what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 75 RSS Feed

Files Date: 2001-09-01 to 2001-09-30

cso.c
Posted Sep 11, 2001
Authored by hhp, Ben Schultz | Site hhp-programming.net

Cso.c is a remote exploit for cgicso included with cgiemail 1.6. Tested on Slackware Linux 7.1 running Apache 1.3.20.

tags | exploit, remote
systems | linux, slackware
SHA-256 | 8d232fa0a2687a8c7dc294c61bb1c84b0a1be65bdeb8565fa7f6f9fa693a87cb
hhp-temprace6_0.pl
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Hhp-temprace6_0.pl is a quick and simple temp race checker for Linux, BSD, Sun/Solaris and IRIX. Put together to eliminate the hassle of manual checking.

systems | linux, solaris, irix, bsd
SHA-256 | 3a7b01350b0436ef102a74f1abf29d166c13d069a577ab60fb104dd82412538d
tcpproxy.c
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

A tcp proxy.

tags | tcp
SHA-256 | b0e839102eb66e7fc5fc5e7f23927805b2ddb3b1481a6501192d10905931f47b
chanshell0_1_4.pl
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Chanshell is somewhat like an IRC bot with bash capabilities.

tags | bash
SHA-256 | 3d880f15c213c19a4f991c1552cf109daeb6f9cb0553e74114dfaf70036083a1
pro-sec.txt
Posted Sep 11, 2001
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Programming and Programming Securely - How to do it. Includes information on argument checking, buffer checking, shell escapes, preventing races, logging, sly tricks, and more.

tags | shell
SHA-256 | edb8b73394fff8565bcf46d4f90e36e6624ac18ea964a4c8dc669891dc5b6a62
docanal.c
Posted Sep 11, 2001
Authored by hhp, Tarsin | Site hhp-programming.net

A document Analysis tool which is useful for cryptanalysis. From May '98.

SHA-256 | 8024662cda4203693c125747c6a763cff1085e773ab5485c9fe0b23f1c2232b7
gps-0.7.0.tar.gz
Posted Sep 8, 2001
Authored by Whitehat | Site gps.sourceforge.net

Ghost Port Scan is an advanced port scanner and a firewall rule disclosure tool. Uses IP & ARP spoofing, sniffing, stealth scanning, arp poisoning, and other techniques to perform stealth and untrackable information collection. GPS is especially efficient in LAN pen-testing, due to its ability to disclose the firewall settings of a host.

tags | tool, scanner, spoof
systems | unix
SHA-256 | f0cc0f25246061b51c42b84dc8a7122793170043c5a3a167beaae5823f14cf32
ms01-047
Posted Sep 8, 2001

Microsoft Security Advisory MS01-047 - A vulnerability in Microsoft Exchange 5.5 allows attackers to retrieve email addresses from the global address list (GAL) by sending a properly formatted request to the back-end function that actually performs the search. Microsoft FAQ on this issue available here.

SHA-256 | 18c4b6c3eb44aecc71e6e6a57632aab76dbf4ce6192e8552ad1c1945bbe99e0c
FreeBSD Security Advisory 2001.59
Posted Sep 8, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:59 - The infrequently used rmuser command exposes the master.passwd file to all users for an instant.

systems | freebsd
SHA-256 | 45d58a81cf33c8b0c5bbeb03f86e5520d0c454827c9ad2b0ea45917766b6295f
Altering_ARP_Tables_v_1.00.htm
Posted Sep 8, 2001
Authored by Data Wizard

Altering ARP Tables v1.00 - This paper is dedicated to ARP tables and how to alter them remotely. Includes a couple of implementations of ARP poisoning in a bridge based segment and a couple of ways to protect yourself.

tags | paper
SHA-256 | 73d99dbc0fb85dc0f69f259bf15400a6b209739aef0f1c1d8d61e438c03184a3
swatch-3.0.2.tar.gz
Posted Sep 6, 2001
Authored by Todd Atkins | Site oit.ucsb.edu

Swatch, the Simple Watch Daemon is a program for UNIX system logging, originally written to actively monitor messages as they are written to a log file via the UNIX syslog utility. Swatch was designed to keep system administrators from being overwhelmed by large quantities of log data. It monitors log files and acts to filter out unwanted data and take one or more simple user specified actions based upon patterns in the log. Swatch can monitor information as it is being appended to the log file and alert system administrators immediately to serious system problems as they occur.

Changes: Defaults to /var/adm/messages now. Lots of bugs were fixed.
tags | tool, intrusion detection
systems | unix
SHA-256 | ecc3023e0c1b71e7b0f3d0122473ddd13694810fdb850d77557ebd05c57c6b2d
SMSspoof-1.1.tar.gz
Posted Sep 6, 2001
Authored by Terje Sannum | Site waste.org

SMS spoof is an application that allows you to send spoofed SMS messages with a palm pilot. It uses a dialup connection to an EMI/UCP-compatible SMSC. It works with a modem connected to the Palm, such as an IR link to a GSM phone with a built-in modem. SMS spoof has been tested with Telenor's SMSC in Norway, and should work with any SMSC that supports the EMI/UCP protocol as long as no authentication is required.

tags | spoof, protocol
SHA-256 | 5ca217e2f0978f634e58d91564109aa70cf66e83b3e4d8db5f5d1a5b5c5daf32
psad-0.9.1.tar.gz
Posted Sep 5, 2001
Site cipherdyne.com

Port Scan Attack Detector (psad) is a perl program that is designed to work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options (Linux 2.4.x kernels only), email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap.

Changes: A security bugfix was made in config file processing. Deep scans are now detected properly. A man page and a set of benchmarks was added.
tags | kernel, perl, tcp
systems | linux
SHA-256 | 9ba6d0c125e870c4eda1642bae0f28af0527e3dfe0b9212abe5bf2c96aedad3a
firestorm-0.2.1.tar.gz
Posted Sep 5, 2001
Site scaramanga.co.uk

Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.

Changes: Sensors can now send data out to a central server over the Internet. Some bugs were fixed, and work on a firestorm daemon was started.
tags | tool, intrusion detection
systems | unix
SHA-256 | 8e8b5c43e13c843370f225ff1003f6b0f2483791e95265a9dc7a0a465faa5d17
ipa-1.1.5.tar.gz
Posted Sep 5, 2001
Site simon.org.ua

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: Two incorrect memory access bugs in ipa(8) were fixed. A bug in which IPA could not be built on some versions of FreeBSD with IPv6 Firewall support has been fixed. Some other minor bugs have been fixed.
systems | unix, bsd
SHA-256 | efeb5c499117e2738b81d6d4ce4aa65956a42f706b6e7382c736999fc4867272
snort-rep-1.6.tar.gz
Posted Sep 5, 2001
Site people.ee.ethz.ch

Snort-rep is a Snort reporting tool that can produce text or HTML output from a syslog snort log file. It is intended to be used for daily e-mail reports to the system administrators. If snort v1.8+ is used, all reports contain priority information, and the HTML output contains direct links to the IDS descriptions of whitehats.com.

Changes: Improved parsing of fast-logs.
tags | tool, sniffer
SHA-256 | d91eb7ef5cf24f6b236c8a59a071a9b15877cd0f0a2ac41c6853ab021b9ece16
anomy-sanitizer-1.43.tar.gz
Posted Sep 5, 2001
Authored by Bjarni R. Einarsson | Site mailtools.anomy.net

The Anomy mail sanitizer is a filter designed to block email-based attacks such as trojans and viruses. It reads an RFC822 or MIME message and removes or renames attachments, truncate unusually long MIME header fields and sanitizes HTML by disabling Javascript and Java. It uses a single-pass pure Perl MIME parser, which can make it both more efficient and more precise than other similar programs and has built-in support for third-party virus scanners.

Changes: Made LINK and FRAMESET tags to list of defanged HTML tags. Fixed logging bugs and character mangling issues.
tags | trojan, perl, javascript, virus
systems | unix
SHA-256 | 9d6af4e62b34d3aad46f483a95bb007d949d046326b351ef26e865ca61774b9a
qpopper.pl
Posted Sep 3, 2001
Authored by Nemes||y

Qualcomm's Qpopper mail server POP3 authentication when used with PAM that gives remote users information about whether user accounts exist or not. This perl script has been tested with Qpopper v4.0.1 on Redhat 7.x.

tags | exploit, remote, perl
systems | linux, redhat
SHA-256 | 552b77283bca7bfe71ead2e26048f4a7c53545e50aaf62baa7867718bbf668db
isnprober-1.01.tgz
Posted Sep 3, 2001
Authored by Tom Vandepoel | Site ubizen.com

ISNprober is a tool that samples TCP Initial Sequence Numbers and can use that information to determine if a set of IP addresses belong to the same TCP/IP stack (machine) or not.

tags | tool, scanner, tcp
systems | unix
SHA-256 | ca03d910506b94aa3851961823c884a3e0017d2dfd0ff900677bd9850d22206b
bastard_src-0.10.tgz
Posted Sep 3, 2001
Site bastard.sourceforge.net

A disassembler written for disassembly of x86 ELF targets on Linux (other file formats/CPUs can be 'plugged in'). Written as a backend or engine -- the UI is a command line; support for controlling the disassembler via pipes or FIFOs is provided. Note that this disassembler does not rely on libopcodes to do its disassembly; rather, the 'libi386' plugin is a standard .so that can be reused by other projects.

Changes: Added extensions (modules for CPU, assembler, source language, and also plugins). Wrote a basic Tk frontend, and added support for structures.
tags | x86
systems | linux
SHA-256 | deb4902992d31c1b6c37b4dcbc701dbc71c042fb0433831e4d972abcf40efb8c
ngrep-lib-1.1.tar.gz
Posted Sep 3, 2001
Site mavetju.org

ngrep-lib is a packet filtering library based on ngrep which provides an easy interface. Instead of having to worry about pcap options, syntax, processing of IP packets, etc. you can just initialize and run, letting callback functions handle the rest.

Changes: A problem with parsing arguments from the command line has been fixed.
tags | tool, sniffer
SHA-256 | 124a3d6908ef8ce3209e9a7eced6262ee9e66b35a7954ad140e57cb91df9f95f
ssh-timing.pdf
Posted Sep 3, 2001
Authored by Dawn Xiaodong Song, David Wagner, Xuqing Tian

Timing Analysis of Keystrokes and Timing Attacks on SSH - Watching the timing between keystrokes sent over SSH and other encrypted protocols, some information can be obtained about the contents of the packet.

tags | paper, protocol
SHA-256 | 16113d5b2e15a06d9b17c1cbf6a6dc1812913daf27141c3a46816d73465b0e86
SUN MICROSYSTEMS SECURITY BULLETIN: #00207
Posted Sep 1, 2001
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, overflow, root
systems | solaris
SHA-256 | dc64b9883f3e3a2bf6a72a92bd8c6016e8de6c6722cdfefbec5b8fd591e8e83f
SUN MICROSYSTEMS SECURITY BULLETIN: #00206
Posted Sep 1, 2001
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, overflow, x86, root
systems | solaris, bsd
SHA-256 | 2d02f7d6cafe97ac68af0d9baaf2b28fd0ef5e6b64c3f72b7874eeeee3284889
FreeBSD Security Advisory 2001.58
Posted Sep 1, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:58 - Users on the local machine or on remote systems which are allowed to access the local line printer daemon may be able to cause a buffer overflow. Submitting a specially-crafted incomplete print job and subsequently requesting a display of the printer queue, a static buffer overflow may be triggered, causing arbitrary code to be executed on the machine as root. In order to remotely exploit this vulnerability, the remote machine must be given access to the local printer daemon via a hostname entry in /etc/hosts.lpd or /etc/hosts.equiv. lpd is not enabled on FreeBSD by default.

tags | remote, overflow, arbitrary, local, root
systems | freebsd
SHA-256 | 840cb12218a791d933dd62c507535a88975344fe0b8c5ee583d5b7dd5bcfc089
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close