what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 161 RSS Feed

Files Date: 2002-05-01 to 2002-05-31

Open-Net-Free-LNX-sh.c
Posted May 25, 2002
Authored by Zillion | Site safemode.org

This is Intel shellcode that does an execve of /bin/sh and works on OpenBSD, NetBSD, FreeBSD and Linux. More information can be found here.

tags | shellcode
systems | linux, netbsd, freebsd, openbsd
SHA-256 | f4c43ae66ec56a546fd302bf5e8a101723bcc899e973aec9b3341bacc7c05e60
Wellenreiter-v13.tar.gz
Posted May 25, 2002
Authored by Team Remote-exploit.org | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: Bugfix - BSD port integration has broken ad-hoc detection. Added wifi0 device support (For newer cisco drivers), BSD Cisco cards now work well with the new ancontrols. Updated the config script better matching of the cisco bsd drivers. Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | e0a7d974fecd991d9ef2ec06c996d5cee7d1b9fa571bbd7a2697a303a34853a5
suse.dhcpd.txt
Posted May 24, 2002
Authored by SuSE Security, FJ Serna | Site suse.com

SuSE Linux Security Announcement SuSE-SA:2002:019 - ISC DHCPD v3.0 to 3.0.1rc8 is vulnerable to a remote root format string bug attack when reporting the result of a dns-update request. This affects SuSE distributions based upon 7.2, 7.3 and 8.0.

tags | remote, root
systems | linux, suse
SHA-256 | f689ab8829be49e2e200eda31af2d7bc7329c4feb1a4cc87cf59afb317e1112c
cisco-ip-telephone.txt
Posted May 24, 2002
Site cisco.com

Cisco Security Advisory - Multiple Vulnerabilities in Cisco IP Telephones. Bugs found in the Cisco IP Telephones can result in denial of service conditions and allow unauthorized access to the configuration settings of the Cisco IP Phone models 7910, 7940, and 7960.

tags | denial of service, telephony, vulnerability
systems | cisco
SHA-256 | dd0911b414f95a26e4d9aee568de32cb04390ea61ff26de79b9c52d60d61fa83
MDKSA-2002:033
Posted May 24, 2002
Authored by Mandrake Linux Security Team | Site mandrakesecure.net

Mandrake Security Advisory MDKSA-2002:033 - A vulnerability found in all versions of Webmin prior to v0.970 allows remote users to login to Webmin as any user. The affected Mandrake versions are 7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1 and Single Network Firewall 7.2.

tags | remote
systems | linux, mandrake
SHA-256 | 7b53ede13b33631621686fe27cf7981287d076bdaa27520dcebdca3a089ccfac
boegADT_beta-1.0.tar.gz
Posted May 24, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

BoegADT is a unix-based library which attempts to make it easy to write buffer overflow exploits. Uses the GNU debugger and perl. Tested on RedHat, Slackware, and Solaris.

tags | overflow, perl, library
systems | linux, redhat, unix, solaris, slackware
SHA-256 | 73dd16b8129243a412998c7e54f1bc2f3f7d4c0044c82b44ac7c1247483b5af1
lcrzoex-4.10-src.tgz
Posted May 24, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Bugs and memory leaks fixed.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | a384a45ce71daec1fdd7e64ad261d5f740002055695451abe6d04c6f9a2e334d
servletexec-4.1.txt
Posted May 24, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

NewAtlanta ServletExec ISAPI v4.1 contains three vulnerabilities. Remote users can read any file in the webroot, crash the server, and display the physical path of the web root. Patch available here.

tags | exploit, remote, web, root, vulnerability
SHA-256 | fc28cc03d24fa98eb266f32deaf3daa32abc63bfc958831609ba5849b34c2d4a
raccess-0.7.tar.gz
Posted May 24, 2002
Authored by Angel Ramos | Site salix.org

"Remote Access Session" is a security tool to analyze the integrity of systems. The program tries to gain access to a system using the most advanced techniques of remote intrusion. It can either work in normal mode (which is fast) or hard mode (which is more intensive). There is a big difference between "Remote Access Session" and other remote security audit tools as "Nessus" or "Internet Scanner" - If "Remote Access Session" finds a remote vulnerability that gives a user account or root, it will try to exploit it and it will return a shell. In my honest opinion, this is the only way to discard false positives of remote vulnerabilities, and the only way to demonstrate that the danger is real to upper management. "Remote Access Session" is not a hacker tool. It has been designed for system administrators and security engineers, and does not attempt any kind of stealth.

Changes: Ported to BSD and Solaris, added network scanning mode, improved performance, and ported some of the exploits.
tags | tool, remote, shell, root, scanner, vulnerability
systems | unix
SHA-256 | df48138333e674aea7b76f00ca67fccae74af9972ddd421c1c959ea2aaa34a50
neatdocs.tgz
Posted May 24, 2002
Authored by Mixter | Site 1337.tsx.org

NEAT is a script language driven exploit/vulnerability management tool that does active penetration testing. This is a pre-release with documentation and code snippets. NEAT is similar to raccess but is more sophisticated.

SHA-256 | 3504b18ed44995a578ca6d94d649f0788ec9ab3b7e95519729b758e51dae3931
Next Generation Security Advisory 2002.3
Posted May 24, 2002
Authored by FJ Serna, NGSSoftware | Site ngsec.com

Next Generation Advisory NGSEC-2002-3 - Sun Solaris in.talkd is vulnerable to a remote root format string bug. An attacker can request a talk session with a especially crafted user field able to write memory and gain control of the flow of the in.talkd.

tags | remote, root
systems | solaris
SHA-256 | 7fa8d1d538e9e06e7e46c09cb39e2c8630bd909c9fbb9f637606a8b0e9b96d44
Wellenreiter-v12.tar.gz
Posted May 24, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and auditing of 802.11b wireless networks much easier. It has an embedded statistics engine for the common parameters provided by wireless drivers, enabling you to view details about the consistency and signal strength of the network. Its scanner window can be used to discover access-points, networks, and ad-hoc cards. Records the network location with GPS support. Wellenreiter works on handhelds that can run GTK/Perl and Linux/BSD (such as iPaqs). All the major wireless cards are supported. Random MAC switching when joining a wireless network hides your real MAC to the access point, a unique feature.

Changes: Added a "Wellenreiter on ipaq howto", added an export menu item to save scans as a gpsdrive waypoints file, comma delimited text file, or netstumbler format, added the possibility to force the scannerwindow to stay on one channel, and much more. Full changelog available here.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | c516ea342b2470327fe3ac93c60d52d7e904708f1d0b9311e7cf6162147c1290
sql_injection_walkthrough.txt
Posted May 23, 2002
Authored by sk | Site scan-associates.net

SQL Injection Walkthrough - SQL injection attacks web applications by submitting raw SQL queries as input. Includes what to look for, how to test if a page is vulnerable, how to execute commands remotely, how to see the output of your SQL query, how to get data from the database using ODBC error messages, how to update/insert data into the database, and how to avoid SQL Injection.

tags | paper, web, sql injection
SHA-256 | ced0750fc6f0dfd8830e55f1c3c127b377e1c9c68ad6037544ff0d4fc23fcfb7
ms02-024
Posted May 23, 2002

Microsoft Security Advisory MS02-024 - A local vulnerability in the Windows debugging facility allows attackers to run code with OS privileges. Microsoft patch available here.

tags | local
systems | windows
SHA-256 | 5547c6f3859b824b8a4213127f9b6b9203a6830d5795fbcd63fbbafbe6313e81
openssh-3.2.3p1.tar.gz
Posted May 23, 2002
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Since 3.2.2 - Fixed solaris compile bugs. Since 3.1: Fixed local root buffer overflow in Kerberos/AFS token passing, fixed overflow in Kerberos client code, sshd no longer auto-enables Kerberos/AFS, experimental support for privilege separation (sshd user), only accepts RSA keys of size SSH_RSA_MINIMUM_MODULUS_SIZE (768) or larger. Full changelog available here.
tags | encryption
systems | linux, openbsd
SHA-256 | d174362c465c6f109a2cafdd0ae9f76735c54f127928d763ba238ad0ba2aef1c
rarpd.solaris.txt
Posted May 22, 2002
Authored by David Reign

Rarpd is a reverse arp protocol for small to medium sized networks. The solaris implementation (in.rarpd) contains 3 remotely exploitable buffer overflows, 2 locally exploitable, and 2 cases of format string exploitability.

tags | overflow, protocol
systems | solaris
SHA-256 | 6012d6c0831d4d98d3a886dd7b90613b1a149d31b15c57e57b27be57f8d13530
talkd.format.txt
Posted May 22, 2002
Authored by Gobbles Security

A format string vulnerability exists in most talkd implementations. Talkd included with older linux netkits (like 0.9) and KDE 1-3 is vulnerable.

systems | linux
SHA-256 | 67132c71bf40f1f14f838751c0a29f131e04091274bdab696790d6a9c56fb48a
aix-execve_bin-sh.c
Posted May 22, 2002
Authored by Georgi Guninski | Site guninski.com

AIX shellcode that does an execve() of /bin/sh.

tags | shellcode
systems | aix
SHA-256 | b148fe51945518e8a42791b283e7d596af3c65b818e4827df4c53d3d8dd094db
irix-mips-bind.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

364 byte MIPS/Irix PIC port binding shellcode (source included)

tags | shellcode
systems | irix
SHA-256 | c46107fcb5c7497a3d6dd32bc368da7cc825324bae592dbed4b55090d2e2f813
irix-bin-sh.c
Posted May 22, 2002
Authored by scut | Site team-teso.net

68 byte MIPS/Irix PIC execve shellcode (source included)

tags | shellcode
systems | irix
SHA-256 | 6d61eb0821d6cdc026bbc6ae30e9581bf9cef4c2446a60a4aa61309df60b9559
FreeBSD-SA-02_25.bzip2.asc
Posted May 22, 2002
Authored by FreeBSD Security Team | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:25 - When creating a file during decompression, the bzip2 utility failed to use the O_EXCL flag, potentially overwriting files without warning. In addition, the bzip2 utility did not securely create new files causing a race condition between creating the file and setting the correct permissions. This affects FreeBSD 4.4-RELEASE, 4.5-RELEASE and 4.5-STABLE.

systems | freebsd
SHA-256 | 61a03672b8c6201ef7f09f33f3e3ba8776ccb3407ba2940e81a260842fc3ce44
FreeBSD-SA-02_24.k5su
Posted May 22, 2002
Authored by FreeBSD Security Officer Team | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:24.k5su - The k5su utility fails to limit super-user access to the 'wheel' group. This affects FreeBSD 4.4-RELEASE, 4.5-RELEASE and FreeBSD-STABLE (prior to 2002-05-15).

systems | freebsd
SHA-256 | cd2d905c9a1378b575c156931f665f64c3a4ddbdf627509dc912c87805cb8e7e
apache-stronghold-search.txt
Posted May 22, 2002
Authored by Tamer Sahin | Site securityoffice.net

The 'search' CGI utility that comes with the Red Hat Apache-based Stronghold Secure Web Server reveals local path information.

tags | web, local, cgi
systems | linux, redhat
SHA-256 | 428d7364046869ed56448283acf64a6cba01e1581c8675760fe1971235913922
eSO-5063.txt
Posted May 22, 2002
Authored by Kevin Kotas | Site eSecurityOnline.com

eSO Security Advisory 5063 - The gettransbitmap CGI, which is part of the AnswerBook2 Documentation Server, contains a remote exploitable buffer overflow. This vulnerability affects Sun AnswerBook2 version 1.4, 1.4.1, 1.4.2 and 1.4.3.

tags | remote, overflow, cgi
SHA-256 | f192b1acbf3f1b88a8cd9bcd90d75cfc8be19e5bdf71d9fca9e2cdcf619082b2
nextel.auto-answer.txt
Posted May 21, 2002

New nextel phone's auto answer feature is being used as a bug.

tags | telephony
SHA-256 | df8cef0a7972634f7942772a370a80b7759e927d142d8af47d53234858b96e4c
Page 2 of 7
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close