exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2002-07-04 to 2002-07-05

DLA-25-06-2002.txt
Posted Jul 4, 2002
Authored by Gollum | Site digit-labs.org

Digit-Labs Security Advisory DLA-25-06-2002 - Microsoft Internet Information Server 5.0 Administration Web Site redirect proof of concept exploit.

tags | exploit, web, proof of concept
SHA-256 | e40dcfcc6dabff8f35bea63000df3a5800f306c939003f143fe14a75edeb7bc2
logwatch-3.3.tar.gz
Posted Jul 4, 2002
Site sourceforge.net

Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.

Changes: Fixed the iptables and sendmail parsing routines. Some Solaris compatibility changes were made. An arpwatch filter was added.
tags | tool, intrusion detection
systems | unix
SHA-256 | b0a88b449253c7c50702f211df80b74c34cf121804e38f475ff70a2f9b099870
miscutils-1.0.tar.gz
Posted Jul 4, 2002
Authored by Ighighi

Miscutils is a set of commands useful to the program and/or system administrator. Current included programs are: acct, confstr, getrlimit, pathconf, sysconf, crypt, gettimeofday, readlink and stat.

systems | unix
SHA-256 | 4eff31112372b52527653fa098e18db1ad246feacd7cf1644768431690f142f6
logdump-1.2.tar.gz
Posted Jul 4, 2002
Authored by Ighighi

Logdump is a set of commands that dump the contents of the standard Unix log files: utmp, wtmp, utmpx, wtmpx, lastlog & acct. With logdump you may discover zapped/patched log entries; something you cannot do with who(1) and last(1).

Changes: compilation on SunOS 5.8 now works well.
tags | system logging
systems | unix
SHA-256 | 75a475c87285aaee6e2424c3f56753ce23e75a8dcc4d13f2eba8a2683b0e5b2b
examiner-0.4.tar.gz
Posted Jul 4, 2002
Authored by Craig Smith | Site AcademicUnderground.org

The Examiner is a tool to analyze foreign binary executables. The goal of is to be able to get output similar to strace without executing the binary in question. Uses the objdump command to disassemble and comment binaries. This tool was designed for forensic purposes but could be used for basic reverse-engineering goals as well.

systems | linux
SHA-256 | 535c72a78282386f1909287a9812a255bac983a1a3e4e05c9e270bd9eee4ff47
argospill.sh
Posted Jul 4, 2002
Authored by Team N.finity | Site nfinity.yoll.net

Argosoft Mail Server v1.8.1.5 Plus/Pro Webmail reverse directory traversal exploit which allows an attacker to retrieve any file on the disk readable by the mail server. The freeware edition of Argosoft Mail Server is not vulnerable. Fix available here.

tags | exploit
SHA-256 | dbf5946533d5cfe25aafbdf397ec1795b580feaef652930b1102653a65a17aa0
lsat-0.5.8.tgz
Posted Jul 4, 2002
Site dimlight.org

Linux Security Auditing Tool (LSAT) is a post install security auditing tool. It is modular in design, so new features can be added quickly. It checks inetd entries and looks for unneeded RPM packages. It is being expanded to work with Linux distributions other than Red Hat, and checks for kernel versions.

Changes: Some basic sshd config checks were added. Buffer checks were added.
tags | kernel
systems | linux, redhat
SHA-256 | df6c5da01311f6ce04a77020915f17d478370abd4a2d4a104b376602caf28e26
NBTEnum30.zip
Posted Jul 4, 2002
Authored by NTSleuth | Site ntsleuth.0catch.com

NetBIOS Enumeration Utility v3.0 is a utility for Windows which can be used to enumerate NetBIOS information from one host or a range of hosts. The information that is enumerated includes the account lockout threshold, local groups and users, global groups and users, shares, and more. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP.

Changes: Enhanced HTML reporting, bugs fixed. Added new enumeration routines, better HTML reporting, and support for IP input files.
tags | local
systems | windows
SHA-256 | de8ff8ab4c95ae4c131c913d85312898cf8c8c45d8907c6d1c0f34c00d86f22d
ms-comsrvr.txt
Posted Jul 4, 2002
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Security Advisory - Microsoft's Commerce Server 2000 and 2002 contains several remotely exploitable buffer overruns in the Profile Service and a CGI executable that allows the execution of arbitrary commands.

tags | overflow, arbitrary, cgi
SHA-256 | 5f49c7b4916d833e0dce23ac8eb20f45b61dfa9a25d2ab7df12e6438d85ed78c
vncsunpci.c
Posted Jul 4, 2002
Authored by Richard van den Berg | Site trust-factory.com

SunPCi II v2.3 comes with a modified VNC which allows an attacker to discover the password if he can sniff the traffic between client and server. Decoding program tested on Linux and Solaris.

tags | exploit
systems | linux, solaris
SHA-256 | 83f20fd636916e33e4f70baf6cf2af906377f38df67863364a556367ebab2ae2
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close