exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 90 RSS Feed

Files Date: 2002-03-01 to 2002-03-31

ethereal-0.9.3.tar.gz
Posted Mar 30, 2002
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here. Lots of bugs were fixed, and new dissectors added.

tags | tool, sniffer, protocol
systems | unix
SHA-256 | b6e7ef623567c1c8ccf3f2898f2727b7b5862eaf9c000f6299bc4baba19a0fb6
StMichael_LKM-0.10.tar.gz
Posted Mar 30, 2002
Authored by Tim Lawless | Site sourceforge.net

StMichael is a LKM that attempts to detect and divert attempts to install a kernel-module backdoor into a running linux system. This is done by monitoring the init_module and delete_module process for changes in the system call table. Detects most modern LKM's, including KIS.

Changes: Really Immutable filesystem support for ext3 fs added, Added in Kernel Licensing Code to Identify the Kernel License for newer kernels, Backup kernel is now obscured from string searches using the weak crypt function, Added needed modifications to support the newer Alan Cox Kernels, with the different VM system, fixed lots of compilation issues, and better docs.
tags | kernel
systems | linux
SHA-256 | 3cadd9c000f7abda3f802cd86a8bb3e997005480eea923b062032b96f0c4b9e4
ms02-015
Posted Mar 29, 2002

Microsoft Security Advisory MS02-15 - A cumulative patch for all versions of IE - 5.01, 5.5 and IE 6 has been released which eliminates two new serious vulnerabilities. The vulnerabilities include a bug in the handling of object tags that allows attackers to invoke an commands on the user's machine and a bug in the zone determination function that allows a script embedded in a cookie to be run in the Local Computer zone. Microsoft FAQ on this issue available here.

tags | local, vulnerability
SHA-256 | 51dbaac63d58cad3cee2fc7322e91939f598b35a02807aeb0b638fb34e9fc725
osshchan.tgz
Posted Mar 29, 2002
Authored by Morgan

OpenSSH 2.9p* channel_lookup() off by one exploit. Tested against SuSE Linux 7.2 and FreeBSD 4.5-STABLE with OpenSSH 2.9p1 and p2. Based on OpenSSH-2.9p2 source.

tags | exploit
systems | linux, freebsd, suse
SHA-256 | 22f4b5d77a8fba07b61ee6032eb4ea27d2d0c10191a7560bcd18f267581e391e
lcrzoex-4.07-src.tgz
Posted Mar 28, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Fixes to lcrzo_sock_udpmulser_virt and lcrzo_sock_udpmulser_real, and other minor changes.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | 00f44048f428ba032dff9e70ee7ea7954f3f28e8e54f3b6bacb39cf976602fd8
FreeBSD Security Advisory 2002.19
Posted Mar 28, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:19 - The squid port prior to version 2.4_9 contains a heap overflow in the DNS processing which can be triggered by a DNS server.

tags | overflow
systems | freebsd
SHA-256 | 91374848fc4b60fd302d3d9e64d7e72562eb90b13c72f4cc24abe1d05f5dc737
monitoring-Mar-25-2002.tar.gz
Posted Mar 27, 2002
Authored by Patrick Duane Dunston

Monitoring Network Traffic with Dsniff - This is a practical step by step guide showing how to use Dsniff, MRTG, IP Flow Meter, Tcpdump, NTOP, and Ngrep, and others. It also provides a discussion of how and why we should monitor network traffic. Updated version, sgml format.

tags | paper
SHA-256 | edd89b74591c728b4872e0185e8d21cbdb96806ba07651c32d7279a7b6f4b6c7
sp_quickill.zip
Posted Mar 25, 2002
Authored by Roelof Temmingh | Site sensepost.com

Sp_Quickkill scans internal networks for unpatched windows machines, IIS and SQL.

tags | exploit
systems | windows
SHA-256 | 78941018e6b74e5b871aa2d827e2f6b63074c8d472f41191cea1da645ff22ae5
icmpchat-0.3.tar.gz
Posted Mar 25, 2002
Authored by Martin J. Muench | Site codito.de

ICMP-Chat is an encrypted console chat program that uses ICMP packets. ICMP-Chat uses enigma (crypt) for encryption. It is a peer-to-peer chat program that enables you to hide your chat or to chat through many firewalls.

Changes: any new features and major bugfixes. The domain has changed.
systems | unix
SHA-256 | 427e8470689b61abb30fa88a5411009fb27417096d752b1c93ffc7cf67d43538
Nmap Scanning Utility 2.54 BETA 31
Posted Mar 23, 2002
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: ICMP Timestamp and Netmask ping types have been added, fixed "grepable output" (-oG), mysterious and undocumented --scanflags option has been added, several Window bugs were fixed, new fingerprints were added, the nmap-services file was updated, and several bugs were fixed.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | c890b840c691500d24fb0ad016094bc0febf29b5c5be513b07f434a3f4a35dce
libsafe.bypass.txt
Posted Mar 23, 2002
Authored by Wojciech Purczynski | Site isec.pl

Libsafe protection against format string exploits may be easily bypassed using flag characters that are implemented in glibc but are not implemented in libsafe. Example exploit code included. Libsafe v2.0-12 fixes the issue.

SHA-256 | 67243630ffbf72dec1fb961dd0c2684be8255858ba9eac121ed463abc80f0bb6
nokia.realsecure.6.0.txt
Posted Mar 23, 2002
Authored by Hellnbak | Site nmrc.org

RealSecure Network Intrusion Detection (NIDS) Version 6.0 running on Nokia appliances contains a test system named "starscream" and test user "skank" left behind in the ISS.ACCESS file as a KeyManager. This information can be used to push new pubkey files to the sensor, reconfigure or take control of the NIDS daemon and daemon components if a backend network is not used to communicate with the sensors.

SHA-256 | 07ec7f7965b75739f31547fee37531ee6330d10d0f530169089399a0f10a588a
xpede.txt
Posted Mar 22, 2002
Authored by Gregory Duchemin

Intellisol Xpede v4.1 and 7.1 contains two remote vulnerabilities which disclose user passwords. Workaround information included.

tags | remote, vulnerability
SHA-256 | 81eb0c2ecc2614795ed95d5aecf4f16515e453e55ce6b04b45dccc19776c3a69
NBTEnum21.zip
Posted Mar 22, 2002
Authored by NTSleuth | Site ntsleuth.0catch.com

NetBIOS Enumeration Utility v2.0 is a utility for Windows which can be used to enumerate NetBios information from one single host or an entire class C subnet. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, and shares. This utility will also perform password checking with the +use of a dictionary file. Runs on Windows NT 4.0/2000/XP.

Changes: Bug fixes.
tags | local
systems | windows
SHA-256 | 1a0604d365af6682cb21ff972d6f0f6f79f6419f83f296a21e5fe08350782abb
Apache.Win32.txt
Posted Mar 22, 2002
Authored by Ory Segal

A vulnerability in the way the Windows versions of Apache parses batch files with cmd.exe allows remote users to execute commands on versions of Apache prior to 1.3.24 and 2.0.29-BETA. Exploit URL's included.

tags | exploit, remote
systems | windows
SHA-256 | 293d2a9d77d21cac81c421a084f317df315b0f00bb4b83525632187f46a03f22
DLA-18-03-2002.txt
Posted Mar 20, 2002
Authored by Gollum

Microsoft posted a security bulletin on this (ms99-040) way back in September 28, 1999; it is still exploitable if the html file is run from the users local disk and not from a webserver or file-share.

tags | exploit, local
SHA-256 | 8ffd9671f0b9be7cb6bdf03ca7f71dbd7b5e1f5919523c3959581dcf7e7832de
IIS Unicode Strings
Posted Mar 20, 2002
Authored by Daniel | Site bastardo.de

IIS unicode strings.

tags | exploit
SHA-256 | 9349adb2a527c9a62ec3abae3b5c92f0f8b520e4a61ff2ef6b00e79a53220782
onesixtyone-0.3.tar.gz
Posted Mar 20, 2002
Authored by Solar Eclipse | Site phreedom.org

onesixtyone 0.3 is an efficient SNMP scanner which utilizes a sweep technique to achieve good performance. It finds SNMP devices on your network and brute-forces the community strings using a dictionary. It is possible to scan a class B network (65536 ip addresses) in under 13 minutes with a high degree of accuracy. Tested on Linux, FreeBSD, OpenBSD and Solaris.

Changes: This release includes portability enhancements.
tags | tool, scanner
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 0baedfe247ea6e07cb88efdc67ca4e7a47bf6457a6de0a5cb0cc8f3851085203
Wellenreiter-v08.tar.gz
Posted Mar 20, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).

Changes: Added WEP enabled / disabled detection. WEP encrypted enabled access points now get a different icon coloring that non WEP enabled ones. Real access points got different icons than AD-Hoc stations that do the broadcasting. Added a battery monitor window. Enhanced the scanner window performance. Fixed the problem of adding of access point in the tree outside the channels.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | b40851db96e46b4817e4d858df01930ebfc9ab68ce7d8225f0429584dcf000e8
xscreensaver-4.02.tar.gz
Posted Mar 20, 2002
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Fixes for a few minor memory leaks, new hacks (cubenetic and fluidballs), new versions of pipes, glplanet, bsod, forest, and bumps, and better FPS computation in the GL hacks.
tags | root
systems | unix
SHA-256 | 02dd9db7b5e15b34e9d9cdadb26be5cdc30cc092d00da2035add0ea94b9189c5
mod_protection-0.0.2.tar.gz
Posted Mar 20, 2002
Authored by twlc, Yaroze | Site twlc.net

Mod_protection is an apache module that integrate basic function of an IDS (intrusion detection system) and of a firewall (just an emulation for now). Your apache administrator have only to install mod_protection and define rules. A normal NIDS can't check SSL protected traffic, where mod_protection can. When a malicious client sends a request that matches on your rules the administrator will be warned and the client gets a user defined page or a error or warning.

Changes: Three new directives - BlockTime, PairAlert, and PairAlertMatch. Blocktime does firewall emulation. Updated docs. Rules are now in an external file.
SHA-256 | e1ff421a590fe6e6835781223069f929d55a39f49c486e2db9671f201e81005e
ipsorc-1.4.4.tar.gz
Posted Mar 20, 2002
Site legions.org

IP Sorcery is a TCPIP packet generator which allows you to send TCP, UDP, and ICMP packets with a GTK+ interface.

Changes: Added the ability to the console version to specify number of packets to send. Many cool feature enhancements were added.
tags | udp, tcp
systems | unix
SHA-256 | b00cf5a126db1e3db6f69c581645a5df3895b0d757e4d32ef93ca286a31e8324
lcrzo-4.06-src.tgz
Posted Mar 20, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Added support for serial line modems, the ability to spoof without having to specify an IP option (tools 298-307), the ability to create UDP/TCP clients/servers without having to specify an IP option (tools 308-315), TCP/UDP/ICMP traceroute at the IP level (tools 316-18), ICMP/TCP ping at the IP level (tools 319-20), TCP/UDP/ICMP scans at the IP level (tools 322-4), and the ability to edit binary files (tools 325-6) were added. Files not being renamed when the input and output files were the same has been fixed (tools 149-50).
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | 05d1c24027df852d16c16f0fe79d4eb4e0bf7e5c62a8a00dd50059716a829429
fbsd.tgz
Posted Mar 20, 2002
Authored by Nyo, Jade

FreeBSD rootkit precompiled binaries for 4.2-RELEASE.

tags | tool, rootkit
systems | unix, freebsd
SHA-256 | 3af1773776a476c441374927e24c556a578e2d6ed99f92f5b4f875f62c395399
Samhain File Integrity Checker
Posted Mar 20, 2002
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Fixes a compile error with --enable-xml on non-Linux systems and a problem with the hiding kernel module on new Linux kernels has been fixed (files were hidden, but the samhain process was visible).
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | f153a0f8c56156a595ef745a1525915403f8cc4f7379bd5f7c24d166f5afd814
Page 1 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close