exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2002-07-12 to 2002-07-13

Nmap Scanning Utility 2.54 BETA 37
Posted Jul 12, 2002
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, uptime calculation, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: Made SYN scan the default for privileged (root) users. Applied dozens of nmap-services portnumber mapping updates. Updated nmap-rpc to the latest version. Fixed some bugs and improved portability.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | ab8aee1caa349efb01c3621967b20ca5b216ac64b8bbe8bf5416baaddb02a9eb
cisco-3000.txt
Posted Jul 12, 2002
Authored by Master Phi

The Cisco VPN3000 gateway lets remote client dictate which maximum MTU to use when sending back ESP frames, regardless of the transmitting capabilities of the physical medium. This can lead to denial of service conditions.

tags | remote, denial of service
systems | cisco
SHA-256 | c02c5efceb3de66f0063f72ec5186d0b3d0fd4ffbf6f7b6b4cc5f61471cc7661
CORE-20020528.txt
Posted Jul 12, 2002
Authored by Core Security Technologies | Site corest.com

CORE Security Advisory CORE-20020528 - CORE SDI found two serious remote vulnerabilities in systems running CDE ToolTalk (rpc.ttdbserverd). The first vulnerability allows remote attackers to delete arbitrary files, cause a denial of service, or possibly execute arbitrary code or commands. The second vulnerability allows local attackers to overwrite arbitrary files with contents of the attacker's choice.

tags | remote, denial of service, arbitrary, local, vulnerability
SHA-256 | 75504d1c72ac1b9946b79d6ddf007725e904b7ac631f6419d6c49bad30d4a5d3
nn-expl.pl
Posted Jul 12, 2002
Authored by Zillion | Site safemode.org

Remote format string exploit for the nn news reader v6.6.4 and below. The vulnerability resides in the code that handles NNTP server responses.

tags | exploit, remote
SHA-256 | bd02d3ca74768f8d26a7e158028072e79242e1adb157d1507c85bafb371c854e
ntop-2.1.tar.gz
Posted Jul 12, 2002
Authored by Luca Deri | Site ntop.org

Ntop is a very useful Unix / Windows network sniffing tool that shows the network usage, similar to what the popular top Unix command does for processes. Has an interactive mode and a web mode for greater functionality and options, shows network traffic sorted according to various criteria, displays traffic statistics, shows IP traffic distribution among the various protocols, analyses IP traffic and sorts it according to the source/destination, displays IP Traffic Subnet matrix (who's talking to who?), reports IP protocol usage sorted by protocol type. In Web mode, it acts as a Web server, creating an HTML dump of the network status. Can be used as a a lightweight network IDS.

tags | tool, web, sniffer, protocol
systems | windows, unix
SHA-256 | f04185f98236b3383b6c507bd0c8cf6dde9bcecb9fff2d85230b19f6cfd13db8
freeswan-1.98b.tar.gz
Posted Jul 12, 2002
Site freeswan.org

Linux FreeS/WAN provides IPSEC kernel extensions and an IKE (Internet Key Exchange, keying and encrypted routing daemon) allowing you to build secure tunnels through untrusted networks. Compatible with with other IPSEC and IKE systems already deployed by other vendors such as OpenBSD.

Changes: Bug fixes.
tags | tool, kernel, firewall
systems | linux, unix, openbsd
SHA-256 | 224cefb0a215169387e775837367f4250b6a382601b5a71c5804a963e472f677
netspoc-1.3.tar.gz
Posted Jul 12, 2002
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: Allows the source port to be specified for TCP and UDP services. Code generation for stateless IOS routers has been fixed. Answer packets for TCP and UDP connections are no longer restricted to ports > 1023.
systems | unix
SHA-256 | ce443f190b56176f79bec090c3cfebf4184d4768feaf46c489ccd941d64f3664
ms-sqlbi.txt
Posted Jul 12, 2002
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Security Advisory - Microsoft's SQL Server 2000's BULK INSERT query contains a buffer overflow which allows remote code execution as LOCAL SYSTEM. To be able to use the 'BULK INSERT' query one must have the privileges of the database owner or dbo. Microsoft Security bulletin available here..

tags | remote, overflow, local, code execution, sql injection
SHA-256 | beed091eb087b240ade24c710d5e6642ca80b3f180a2cb4baf37c543862b35d4
parasite-1.2.tar.gz
Posted Jul 12, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.2 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security. Works on Linux, OpenBSD, and Solaris.

Changes: More portable.
tags | spoof
systems | linux, solaris, openbsd
SHA-256 | 88ed01c5809275069ed28ab27da53c28745abe567a2e31a9d02b41c7f4067e83
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close