what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 192 RSS Feed

Files Date: 2001-01-01 to 2001-01-31

defcom.websphere.txt
Posted Jan 9, 2001
Authored by Defcom Labs | Site defcom.com

Defcom Labs Advisory def-2001-02 - IBM WebSphere 3.52 (IBM HTTP Server 1.3.12) for Windows NT has a memory leak which can be used as a remote denial of service attack. Workaround included.

tags | exploit, remote, web, denial of service, memory leak
systems | windows
SHA-256 | c30b6f1e3f9eb32c68a980352c0665fac96d69038b54eff6607fd86a46d507e7
exhpcu.c
Posted Jan 9, 2001
Authored by Zorgon

HP-UX v11.00 /bin/cu local buffer overflow exploit - Exploits the -l option. Provides a uid=bin shell.

tags | exploit, overflow, shell, local
systems | hpux
SHA-256 | 4eb65814f18d048afcb2595ba4538c73bdf060588b077aeaa9201aff06040d45
Footprinting-faq-v0_1.txt
Posted Jan 9, 2001
Authored by Tag | Site liun.hektik.org

Footprinting FAQ - How to remotely determine the network addresses of a company.

tags | paper
SHA-256 | 11315b4ad2af74774d05a420c527242bff6ad16c8cc94551ee6f13e1b5b14c44
netsec45.txt
Posted Jan 9, 2001
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the News the past week. In this issue: CPS-2 Encryption Broken, and more.

SHA-256 | efd46439ec5d59eaf5630b46468e19c40b555e499bc324665677ffd6d955a7d2
Linux IPTables Firewall
Posted Jan 8, 2001
Site iptables.org

iptables is the new packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.

Changes: Updates for 2.4.0 final compatibility, various IPv6 fixes, eggdrop bot connection tracking, and big-endian alignment fixes.
tags | tool, firewall
systems | linux
SHA-256 | 424f666dc4060b83dec77d7e5a13b381ee2e7d7c8731ed52d4ee5509e3815197
redir-httpd.c
Posted Jan 8, 2001
Site technopagan.org

redir-httpd is an ultra-minimalist, non-RFC-compliant HTTP server that will ONLY issue redirects to another site. It's good for running on home systems that have permanent connectivity (i.e. DSL and cable-modem subscribers). It should be short enough to be easily understood (and thus audited for potential security issues), and still fairly robust.

tags | web
SHA-256 | f9d88a4cd09ef7c39dc3301fb37e374a6aa58d621506ed6948a2aef19eb42d95
flitz-0.1.tgz
Posted Jan 8, 2001
Authored by Xphere | Site home.wanadoo.nl

Flitz is a DDOS tool which features spoofed ip/tcp/udp flood, flooding in parallel, distributed smurf attack and status report of the slave. With one stop command, you can stop all the slaves at once.

tags | denial of service, udp, spoof, tcp
SHA-256 | 9346b94e8f0ca0ba742335190ffba0de3a9812e72964aefb7757767c7f553e0f
wu260scan.c
Posted Jan 8, 2001
Authored by Rasch

Wu-ftpd 2.6.0 mass scanner.

tags | tool, scanner
systems | unix
SHA-256 | aa2dc9d24e9555a64b9794199e3fb1801e88083d39017b468c5588cbcd4b3c41
tar-symlink.txt
Posted Jan 8, 2001
Authored by Marco van Berkum | Site obit.nl

GNU tar follows symlinks blindly, a problem if you untar as root.

tags | exploit, root
SHA-256 | 941d4baa8400f1fbed234f9bd2533ce2860e8137e6ad91ba30b49a049594c4f6
smr.tar.gz
Posted Jan 8, 2001
Authored by God-

Redhat rpc.statdx mass exploit - scans for vulnerable hosts and implants a bindshell.

tags | exploit
systems | linux, redhat
SHA-256 | 1b45bfc55a0f485af901ce8bd6d9f5e43c1bd304911f3aba1fa66a0b50409fd0
ipa-1.0.2.tar.gz
Posted Jan 8, 2001
Site simon.org.ua

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: OpenBSD support, bugfixes.
systems | unix, bsd
SHA-256 | 563b0649befc9c9aa73a5dc18205c7cefadacb7078a25a04e71219dd156f6b8f
netsed.tgz
Posted Jan 8, 2001
Authored by Michal Zalewski

Netsed v0.01b brings sed functionality to the network layer, allowing you to change the contents of packets traveling through your network on the fly and in a completely transparent manner. It features basic expressions and dynamic filtering, and cooperates with ipfwadm/ipchains transparent proxy rules to pick specific packets.

systems | unix
SHA-256 | a04f6b235d787b1efd96ecdb398e6c8456301dbf965840e6fcbad36c68372dce
auditd-1.20.tar.gz
Posted Jan 8, 2001
Site hert.org

auditd is part of the Linux Kernel Auditing Facility (KAD). It will capture auditing trails created by the kernel auditing facility from /proc/audit, filter them, and save them in specific log files. Either a kernel patch or loadable module must be installed for the daemon to be useful, both of which are included.

Changes: This release includes a kernel module (modkaf) which replaces the previously used patches. Also included is a library (libaudit) which enables you to write applications which emit debugging trails under certain trust-related conditions, and can also be used as a ld.preload object to hook syslog calls.
tags | kernel
systems | linux, unix
SHA-256 | 6c5c09a62ccddf426fb43c09643ad20d8cd4c7c49e0c9348d53259249bcbb305
fwlogwatch-0.1.tar.gz
Posted Jan 8, 2001
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch analyzes the ipchains, netfilter, or iptables packet filter logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: The IP address handling code has been rewritten, as well as several minor extensions.
tags | tool, firewall
systems | unix
SHA-256 | 05ef7d6d6322de7a8721e7a368a05759a63e3ae1beed75f0f8794322abd7243e
logtool-1.0.2.tar.gz
Posted Jan 8, 2001
Site users.digitex.net

Logtool is a syslog file parser, report generator, and monitoring utility. It takes syslog (and syslog compatible) logfiles as input from stdin, and depending on command line switches and/or config file settings, will parse and filter out unwanted messages from the logfile accordingly, and generate output in ANSI color, formatted ASCII, CSV (for spreadsheets), or HTML format. It is very handy for use in automated nightly reports, and online monitoring of logfile activity. It comes with some simple example scripts and documentation.

Changes: Updates to the getopt.c code and the decl of strncasecmp() to compile correctly on Solaris 2.6 with the original CC compiler, as well as some minor changes to the RPM spec file to clean up a few things.
tags | system logging
systems | unix
SHA-256 | 51269d444ab0a4ca6c3fb0275db05ab7bf72991eb58b375b908cb07b99386e25
knetfilter-2.0.2.tar.gz
Posted Jan 8, 2001

Knetfilter is a KDE gui application designed to manage the netfilter functionalities that will come with the new kernel 2.4.x. In Principal, all standard firewall system administration activities can be done just using knetfilter. But there is not just a GUI to iptables command line, it is possible also some monitoring via a tcpdump interface.

Changes: A noisy bug in the save function has been eliminated. A simple interface to nmap has been included. It is very slow because of udp port scan. There have been some cosmetic updates to allow knetfilter to also compile on red hat systems.
tags | tool, kernel, firewall
systems | linux
SHA-256 | 4a732257225576206dbb9a67e2f9818f0f814b0e9e93ea2d122c0620a53bd98d
netxplorer-0.0.3BETA.tar.gz
Posted Jan 8, 2001
Site cyest.org

SubNetwork Explorer is a network scanning tool that checks subnets of a network for anonymous FTP, CUPS, Netbios, and SunRPC ports. It uses 'fork()' to scan all of the subnets at the same time.

Changes: connect_scanner::scan_port(...) has been fixed, as well as a memory hogging bug. Half-connection scan (still broken) has been added, as well as web, mail, and CUPS server scans. Everything has been rewritten in C++, and the code has been improved and undergone a major cleanup. Also added are single host scanning and more complete Sun RPC detection.
tags | tool, scanner
systems | unix
SHA-256 | 128526167796733d82ded38f9d72649acd500dee160a084d02f60c3e62710b6d
scowl_cgi.tar.gz
Posted Jan 6, 2001
Authored by Melih Sarica | Site bilgiteks.com

Scowl_Cgi is a CGI scanner which allows you to easily add new bugs. Works very fast, using threads. Warns you, for hosts that return false positive answers. Freeware. Testing for more than 400 bugs.

tags | cgi
systems | unix
SHA-256 | 3c2489aa464072e14d2a051c4ce5476847a64d748ee51638a23a002ef3fcc14c
snort-1.7.tar.gz
Posted Jan 6, 2001
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: New stable release! Features dynamic rules (rules that can turn on other rules), a Statistical Anomaly Detection preprocessor, a TCP stream reassembly preprocessor, XML output plugin, Oracle DB plugin, improved IP defragmentation preprocessor, HTTP decode preprocessor can now detect IIS/UNICODE attacks, Four new detection plugins (react, reference, fragbits, tos), Rules language now supports IP address lists, user configurable action types, and updated documentation.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 2a72cc7462f8f3ac5397dd54fb59090a5f1fa15f2e5eb2e2480628c58264cbb8
whois.cgi.txt
Posted Jan 6, 2001
Authored by Marco van Berkum

Fastgraf's whois.cgi perl script lacks meta character checking, allowing remote users to execute arbitrary commands as uid of the webserver.

tags | exploit, remote, arbitrary, cgi, perl
SHA-256 | 5abaa53a2c6a8bbe911a2c4851d96061e1ccfb4c69892c8acb5e5a3ac920d6ed
testdisk2.2.tgz
Posted Jan 6, 2001
Site esiea.fr

Testdisk can undelete deleted partitions! Source version. Works well in linux.

systems | linux
SHA-256 | e817e1b981cc9f995b363c55f7d3e16ed570dccc3077643a057e77d7607229e6
testdisk22.zip
Posted Jan 6, 2001
Site esiea.fr

Testdisk can undelete deleted partitions! Windows / DOS version.

systems | windows
SHA-256 | 387599a5fad7cdeb8c05fb466ff545bbf5166551cadbd0d85a3d7b00de6bb3c9
portscan.pdf
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers. Text version available here.

tags | arbitrary, protocol
SHA-256 | 22abdfcab10f441e0501420efec15d503b45b165a5be82400b3e1e96c014b32c
portscan.txt
Posted Jan 5, 2001
Authored by synnergy, Dethy | Site synnergy.net

Examining port scan methods - Analyzing Audible Techniques. This paper attempts to enumerate a variety of ways to discover and map internal/external networks using signature-based packet replies and known protocol responses when scanning. Specifically, this document presents all known techniques used to determine open/closed ports on a host and ways an attacker may identify the network services running on arbitrary servers.

tags | arbitrary, protocol
SHA-256 | 4fd4b2bbef21c64d1c9c2fdebd6a48b8ea628ca311becdf898a6cf1dbfc00282
sara-3.3.2.tar.gz
Posted Jan 5, 2001
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Added sendmail DECODE/DEBUG tests, writable ftp directory tests, IIS samples and more coldfusion tests, added minor FTP and web checks, and added two ReportWriter formats.
tags | tool, cgi, scanner
systems | unix
SHA-256 | b4ff5819022353d41c4cc683902ca0a4853738cb2b8420b83eb2e87b08f0c370
Page 6 of 8
Back45678Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close