exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 111 RSS Feed

Files Date: 2002-02-01 to 2002-02-28

PH160.tar.gz
Posted Feb 27, 2002
Authored by Devilnet

The PHP firewall generator is a simple PHP script that generates a firewall script for ipchains-based firewalls.

tags | denial of service, php
SHA-256 | cbb7f73e65fb673766302f2722cefdb7c67b61d1de69bb20f3b4d5e91d1b8797
snax.fixed.c
Posted Feb 27, 2002

UCD-snmp v4.2.1 and below remote root exploit which is independent of snmpwalk. Includes instructions on getting it working against any linux system by finding the return address with gdb. Originally by Jove.

tags | exploit, remote, root
systems | linux
SHA-256 | 71d2aae96d921716b391fd095a13ad6b823570eca8c2e8aca4dd041f6de7e910
NBTEnum20.zip
Posted Feb 27, 2002
Authored by NTSleuth | Site ntsleuth.0catch.com

NetBIOS Enumeration Utility v2.0 is a utility for Windows which can be used to enumerate NetBios information from one single host or an entire class C subnet. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, and shares. This utility can also check for blank passwords and for passwords that are the same as the username in lowercase letters. Runs on Windows NT 4.0/2000/XP.

Changes: Enumerates more things. Bugs were fixed. Features were added.
tags | local
systems | windows
SHA-256 | abda5b3744e8363f1bc6df99696533e45539041e8f60f31474a58cc52b0367c5
Unreal_research.txt
Posted Feb 27, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

A format string vulnerability has been found in the Unread v3.1.1 IRC server. Fix available here.

SHA-256 | bed21eac274bf0fa1b5f19e58353c703fb22d0623a1825013bd41eb684778f76
netscript-1.7.0.tgz
Posted Feb 27, 2002
Authored by vade79, realhalo | Site realhalo.org

Netscript is a portable and lightweight tcp socket scripting tool. It is intended to allow anyone to script situations based on a word-to-word ruleset response system. Includes wildcard support, character replacement, random replacement, argument inclusion, server timeout, initial send, display altering, multiple character dump formats, telnet protocol support, logging, program to socket dumping, executable ruleset support and reverse binding among other things.

Changes: A (modified) cygwin/windows binary based on the netscript.c source was added. The syslog priority level was changed to better suit some situations and local display of error/statistical messages was changed to use less space. A bug with the -M option (that forced the -R option) and misplacing of a #ifdef were fixed.
tags | tcp, protocol
systems | unix
SHA-256 | b5aacf67e2cc669521c50f42bfbef95f6b53a01cb43f9821666edea091b088aa
fwanalog-0.5.tar.gz
Posted Feb 27, 2002
Site tud.at

fwanalog is a shell script that parses and summarizes firewall logfiles. It currently (version 0.4.1) understands logs from ipf (tested with OpenBSD 2.8's and 2.9's ipf, also FreeBSD and NetBSD), Linux 2.2 ipchains and Linux 2.4 iptables. It has been tested on Debian GNU/Linux "sid" with bash and OpenBSD 2.8 and 2.9 with ksh as /bin/sh. It can be easily extended for other logfile formats, all it takes is editing two regular expressions. Sample report available here.

Changes: Workaround was made for a problem with RedHat 7.1's buggy zegrep.
tags | tool, shell, firewall, bash
systems | linux, netbsd, unix, freebsd, openbsd, debian
SHA-256 | c1e4eccf4ec3e70680c875caeb309d8153d1e0aa203fe0838f355d1a93884aea
mod_ssl-2.8.7-1.3.23.tar.gz
Posted Feb 27, 2002
Site modssl.org

mod_ssl provides provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1). It is based on the SSL/TLS toolkit OpenSSL and supports all SSL/TLS related functionality, including RSA and DSA/DH cipher support, X.509 CRL checking, etc. Additionally it provides special Apache related facilities like DBM and shared memory based inter-process SSL session caching. per-URL SSL session renegotiations, DSO support, etc.

Changes: A fix for a potential buffer overflow in DBM and SHMHT session cache if very large certificate chains are used, Support for the latest OpenSSL 0.9.7 snapshots, and bugs fixed.
tags | encryption
SHA-256 | 3ca3d0604802bf6c11c521087c7ade417afd826cc5181d788add943eae5e5a67
snmp-audit-0.1.tar.gz
Posted Feb 27, 2002
Site musc.edu

Perl SNMP scanner - This small collection of scripts can be used to scan an arbitrary set of networks, presumably networks which you administer, and identify any nodes which are running an snmp service on a specified udp port (default 161) with a specified community string (default public). The results of the scan can be saved in a text file and/or in a formatted html report.

tags | tool, arbitrary, udp, scanner, perl
systems | unix
SHA-256 | 375c8fa7d64676b69c9f0ea7ffb14853be185a7a86c4e5d7179e9cbbe716ce6f
snortconf-0.2.1.tar.gz
Posted Feb 27, 2002
Site xjack.org

SnortConf is a tool that provides a fairly intuitive menu-based text interface for setting up the GPL IDS tool Snort. It also provides error and sanity checking on user input, and an online help facility.

tags | tool, sniffer
SHA-256 | 57332b70a4f6572828c412ee0be68a2b4b60779721748edd10a6e2c6b4176f71
xscreensaver-4.01.tar.gz
Posted Feb 27, 2002
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Twang, glsnake, boxed, sballs, glforestfire, apollonian, euler2d, juggle, polyominoes and thornbird were added. ant, braid, demon, discrete, drift, fadeplot, forest, grav, hopalong, ifs, laser, lightning, lisa, lissie, loop, mountain, penrose, rotor, sierpinski, slip, sphere, spiral, strange, vines, xspirograph, gltext and webcollage were updated. A rare bug wherein the desktop-grabbing hacks could sometimes leave the screen wedged has been fixed.
tags | root
systems | unix
SHA-256 | 49fb242bc3f3d08d8e4521054bacc85fc0733d1612e886babfdefa51196a94ec
fwlogwatch-0.6.tar.gz
Posted Feb 27, 2002
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

Fwlogwatch analyzes the ipchains, netfilter, iptables packet filter, and Cisco logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: This version features chain and branch selection and exclusion options, support for Windows XP firewall logs, an option to drop privileges when running as a daemon, and various small fixes.
tags | tool, firewall
systems | cisco, unix
SHA-256 | 68209ad1c30a88e43b411a53ee657b075e709d2115aeb9d5e5a559f5f1c92e07
dnstracer-1.4.tar.gz
Posted Feb 27, 2002
Site mavetju.org

dnstrace determines where a given DNS server gets its information from, and follows the chain of DNS servers back to the servers which know the data.

Changes: This release adds more info about current queries regarding zones, and more info about returned answers.
systems | unix
SHA-256 | 7120535e5e37be74fbd86a7df2ad7e46dec32ed19abc0a552f90ba51611cfe3a
syscalltrack-0.70.tar.gz
Posted Feb 27, 2002
Site syscalltrack.sourceforge.net

Syscall Tracker is a very powerful tool for Linux 2.2 and 2.4 which allows you to write rules to track system calls. It includes a kernel module plus a userspace applications. Currently only logging the invocation is supported, but in the future, you will be able to fail the system call (i.e. force it to return some error code), or suspend the process executing it. Allows you find out info that is hard to find, for instance to determine which process touched a certain file.

Changes: Supports a type-cast for 'struct' syscall parameters (useful for socket calls), 'fail syscall' actions, convenience-macros in rule config files, experimental device-driver control support, 'log_format' definition per rule, and some new syscalls (waitpid, close, creat). Major bugfixes include fixes for white-space parsing, a small memory leak when deserializing 'log' actions, and a bug in the kernel module that could leave dangling function pointers.
tags | kernel
systems | linux
SHA-256 | 6b61f46abcf4b13779a9021bed8f1d3b71d5f0bd777084d2110781c08f674ba0
sendip-2.1.tar.gz
Posted Feb 27, 2002
Authored by Mike Ricketts | Site earth.li

SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, RIP or raw IPv4/IPv6 packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.

Changes: Compiles on more platforms, including m68k, SPARC64, hppa. Bugs were fixed.
tags | tool, arbitrary, udp, tcp
systems | unix
SHA-256 | 7bcc20fa0f965dec2e23bcc6760f5e6e685ccd036c97d957472aaf78f1d18c4e
wipe-2.0.1.tar.bz2
Posted Feb 27, 2002
Site wipe.sourceforge.net

ya-wipe is a tool that effectively degausses the surface of a hard disk, making it virtually impossible to retrieve the data that was stored on it. This tool is designed to make sure that sensitive data is completely erased from magnetic media.

Changes: ya-wipe now doesn't rename over an existing file, and the Debian changelog was fixed.
systems | unix
SHA-256 | ac29b4a8b1166db50efde6a801e0dfb8395cb3d0a487d6d8216fc2b09dbff29b
mimedefang-2.6.tar.gz
Posted Feb 27, 2002
Authored by Dianne Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.11 / 8.12's "milter" API and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Better integration with SpamAssassin 2.x, correct handling of suspicious characters in e-mail, and many other minor cleanups. A filter_relay function for rejecting connections early on in the SMTP dialog was also added.
systems | windows, unix
SHA-256 | 33453a6aa5efc440c89150823b0d3253efa214933fcb5229ee9d3c7bf264b656
bvi-1.3.1.src.tar.gz
Posted Feb 26, 2002
Authored by Gerhard Buergmann

BVI v1.1.1 is an editor for binary files using common vi - commands and additional commands for binary search and substitution.

Changes: Bug fixes and updates.
SHA-256 | c94dbfa293cbc61b8571d025e90fd1f06a34f8d4e5b11a59856bfc1f13014de3
sortelnetd.tgz
Posted Feb 26, 2002
Authored by Sorbo

Sortelnetd is a working telnetd 0.17 exploit (even remote if you are careful enough). alignment is critical. Includes a demo of how to find offsets and use against localhost.

tags | exploit, remote
SHA-256 | 6e643b30e9635a5e3b22d1113b59356de6894ddf8033ed508db6d01f8a7808f3
mieliekoek.pl
Posted Feb 26, 2002
Authored by Roelof Temmingh | Site sensepost.com

Mieliekoek.pl is a SQL insertion crawler which tests all forms on a web site for possible SQL insertion problems. This script takes the output of a web mirroring tools as input, inspecting every file and determine if there is a form in the file.

tags | web
systems | unix
SHA-256 | fe1bfe7f6e6e16ac4c2fcbed336c09b562bbbe5cb6b8556bfdf043b0c7344cff
CA-2002-04.ie-overflow
Posted Feb 26, 2002
Site cert.org

CERT Advisory CA-2002-04 - Microsoft Internet Explorer contains a buffer overflow vulnerability in its handling of embedded objects in HTML documents. This vulnerability allows attackers to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message. This bug was discussed in MS02-005.

tags | web, overflow, arbitrary
advisories | CVE-2002-0022
SHA-256 | 9a86954b827531979248410932ae6b826879622ef9498d4d64c93d6d37982945
mirc_security.htm
Posted Feb 26, 2002
Authored by Joe S

A paper in mIRC security.

SHA-256 | 90a2207d0d828df429e655944406fbc25002e8d8c14bbe55d716c17f03e9ade0
chap.pdf
Posted Feb 26, 2002
Authored by teso, Sebastian Krahmer | Site team-teso.net

Weaknesses in the CHAP protocol as used within PPP and PPTP. Allows authentication in PPTP networks without knowing valid login/password combinations. This authentication scheme is widely used at universities (WLAN networks). A link to a special pppd which is able to authenticate without valid /etc/ppp/chap-secrets is included.

tags | protocol
SHA-256 | a57abb2faae0727b81e1510955840c818aed9a508d24a18b84c7c47e18cd0da4
NetStumbler_0_3_23.zip
Posted Feb 26, 2002
Site netstumbler.com

NetStumbler is a Windows utility for 802.11b based wireless network auditing.

tags | tool, wireless
systems | windows
SHA-256 | c27225ba4264acde0d6ea5ab87765dc3481c0a71598cd2219ffa5d54825d6786
ApSniff.exe
Posted Feb 26, 2002
Site bretmounet.com

ApSniff is a wireless (802.11) access point sniffer for Windows 2000. It enables you to list all access points broadcasting beacon signals at your location. Useful for helping you set new access points making sure you do not have interfering APs, and helping you set-up wireless clients by providing you with the client configuration information. Requires WLAN cards of Prism 2 chipset. It works with a DLINK DWL-650 and linksys WPC11.

tags | tool, wireless
systems | windows
SHA-256 | a21ff12cd0f685ecb6beedee3258a44546d209435187179a19c1cace86d71521
kismet-1.4.1.tar.gz
Posted Feb 26, 2002
Authored by Mike Kershaw | Site nerv-un.net

Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, and Secure SUID behavior.

tags | tool, wireless
systems | cisco, linux
SHA-256 | 650217f643c0fcd7692ecb59ff0d20b1c0ba84ae2af7abb9eac15f01dd14ed1b
Page 1 of 5
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close