Exploit the possiblities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2002-01-11 to 2002-01-12

cgiaudit-1.0.tar.gz
Posted Jan 11, 2002
Authored by S

CGIAudit is a black-box debugging tool which automatically audits CGI entities with only an interface specification, the HTML form. Attack types that a CGI script or program become subject to are configurable, as well as server replies that denote a possible penetration success. Other features include a built-in spider, proxy support, and hexadecimal encoding of requests.

tags | cgi
systems | unix
MD5 | 8a5e585d220f86b1b68363490dbefde2
FreeBSD Security Advisory 2002.5
Posted Jan 11, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:05 - The pine port, versions previous to pine-4.40, handles URLs in messages insecurely. PINE allows users to launch a web browser to visit a URL embedded in a message. Due to a programming error, PINE does not properly escape meta-characters in the URL before passing it to the command shell as an argument to the web browser.

tags | web, shell
systems | freebsd
MD5 | 8b8ab8367a586b71c4575f237d8b0141
boozt.c
Posted Jan 11, 2002
Authored by Rafael San Miguel Carrasco

The Boozt! banner management software for Linux v0.9.8alpha remote exploit. Included shellcode creates a suid httpd shell in /tmp. Fix available here.

tags | exploit, remote, shell, shellcode
systems | linux
MD5 | 54a2881575b025fcef77361b2bb13609
scantactics.doc
Posted Jan 11, 2002
Authored by Zack Walko

How Nmap scans work - This MS word document has information on how some of the different nmap scan types work.

tags | paper
systems | unix
MD5 | 159e1b0b51c948797a4feab7aa315e2e
flawfinder-0.21.tar.gz
Posted Jan 11, 2002
Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.

Changes: Fixed an error that would cause incorrect hits in syslog, added an INSTALL file.
systems | unix
MD5 | fcabc57d5addb69936915a3fbad4e32a
darkside-0.2.3.tar.gz
Posted Jan 11, 2002
Authored by LByte

Darkside is a rootkit for unix which hides processes and their children, hides files, manipulates uid's, and modifies the tcp/ip stack to hide connections.

tags | tool, tcp, rootkit
systems | unix
MD5 | 2af112a1e0cb1b0ed4cbe3626044ccf7
irpas_0.10.tar.gz
Posted Jan 11, 2002
Authored by FX | Site phenoelit.de

IRPAS is a suite of routing protocol attack tools which sends custom routing protocol packets from the unix command line. It is very useful for searching for new routing protocol vulnerabilities. Included is a tool for sending Cisco Discovery Protocol (CDP) messages, one for injecting IGRP routes, and a scanner for IGRP autonomous systems. Documentation available here.

tags | vulnerability, protocol
systems | cisco, unix
MD5 | 314670e9d239694cdd4e1f529b63959b
buggyzilla.pl
Posted Jan 11, 2002
Authored by Funkysh

Buggyzilla.pl exploits two vulnerabilities in bugzilla 2.14 or prior in order to execute commands on affected systems. This uses bad quotation of user input in bugzilla to gain access to administrator pages. The a weakness in the reports.cgi is then used to allow execution of commands. Advisory available here.

tags | exploit, cgi, vulnerability
MD5 | a34590985ad2c781d4a2ef465b370e00
d7uNiF-ck.tgz
Posted Jan 11, 2002
Authored by Phrail

Unifuck 2.0 - An IIS Unicode/Decode exploit with full proxy support. Includes perl mods to run it.

tags | exploit, perl
MD5 | 141277f2955ee8ebe967611a716ce835
boozt.txt
Posted Jan 11, 2002
Authored by Rafael San Miguel Carrasco

The Boozt! banner management software for Linux v0.9.8alpha has a remotely exploitable buffer overflow in a CGI executable. Fix available here.

tags | overflow, cgi
systems | linux
MD5 | c873e2c3efe04bcc2af57f09cd51029a
FreeBSD Security Advisory 2002.1
Posted Jan 11, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:01 - Pkg_add allows local attackers to modify the package contents and potentially elevate privileges or otherwise compromise the system.

tags | local
systems | freebsd
MD5 | 8c47552cc1bc260be26ebcefc5aca401
sockscan.tgz
Posted Jan 11, 2002
Authored by twlc, Krusader | Site twlc.net

Syn sock scanner - A very fast scanner for socks proxies.

tags | tool, scanner
systems | unix
MD5 | 29399e1f6ea480968bdf63d6b592a903
NBTEnum10.zip
Posted Jan 11, 2002
Authored by NTSleuth

NBTEnum 1.0 is a utility for Windows which can be used to enumerate one single host or an entire class C subnet. This utility can run in two modes: query and attack. The main difference between these modes is that when NBTEnum is running in attack mode it will seek for blank password and for passwords that are the same as the username but then in lowercase letters.

systems | windows
MD5 | 24d2a81f09cb3b55dacc62f7c133fb99
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    1 Files
  • 22
    Jan 22nd
    15 Files
  • 23
    Jan 23rd
    12 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close