Exploit the possiblities
Showing 101 - 125 of 157 RSS Feed

Files Date: 2002-06-01 to 2002-06-30

THC Secure Deletion v2.3
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Secure Deletion v2.3 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: Bug fixes.
systems | unix
MD5 | 68ca1ec39b9f6b560214a4214664fc4c
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.1 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security.

tags | spoof
MD5 | 37e6c8de8034e8f55db18251d9810fc7
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.3 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Rewrote the GPS data gathering function. Fixed lots of bugs!
systems | linux
MD5 | 0f9ac16de64a6f49c968adbaefe9524f
Posted Jun 4, 2002
Authored by thc | Site thc.org

THC-Hydra is a parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, PCNFS, and more). Also included Socks5 and SSL support.

tags | web, imap
MD5 | d3a57c972d4a1281848dab60ae6985e1
Posted Jun 4, 2002
Authored by Jonas Blowfish | Site digital-root.com

NewAtlanta ServletExec ISAPI 4.1 remote denial of service exploit.

tags | exploit, remote, denial of service
MD5 | 5ec336e63788dfa7779e9756557c3177
Posted Jun 4, 2002
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 900 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: More CVE cross references, added more vulnerability checks, and fixed bugs.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
MD5 | 62b615a402750d844d95c933d299ee15
Posted Jun 4, 2002
Site airsnort.shmoo.com

Airsnort is a tool for wireless lans which recovers encryption keys by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Works on both 40 and 128 bit encryption. Many weaknesses in the WEP 802.11 protocol are discussed here. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second. Tested on Linux kernel v2.4.

Changes: Now uses libpcap. Supports more cards. Now can read pcap dump files. Cracking is attempted in parallel with capture. There is no need to guess whether you have enough packets to obtain a successful crack.
tags | tool, kernel, protocol, wireless
systems | linux
MD5 | 142753c0ee5ba900c863e593a859097e
Posted Jun 4, 2002
Authored by Luigi Grandini | Site sefin.it

PHP v4.1.1 and 4.0.4 remote exploits ported to windows w/ Cygwin.

tags | exploit, remote, php
systems | windows
MD5 | 2f07d88eacf96e05226ff57947dfda32
Posted Jun 4, 2002
Authored by Cult

This exploit hangs WiredRed e/pop v2.0.3, probably works on all 2.x versions. Ported to Windows w/ Cygwin.

tags | exploit
systems | windows
MD5 | f3de1736dcce61fd7a9d9d6ca09f04e8
Posted Jun 4, 2002
Authored by Pir8 | Site dtors.net

Local backdoor - Secure root shell, protected by standard DES encryption.

tags | tool, shell, local, root, rootkit
systems | unix
MD5 | 023099b2625f65810fde4ab2f89f6af7
Posted Jun 4, 2002
Authored by Pir8 | Site dtors.net

False.c is a local/remote backdoor for Linux.

tags | tool, remote, local, rootkit
systems | linux, unix
MD5 | c122ccd9599635642b598c075d000acd
Posted Jun 4, 2002
Authored by Pedram Amini | Site pedram.redhive.com

Dnshijacker v1.2 is a libnet/libpcap based packet sniffer & dns spoofer. A versatile tool, dnshijacker supports tcpdump style filters that allow you to specifically target victims. Dns answers are forged based on entries in a "fabrication table" or by simply forging one answer to all requests. A print only mode is also supported, allowing one to simply monitor dns traffic. Archived prank: alex on slashdot. Requires libnet and libpcap.

Changes: Fixed freebsd bugs and now dynamically allocates memory.
systems | unix
MD5 | addc9698733b0c4e8929307abedf1664
Posted Jun 4, 2002
Authored by SS4

+++ATH0 pinger, written in VB. Includes source + Ping API calls library.

tags | denial of service
MD5 | 574e160458ce7412ad1b71c48ddbac31
Posted Jun 4, 2002
Authored by Phrail | Site divisi0n7.org

IBM x86 Informix SE-7.25 sqlexec local root exploit in perl. Overflows the INFORMIXDIR environment variable passed to the sqlexec binary.

tags | exploit, overflow, x86, local, root, perl, sql injection
MD5 | a69b26eba2667be216e4d24c307a0f30
Posted Jun 4, 2002
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.2.21.
tags | denial of service, kernel, root, patch
systems | linux, unix
MD5 | 1622fb926bb923631e6c72f914e06c92
Posted Jun 4, 2002
Authored by Dianne Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.11 / 8.12's "milter" API and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Sophie virus-scanning daemon support added, per user filter customization, and more fixes.
systems | windows, unix
MD5 | 0b8dc56aed0a0b3e6044919a89b53431
Posted Jun 4, 2002
Site sendmail.org

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: Bug fixes, documentation updates, more secure permissions on database files.
systems | unix
MD5 | 74121c90862fecafb3db69dc144fc910
Posted Jun 4, 2002
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
MD5 | 87ec7ad7b230e0ba89aa8b0cbc8d918e
Posted Jun 4, 2002
Site debian.org

Debian Security Advisory DSA-130-1 - Ethereal versions prior to v0.9.3 are vulnerable to an allocation error in the ASN.1 parser allowing remote root exploits. This affected GNU/Linux 2.2 and fixed packages have been released for the alpha, arm, i386, m68k, powerpc and sparc architectures.

tags | remote, root
systems | linux, debian
MD5 | ddd83b5b90f864cfc1ecf0c07c2e759a
Posted Jun 4, 2002
Authored by Zillion | Site safemode.org

Mnews v1.22 remote FreeBSD buffer overflow exploit. Included shellcode prints a message to stdout.

tags | exploit, remote, overflow, shellcode
systems | freebsd
MD5 | af0bb3ff22ad5e1a333a167f65b448d8
Posted Jun 3, 2002
Authored by Victor Pereira

Logclean.c is a tool to clean entries in utmp/wtmp which uses Operational System functions getutent(3), pututline(3), making it faster.

tags | tool, rootkit
systems | unix
MD5 | 6f02b768ea6be67d824fc852010f7301
Posted Jun 3, 2002
Authored by Phrail | Site divisi0n7.org

Orgasm v1.0 is a distributed reflection denial of service attack. More information available here.

tags | denial of service
MD5 | 1c5a3f2ae8e4f73560831bd942abe4f0
Posted Jun 3, 2002
Authored by Pluf | Site plushs.sourceforge.net

PluSHS allows a user to resolve the names of a single IP address or entire network of addresses to maintain a "map" of the names that comprise a certain network.

tags | tool, scanner
systems | unix
MD5 | 064be0c57d85be24c358fa9ca0abac81
Posted Jun 3, 2002
Site freebsd.org

The following FreeBSD ports prior to the listed version have security vulnerabilities: amanda-, fetchmail-5.9.11, gaim-0.58, gnokii-0.4.0.p20, horde-1.2.8, imap-uw (not fixed), imp-2.2.8, linux-netscape 6.2.3, mnogosearch-3.1.19_2, mpg321-0.2.9, ssh2 password auth issue, tinyproxy-1.5.0, and webmin-0.970.

tags | vulnerability, imap
systems | linux, freebsd
MD5 | 977f1a291e94483e10d6ea3c8f67ae6b
Posted Jun 3, 2002
Authored by Smurfy

IBM x86 Informix SE-7.25 sqlexec local root exploit. Overflows the INFORMIXDIR environment variable passed to the sqlexec binary. Offsets for Redhat 7.0 and Mandrake 8.2 included.

tags | exploit, overflow, x86, local, root
systems | linux, redhat, mandrake
MD5 | da2d8d7252cd7f717094f2dbefcf00a7
Page 5 of 7

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

March 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    14 Files
  • 2
    Mar 2nd
    12 Files
  • 3
    Mar 3rd
    1 Files
  • 4
    Mar 4th
    3 Files
  • 5
    Mar 5th
    15 Files
  • 6
    Mar 6th
    23 Files
  • 7
    Mar 7th
    15 Files
  • 8
    Mar 8th
    15 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    2 Files
  • 11
    Mar 11th
    1 Files
  • 12
    Mar 12th
    16 Files
  • 13
    Mar 13th
    20 Files
  • 14
    Mar 14th
    12 Files
  • 15
    Mar 15th
    10 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By