the original cloud security
Showing 1 - 13 of 13 RSS Feed

Files Date: 2002-01-11 to 2002-01-12

cgiaudit-1.0.tar.gz
Posted Jan 11, 2002
Authored by S

CGIAudit is a black-box debugging tool which automatically audits CGI entities with only an interface specification, the HTML form. Attack types that a CGI script or program become subject to are configurable, as well as server replies that denote a possible penetration success. Other features include a built-in spider, proxy support, and hexadecimal encoding of requests.

tags | cgi
systems | unix
MD5 | 8a5e585d220f86b1b68363490dbefde2
FreeBSD Security Advisory 2002.5
Posted Jan 11, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:05 - The pine port, versions previous to pine-4.40, handles URLs in messages insecurely. PINE allows users to launch a web browser to visit a URL embedded in a message. Due to a programming error, PINE does not properly escape meta-characters in the URL before passing it to the command shell as an argument to the web browser.

tags | web, shell
systems | freebsd
MD5 | 8b8ab8367a586b71c4575f237d8b0141
boozt.c
Posted Jan 11, 2002
Authored by Rafael San Miguel Carrasco

The Boozt! banner management software for Linux v0.9.8alpha remote exploit. Included shellcode creates a suid httpd shell in /tmp. Fix available here.

tags | exploit, remote, shell, shellcode
systems | linux
MD5 | 54a2881575b025fcef77361b2bb13609
scantactics.doc
Posted Jan 11, 2002
Authored by Zack Walko

How Nmap scans work - This MS word document has information on how some of the different nmap scan types work.

tags | paper
systems | unix
MD5 | 159e1b0b51c948797a4feab7aa315e2e
flawfinder-0.21.tar.gz
Posted Jan 11, 2002
Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.

Changes: Fixed an error that would cause incorrect hits in syslog, added an INSTALL file.
systems | unix
MD5 | fcabc57d5addb69936915a3fbad4e32a
darkside-0.2.3.tar.gz
Posted Jan 11, 2002
Authored by LByte

Darkside is a rootkit for unix which hides processes and their children, hides files, manipulates uid's, and modifies the tcp/ip stack to hide connections.

tags | tool, tcp, rootkit
systems | unix
MD5 | 2af112a1e0cb1b0ed4cbe3626044ccf7
irpas_0.10.tar.gz
Posted Jan 11, 2002
Authored by FX | Site phenoelit.de

IRPAS is a suite of routing protocol attack tools which sends custom routing protocol packets from the unix command line. It is very useful for searching for new routing protocol vulnerabilities. Included is a tool for sending Cisco Discovery Protocol (CDP) messages, one for injecting IGRP routes, and a scanner for IGRP autonomous systems. Documentation available here.

tags | vulnerability, protocol
systems | cisco, unix
MD5 | 314670e9d239694cdd4e1f529b63959b
buggyzilla.pl
Posted Jan 11, 2002
Authored by Funkysh

Buggyzilla.pl exploits two vulnerabilities in bugzilla 2.14 or prior in order to execute commands on affected systems. This uses bad quotation of user input in bugzilla to gain access to administrator pages. The a weakness in the reports.cgi is then used to allow execution of commands. Advisory available here.

tags | exploit, cgi, vulnerability
MD5 | a34590985ad2c781d4a2ef465b370e00
d7uNiF-ck.tgz
Posted Jan 11, 2002
Authored by Phrail

Unifuck 2.0 - An IIS Unicode/Decode exploit with full proxy support. Includes perl mods to run it.

tags | exploit, perl
MD5 | 141277f2955ee8ebe967611a716ce835
boozt.txt
Posted Jan 11, 2002
Authored by Rafael San Miguel Carrasco

The Boozt! banner management software for Linux v0.9.8alpha has a remotely exploitable buffer overflow in a CGI executable. Fix available here.

tags | overflow, cgi
systems | linux
MD5 | c873e2c3efe04bcc2af57f09cd51029a
FreeBSD Security Advisory 2002.1
Posted Jan 11, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:01 - Pkg_add allows local attackers to modify the package contents and potentially elevate privileges or otherwise compromise the system.

tags | local
systems | freebsd
MD5 | 8c47552cc1bc260be26ebcefc5aca401
sockscan.tgz
Posted Jan 11, 2002
Authored by twlc, Krusader | Site twlc.net

Syn sock scanner - A very fast scanner for socks proxies.

tags | tool, scanner
systems | unix
MD5 | 29399e1f6ea480968bdf63d6b592a903
NBTEnum10.zip
Posted Jan 11, 2002
Authored by NTSleuth

NBTEnum 1.0 is a utility for Windows which can be used to enumerate one single host or an entire class C subnet. This utility can run in two modes: query and attack. The main difference between these modes is that when NBTEnum is running in attack mode it will seek for blank password and for passwords that are the same as the username but then in lowercase letters.

systems | windows
MD5 | 24d2a81f09cb3b55dacc62f7c133fb99
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    2 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close