what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 157 RSS Feed

Files Date: 2002-06-01 to 2002-06-30

xscreensaver-4.05.tar.gz
Posted Jun 13, 2002
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock and has more than 150 modes.

Changes: Fixed the configure problems that were introduced with the Gtk-2.x support in the last release. Added a new GL hack, "endgame".
tags | root
systems | unix
SHA-256 | eea036fc9ca7808a03160267f4bd4d26f2a94a3e832ca55fa1175905c62ae4be
fenris-0.7b.tgz
Posted Jun 13, 2002
Authored by Michal Zalewski | Site razor.bindview.com

Fenris is a multipurpose tracer, stateful analyzer and partial decompiler intended to simplify bug tracking, security audits, code, algorithm, protocol analysis and computer forensics by providing a structural program trace, general information about internal constructions, execution path, memory operations, I/O, conditional expression info, and much more. A small demonstration how this tool works can be found here.

Changes: Repaired syscall breakpoint functionality in Aegir, problems on RedHat 7.3, and made some minor fixes.
tags | protocol
SHA-256 | 447932c5e732d97ca339be5ddc5f94b42a695561b36cbd93615154bb8cd4e733
morpheus.tar.gz
Posted Jun 13, 2002
Authored by Gabriel Maggiotti | Site qb0x.net

Morpheus request share files denial of service exploit. Ported to Cygwin by Luigi Grandini

tags | exploit, denial of service
SHA-256 | ffc476b90e9c53aacd410867129ca28b410dec076d56ea21751f205cba44b39c
execiis.tar.gz
Posted Jun 13, 2002
Authored by Filip Maertens | Site vorlon.hexyn.be

Execiis.c is a remote exploit for Bugtraq ID 2708 - Microsoft IIS CGI filename decode error. Ported to Cygwin by Luigi Grandini

tags | exploit, remote, cgi
SHA-256 | 41e56d9794973e1c019e15f98d3bc785395e501be437d345c64524ff25a8d55e
rdC-cfingerd.tar.gz
Posted Jun 13, 2002
Authored by venomous | Site rdcrew.com.ar

Cfingerd prior to v1.4.3 remote root exploit for linux/x86. Exploits a format string vulnerability in the syslog() call. Ported to Cygwin by Luigi Grandini

tags | exploit, remote, x86, root
systems | linux
SHA-256 | 001eab558ecb8deaea5ecfd0cb633b3f88ddc7ca656b976fb86de7009f824ec4
eeye.htr2.txt
Posted Jun 13, 2002
Authored by eEye Digital Security | Site eEye.com

Eeye Advisory - IIS 4.0 and 5.0 for Windows NT and 2000 contain a remotely exploitable heap overflow which allows remote code execution. The bug is in transfer chunking in combination with the processing of HTR request sessions.

tags | remote, overflow, code execution
systems | windows
SHA-256 | 48ccb83f54a8646059f912592e5f6d519b887ca5833838d10ec76f21014b6fa0
mysniff-1.0.tar.gz
Posted Jun 13, 2002
Authored by Ighighi

Mysniff is a libpcap sniffer with RC4 encryption. It sniffs the first 128 bytes of data sent to ftp / telnet / pop2 / pop3 / imap & rlogin servers, therefore revealing the logins & passwords used.

tags | tool, sniffer, imap
SHA-256 | 31d07614c6db216761d571488cd56ba9006a9b15466be23101f8ff713dcf3cc5
ircit-3.1.txt
Posted Jun 13, 2002
Authored by Gobbles Security | Site bugtraq.org

Gobbles Security Advisory - IrcIT v3.1 and below contains remotely exploitable buffer overflows.

tags | overflow
SHA-256 | 97ee352d2d7fd9fa4acd8cc8a695704a73bac3426eeff5e2abf032545734f145
ora-reports.txt
Posted Jun 13, 2002
Authored by David Litchfield | Site ngssoftware.com

The Oracle 9iAS Reports Server contains a remotely exploitable buffer overrun vulnerability in one of its CGI's. By supplying an overly long database name parameter to the rwcgi60 with the setauth method, an attacker can run code with the privileges of the web server, or SYSTEM on windows.

tags | web, overflow, cgi
systems | windows
SHA-256 | 36a7f0df817729ef91da8556ccad29083ab8e3a5fd0b1f644b31ce787342fffa
ora-lsnr.txt
Posted Jun 13, 2002
Authored by David Litchfield | Site ngssoftware.com

The Oracle TNS Listener version 9i contains a buffer overflow vulnerability which can be exploited over tcp port 1521 to gain remote SYSTEM / root access. By supplying an overly long SERVICE_NAME parameter an attacker can execute code before any logging is done.

tags | remote, overflow, root, tcp
SHA-256 | 09848a3033d275f59cf4d5ef91914e928a9a4fc43a64f46b30fa0e2a771e35d4
hydra-2.1.tar.gz
Posted Jun 13, 2002
Authored by thc | Site thc.org

THC-Hydra is a parallized login hacker which understands FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, Socks5, PCNFS, samba, cisco enable, LDAP, and more. Includes SSL support. Hydra is now included in Nessus.

Changes: Added Samba, Cisco enable and LDAP support.
tags | web, cracker, imap
systems | cisco
SHA-256 | 18cf489547d06c85e5e7d6050ff0246134c609950137697f81a4716bd421c97a
Nfree13A3.zip
Posted Jun 12, 2002
Authored by Svoern | Site u-n-f.com

Alabaster can be used for displaying info and repairing Nokia mobiles. It is also a good start for research purposes. With this tool you can do the following things: - Calculate and list all known EEprom-, MCU-, PPM- and PMM-checksums, Show a lot of information about the mobile, Find and change the security code and calculate valid checksum, Refresh the 5 times wrong entered Security code Counter.

tags | telephony
SHA-256 | a73c46377a6c15d112db7a9ee18ce3ee5b61a2ee10f0279eb7e766955e1c4d94
voodoo2.tar.gz
Posted Jun 10, 2002
Authored by Boldface | Site u-n-f.com

Libvoodoo is a library which makes heap overflow exploitation much easier by providing the user with valuable internal data from Doug Lea's malloc implementation.

tags | overflow
systems | unix
SHA-256 | e274dfba0e81145fc3e527f0290479ba8d0b4017f43c253485565eadfcddc737
firestorm-0.4.4.tar.gz
Posted Jun 10, 2002
Site scaramanga.co.uk

Firestorm is an extremely high performance network intrusion detection system (NIDS). Right now it is just a sensor but there are plans are to include real support for analysis, reporting, remote console, and on-the-fly sensor configuration. It is fully pluggable and hence extremely flexible.

Changes: Added TCP stateful inspection, a 'fragoffset' matcher and the 'stateless' keyword were added. Bugs were fixed.
tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 413531f0f7243e2724d71676c03fbf9b47af092a2f751989ff4dc43ec6213d68
d7-awu260.c
Posted Jun 10, 2002
Authored by Smurfy

WuFTPd 2.6.0 Mass Rooter. Exploit code used from wu260 exploit by God- of efnet.

SHA-256 | c3782f9af2c3a26d2718ae45ef915b943c9f7346b0fafd73c5d57d99e2becc3b
HexView Security Advisory 2002-06-02.01
Posted Jun 10, 2002
Authored by HexView | Site sgi.com

SGI Security Advisory 20020602-01-I - "MediaMail" and "MediaMail Pro (/usr/binX11/MediaMail) can be caused to dump core when passed certain user-supplied arguments. Since it is setgid mail, the core dump can be exploited in several ways.

advisories | CVE-2002-0358
SHA-256 | 5ccb902fd1c5669a7201417a5c2470d5e7b7e6963fadec467cdb57ed27b596a2
jvm-1.3.crash.txt
Posted Jun 10, 2002
Authored by Marc Schoenefeld

This simple java program crashes the VM (at least 1.3.1-b24) on W2K, and is another example of Java-Frontier Bugs.

tags | exploit, java
SHA-256 | 6f26c966da14268cd5e14f4a814470f95cfd0613135a33dbef76e8ce95c142f9
blackice.3.1.txt
Posted Jun 10, 2002
Site kpmg.dk

The BlackICE Agent v3.1 for Windows 2000 laptop can be bypassed. Fix available here.

systems | windows
SHA-256 | 29b2801570bed5f11b3e08f1b8cf265e4a34f19dc275214fdca91d363501156f
count.tar.gz
Posted Jun 8, 2002

Linux/x86 remote exploit for Count.cgi. Ported to Cygwin by Luigi Grandini

tags | exploit, remote, x86, cgi
systems | linux
SHA-256 | 13c02118daa0fb30122c7a68cd1e69217701c5d125658809ba7514a17e8b2c7a
pm-exploit.tar.gz
Posted Jun 8, 2002
Authored by Headflux | Site synnergy.net

Plusmail remote exploit - plusmail fails to check authenticity before creating new accounts.

tags | exploit, remote
SHA-256 | c91855e474729b7e0528d2d0e88f929517bae5ee5a8ffd85d285f9e3dfd35ab1
iip1.1-rc1.tgz
Posted Jun 8, 2002
Authored by Guns | Site invisiblenet.net

The IIP (The Invisible Irc Project) is a Three-tier distributed network designed with security and anonymity as the first and foremost goal. Uses Diffie-Hellman & Blowfish encryption as well as traffic padding, chaffe data, and constantly rotating session keys.

systems | unix
SHA-256 | 2f24eb49ea4cdcd6437c76255a2a05f7cb31a731022801015ca66d7206716455
ciscokill.c
Posted Jun 8, 2002
Authored by Kundera | Site dskull.tzone.it

Ciscokill.c sends a spoofed snmpv1 get request which causes reboots on Cisco 2600 routers with 12.0(10).

tags | exploit, spoof
systems | cisco
SHA-256 | ec3ae16dfb5ecb45ca630f5942d5fd7175220677bc2756cd50903b844a14d54e
SUN MICROSYSTEMS SECURITY BULLETIN: #00219
Posted Jun 6, 2002
Site sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, vulnerability
systems | solaris
SHA-256 | 22fdfce6fa5d9c43f7504d2a9b229347eaec482153e7d0460cc072515982aa45
dica.tgz
Posted Jun 6, 2002

Dica is a rootkit found in the wild. Looks like a t0rn variant. Thanks to Rob Hock

tags | tool, rootkit
systems | unix
SHA-256 | 6a4f7fe667c1c3972f22cadfb269f466dadf4893bae77f0001cbc7a4ed29e959
icmpchat-0.4.tar.gz
Posted Jun 6, 2002
Authored by Martin J. Muench | Site codito.de

ICMP-Chat is an encrypted console chat program that uses ICMP packets. ICMP-Chat uses enigma (crypt) for encryption. It is a peer-to-peer chat program that enables you to hide your chat or to chat through many firewalls.

Changes: Minor Bug Fixes!!!
systems | unix
SHA-256 | 0f9964993c2518a2dcc320034e31c6c93e855c735650132bec8573d354382076
Page 3 of 7
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close