented as a loadable kernel module - no kernel recompilations or changes to existing applications are required. Although not all the planned features are currently implemented, it presently provides sufficient protection to thwart script-kiddies, and is stable enough for everyday use. Whitepaper available here.

Changes: This release fixes a dentry reference counting bug on BIND operations and includes some minor documentation corrections.
tags | remote, kernel, root, trojan
systems | linux
MD5 | e69762ea91e3e2f9ccb55199bfaaa8de
BitchX-1.0c18.tar.gz
Posted Jan 10, 2001
Site bitchx.com

BitchX is a popular IRC client which is a modified clone of the popular ircII client. It is available for almost all UNIX OS's as well as Win95/NT and OS/2.

Changes: Fixes an exploitable stack overflow in the DNS parsing code, SSL support added, DCC_AUTORESUME support, nonblocking connect support, and various bug fixes.
systems | windows, unix
MD5 | 737276281ae911c5e1e17b028ebee045
sendmail.8.11.2.tar.gz
Posted Jan 9, 2001
Site sendmail.org

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: Mostly minor bug fixes. Changelog available here.
systems | unix
MD5 | eee46aa3a3215e02c1aa7f1c49c5e99c
adore-0.31.tar.gz
Posted Jan 9, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Automatic configuration, bug fixes.
systems | linux
MD5 | 4bdf75cfb7735741285ae82f5b5d4df6
sa2001_01.txt
Posted Jan 9, 2001
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory (SA2001-01) - The NetScreen Firewall / VPN Appliance has an overflow vulnerability in the web interface which allows remote users to crash the firewall with a large URL. All current versions of ScreenOS, including v1.73r1, 2.0r6, 2.1r3 and 2.5r1 are affected. Perl exploit included. Fix available here.

tags | remote, web, overflow, perl
MD5 | 461b4b78a0613c22ce2385ec0debfced
thebat.traverse.txt
Posted Jan 9, 2001
Authored by 3APA3A | Site security.nnov.ru

The Bat! v1.48f and below has a client side vulnerability which allows malicious mail messages to add any files in any directory on the disk where user stores his attachments.

tags | exploit
MD5 | ca77c4383a98f689f532016cfb080be4
defcom.imagecast.txt
Posted Jan 9, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-01 - ImageCast V4.1.0 for Windows, a rapid-PC-deployment tool much like Ghost, has problems handling malformed input which result in a dos attack against the ImageCast Control Center.

tags | exploit
systems | windows
MD5 | b6325a0535100802bdaa273349db1d0a
kaufcrk.pl
Posted Jan 9, 2001
Authored by Xcript | Site rhs-ck.com

Kaufcrk.pl is a perl script which decrypts encrypted passwords found in the Kaufman Mail Warrior accounts file (MW35_Accounts.ini). Tested with Mail Warrior v3.57.

tags | cracker, perl
MD5 | 60ffe9d262b8807da1fbef231c62a03f
Page 5 of 8
Back34567Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    2 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close