exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 157 RSS Feed

Files Date: 2002-06-01 to 2002-06-30

THC Secure Deletion v2.3
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Secure Deletion v2.3 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: Bug fixes.
systems | unix
SHA-256 | 1d5629b0f83a0352b0d2654208ad38a2aee6ce78c9f94f8d2b044b5316b164b7
parasite-1.1.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.1 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security.

tags | spoof
SHA-256 | b610d3a1f5525d3b5f3fa41e2d3efb3cfcea5af963e3f4aee759732839b7bf90
wardrive-2.3.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.3 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Rewrote the GPS data gathering function. Fixed lots of bugs!
systems | linux
SHA-256 | 9810f45f7b163d85d8aaf5092726d2e26ba29ee6171d07999e36a2d771651a0f
hydra-1.6.tar.gz
Posted Jun 4, 2002
Authored by thc | Site thc.org

THC-Hydra is a parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, NNTP, VNC, ICQ, PCNFS, and more). Also included Socks5 and SSL support.

tags | web, cracker, imap
SHA-256 | 5fb2a998138aac2a9286b5f1f4bd416ed6dbd511b5f8992250ee75aaeb99cef4
servletexeccrash.c
Posted Jun 4, 2002
Authored by Jonas Blowfish | Site digital-root.com

NewAtlanta ServletExec ISAPI 4.1 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | ce0b25b8a3ff31cf7999f19d45feb3e11deedb4281f0765cd5121dc39ab565e1
nessus-1.2.1.tar.gz
Posted Jun 4, 2002
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 900 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: More CVE cross references, added more vulnerability checks, and fixed bugs.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 01eb6ac7c6d1a11f95bebae3894dd27e58923657e16151cc23b1e94ab99952d8
airsnort-0.2.1.tar.gz
Posted Jun 4, 2002
Site airsnort.shmoo.com

Airsnort is a tool for wireless lans which recovers encryption keys by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. Works on both 40 and 128 bit encryption. Many weaknesses in the WEP 802.11 protocol are discussed here. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second. Tested on Linux kernel v2.4.

Changes: Now uses libpcap. Supports more cards. Now can read pcap dump files. Cracking is attempted in parallel with capture. There is no need to guess whether you have enough packets to obtain a successful crack.
tags | tool, kernel, protocol, wireless
systems | linux
SHA-256 | c160899ad2fea72220eef69caf57c0c628ff39b25989e584765fe06d8586550c
concept.tar.gz
Posted Jun 4, 2002
Authored by Luigi Grandini | Site sefin.it

PHP v4.1.1 and 4.0.4 remote exploits ported to windows w/ Cygwin.

tags | exploit, remote, php
systems | windows
SHA-256 | 942c5fa91ba14ca93d5c955bf672b5655abe52da4288041878569f0ac0d44788
epop.tar.gz
Posted Jun 4, 2002
Authored by Cult

This exploit hangs WiredRed e/pop v2.0.3, probably works on all 2.x versions. Ported to Windows w/ Cygwin.

tags | exploit
systems | windows
SHA-256 | b888ff0b10bd0e61f49601ca8df8a50dd62484cc687f644e99ca6b9d20341fd0
SeCshell.c
Posted Jun 4, 2002
Authored by Pir8 | Site dtors.net

Local backdoor - Secure root shell, protected by standard DES encryption.

tags | tool, shell, local, root, rootkit
systems | unix
SHA-256 | 31505319837ac9a5d95fa12d23585c1d6824d1619c5849dbabeaf9f9ee81bb69
false.c
Posted Jun 4, 2002
Authored by Pir8 | Site dtors.net

False.c is a local/remote backdoor for Linux.

tags | tool, remote, local, rootkit
systems | linux, unix
SHA-256 | 1258fc1afb8d05496afbb0ac6750abcae3d1f81d9148516aa2e5bdb83bce46ca
dnshijacker.tar.gz
Posted Jun 4, 2002
Authored by Pedram Amini | Site pedram.redhive.com

Dnshijacker v1.2 is a libnet/libpcap based packet sniffer & dns spoofer. A versatile tool, dnshijacker supports tcpdump style filters that allow you to specifically target victims. Dns answers are forged based on entries in a "fabrication table" or by simply forging one answer to all requests. A print only mode is also supported, allowing one to simply monitor dns traffic. Archived prank: alex on slashdot. Requires libnet and libpcap.

Changes: Fixed freebsd bugs and now dynamically allocates memory.
systems | unix
SHA-256 | 98a5bf780f9e88276cb7aa18e20a49c331bdb12ed9ebf60bea2a425b8b7f9e9d
ath0izer.zip
Posted Jun 4, 2002
Authored by SS4

+++ATH0 pinger, written in VB. Includes source + Ping API calls library.

tags | denial of service
SHA-256 | 894315484b456cb1c01980bd03ccea7e89bf6bd4cd5d2fcd5c0d5633abde749c
d7-sqlexec-7.25.tgz
Posted Jun 4, 2002
Authored by Phrail | Site divisi0n7.org

IBM x86 Informix SE-7.25 sqlexec local root exploit in perl. Overflows the INFORMIXDIR environment variable passed to the sqlexec binary.

tags | exploit, overflow, x86, local, root, perl, sql injection
SHA-256 | ab9dd888595f3f4dfef65f529c62b9a6c0caa60712655bf6613fde2bb4847e93
pspa-2.2.21-14.tar.gz
Posted Jun 4, 2002
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.2.21.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | d61bf6e3dbf719b509f1f7f95548c9046c1ea67c123e9d83a01d182c414a25d0
mimedefang-2.14.tar.gz
Posted Jun 4, 2002
Authored by Dianne Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.11 / 8.12's "milter" API and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Sophie virus-scanning daemon support added, per user filter customization, and more fixes.
systems | windows, unix
SHA-256 | a1f4b76c7d11fd65cc7ff7eb62149b3acbcabcbe564107f3053b7651bb5d3d79
sendmail.8.12.4.tar.gz
Posted Jun 4, 2002
Site sendmail.org

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: Bug fixes, documentation updates, more secure permissions on database files.
systems | unix
SHA-256 | 95824bba177f8376aa4892d5c54b979cf252b9968ce3f784b909fa6b2697c35f
ettercap-0.6.6.6.tar.gz
Posted Jun 4, 2002
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 50d76bb1d256115c3608d023a3612e1fe33812323feba4e14f8d474d8bc0dc69
DSA-130-1
Posted Jun 4, 2002
Site debian.org

Debian Security Advisory DSA-130-1 - Ethereal versions prior to v0.9.3 are vulnerable to an allocation error in the ASN.1 parser allowing remote root exploits. This affected GNU/Linux 2.2 and fixed packages have been released for the alpha, arm, i386, m68k, powerpc and sparc architectures.

tags | remote, root
systems | linux, debian
SHA-256 | 6047e9c58a21975a17a86279a3933dce99d34759cf75423e74a5af261768ac6b
mnews-1.22.pl
Posted Jun 4, 2002
Authored by Zillion | Site safemode.org

Mnews v1.22 remote FreeBSD buffer overflow exploit. Included shellcode prints a message to stdout.

tags | exploit, remote, overflow, shellcode
systems | freebsd
SHA-256 | 01ef7c9e912a48e3c415c9f36a6240e9e0a115bf00bebc74b5585b7817ddb949
logclean.c
Posted Jun 3, 2002
Authored by Victor Pereira

Logclean.c is a tool to clean entries in utmp/wtmp which uses Operational System functions getutent(3), pututline(3), making it faster.

tags | tool, rootkit
systems | unix
SHA-256 | cbe0039b712816cb75ff94fccc71214c508e999984a63ef49eeab6df35751ca0
d7-pH-orgasm.tgz
Posted Jun 3, 2002
Authored by Phrail | Site divisi0n7.org

Orgasm v1.0 is a distributed reflection denial of service attack. More information available here.

tags | denial of service
SHA-256 | d6dad5cb55226f0e8e534dbe17c2c41b0a68f7e8bc1f3cf035f779e1ea82e508
plushs-1.0.tar.gz
Posted Jun 3, 2002
Authored by Pluf | Site plushs.sourceforge.net

PluSHS allows a user to resolve the names of a single IP address or entire network of addresses to maintain a "map" of the names that comprise a certain network.

tags | tool, scanner
systems | unix
SHA-256 | 0d5bddb0ccc196ba0c98783a19d57e738ffda70e5cd718a83e2c996cfb0a742c
FreeBSD-SN-02:03
Posted Jun 3, 2002
Site freebsd.org

The following FreeBSD ports prior to the listed version have security vulnerabilities: amanda-2.3.0.4, fetchmail-5.9.11, gaim-0.58, gnokii-0.4.0.p20, horde-1.2.8, imap-uw (not fixed), imp-2.2.8, linux-netscape 6.2.3, mnogosearch-3.1.19_2, mpg321-0.2.9, ssh2 password auth issue, tinyproxy-1.5.0, and webmin-0.970.

tags | vulnerability, imap
systems | linux, freebsd
SHA-256 | 573f30008a2e7144a46d4b6e77775ec38d8ffa94127935a00f2ec8c7e36ebf0e
d7-ibm-x.c
Posted Jun 3, 2002
Authored by Smurfy

IBM x86 Informix SE-7.25 sqlexec local root exploit. Overflows the INFORMIXDIR environment variable passed to the sqlexec binary. Offsets for Redhat 7.0 and Mandrake 8.2 included.

tags | exploit, overflow, x86, local, root
systems | linux, redhat, mandrake
SHA-256 | 51fb5d073c8119f0f6b35e7780a8c034299174f9e239cfe43b734a26ce42b317
Page 5 of 7
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close