exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 3,027 RSS Feed

Files Date: 2002-08-01 to 2002-08-31

BitchX-1.0c19-humble.diff
Posted Aug 29, 2002
Authored by Sean Trifero | Site innu.org

BitchX patch which fixes the #define HUMBLE compiling problems. For 1.0c19.

SHA-256 | 1658a714b2ef988ef14240079649fd7715f4b8ca5a2de7834f96206d2f990263
idefense.webmin.txt
Posted Aug 29, 2002
Authored by Noam Rathaus | Site idefense.com

iDEFENSE Security Advisory 08.28.2002 - Webmin v0.92 and below contains remote vulnerabilities which allow any file to be read from or written to as root. Perl exploit code included.

tags | exploit, remote, root, perl, vulnerability
SHA-256 | af31beb487c3d22656202899a2265acf6154205773815b6ae81b751d5177ca36
idefense.linuxconf.txt
Posted Aug 29, 2002
Authored by David Endler | Site idefense.com

iDEFENSE Security Advisory 08.28.2002 - A local buffer overflow vulnerability exists in linuxconf v1.28r3 and below which allows users to spawn a root shell on Linux 7.3. Fix available here.

tags | overflow, shell, local, root
systems | linux
SHA-256 | f9ba1eb1fdc12f40a3c9d1f1c58751fb4592b6d5203e97240852745915ace9d3
Atstake Security Advisory 02-08-28.1
Posted Aug 29, 2002
Authored by Atstake, Ollie Whitehouse | Site atstake.com

Atstake Security Advisory A082802-1 - The Microsoft Terminal Server ActiveX client contains a buffer overflow in one of the parameters used by the ActiveX component when it is embedded in a web page which an attacker can exploit to run malicious code on a target system. The user would need to open a malicious HTML file as an attachment to an email message, as a file on the local or network file system, or as a link on a malicious web site.

tags | web, overflow, local, activex
SHA-256 | 56359c9b96a1991a0e4e4ca0c9bcd9337adab1526626b1bdc5b1cae7f982e8e1
Linux 2.4.19 Stealth Patch
Posted Aug 29, 2002
Authored by Sean Trifero | Site innu.org

The Stealth Kernel Patch for Linux v2.4.19 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.

Changes: Now works with kernel v2.4.19.
tags | kernel, tcp, patch
systems | linux, unix
SHA-256 | d83f6c2d42f4c4d0faf46cfa16e9c460e0ce02fe230f12f4007615182d399738
fucklinux.c
Posted Aug 29, 2002
Authored by NTFX, Mimayin | Site legion2000.security.nu

This local denial of service exploit works up to kernel 2.2.21 by using up all the available inodes.

tags | denial of service, kernel, local
SHA-256 | 0b3e683b3bf8e073894178c7bdd337d759248aec85101372e120cdf4adb4fd1c
Debug_Enviroment_Variables.txt
Posted Aug 29, 2002
Authored by Lawrence Lavigne | Site neoerudition.net

The CGI Debugger v1.0 (/cgi-bin/debug.pl) displays information that may be useful to an attacker including the document root and server version info when passed a bogus argument.

tags | cgi, root
SHA-256 | fb7ac98f8314c3a58ff56f24e2e1c29c135d75c2f619f967ff2229d80ec3171f
logrec.c
Posted Aug 29, 2002
Authored by George Dissios | Site frapes.org

This utility allows the editing and manipulation of wtmp/utmp/wtmpx/utmpx/lastlog.

tags | tool
systems | unix
SHA-256 | afc994d3542b3f019db0ad019c0d6a342a5b4c0bbf24de3cc691f1bdced75574
NorSMB.tar.gz
Posted Aug 29, 2002
Authored by Norwegian

This utility for Linux utilities a bug in Window's SMB implementation to crash file sharing. It works against Windows NT 4.0, Windows XP, and Windows 2000. Author has requested that anyone using this only use it for educational purposes and that any further research performed with this code be shared with them.

tags | denial of service
systems | linux, windows
SHA-256 | ee35b7a2b8ac003079d9c4d2c619682f61cf597ad8f17480da3f99c1a59da2f8
blowdoor01c.c
Posted Aug 28, 2002
Authored by Bl0w | Site secworld.org

Blowdoor is a backdoor for unix systems using md5sum passwords.

tags | tool, rootkit
systems | unix
SHA-256 | 84a75efd14773526c9de2d18b1b8488260ab9e28b2b53d9db1bc0d2a922a48a3
kerio-syn-dos.txt
Posted Aug 28, 2002
Authored by Abraham Lincoln | Site nssolution.com

NSSI advisory NSSI-2002-keriopfw - The Kerio Personal Firewall 2.x.x firewall can be made to crash if flooded with SYN packets. Tested under Win2k Advance Server with SP3 and WinNT 4.0 with SP6a.

systems | windows
SHA-256 | aa968e38233d82058a014061b76600a85e6043ca2aefb3216aa52b804db85ea7
Belkin-F5D6130-SNMP.txt
Posted Aug 28, 2002
Authored by Wlanman

A denial of service vulnerability found in the Belkin F5D6130 802.11b AP allows remote users to disable this device.

tags | remote, denial of service
SHA-256 | eed3847e3ffbf5fa0484d6205df47b02f5bc57956d89bbf33bd5d456c5266aa9
debian.gaim.txt
Posted Aug 28, 2002
Site debian.org

Debian Security Advisory 158-1 - Gaim uses URL's retrieved from message in command-line execution of the web browser without filtering these URL's first. This issue has been fixed by the Gaim developers in version 0.59.1.

tags | web
systems | linux, debian
SHA-256 | 66b12a671c25396e8466f1c03363e0e7c5f9a9c557b48eaf6752ba720e384559
smokingtwojoints.c
Posted Aug 28, 2002
Authored by Michele Dallachiesa

Smokingtwojoints.c logs the contents of inbound and outbound telnet and ssh sessions via ptrace. Takes as input a PID or fd to be watched.

systems | unix
SHA-256 | bc1de9a3feb0db8ee16c0099b598a1dd63a3559363b6910433b2c550f8d6d9e3
arp-sk-0.0.13.tgz
Posted Aug 28, 2002
Authored by Frederic Raynal | Site arp-sk.org

Arp-sk is an ARP packet generator for Unix designed to illustrate ARP protocol flaws and applications such as ARP cache poisoning and MAC spoofing. It gives complete control of link and network level data. See arp-sk.org for further information.

Changes: This new version fixes some bugs and makes arp-sk less CPU consuming.
tags | spoof, protocol
systems | unix
SHA-256 | bd0b28f03cfe68cc4a98700d4f1ed47e8ecac6cc16fd17b73a9ebbd997ba11e6
Linux 2.2.20 Stealth Patch
Posted Aug 27, 2002
Authored by Sean Trifero | Site innu.org

The Stealth Kernel Patch for Linux v2.2.20 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.

Changes: Now works with kernel v2.2.20.
tags | kernel, tcp, patch
systems | linux, unix
SHA-256 | c5848d9fd5af0164aee0fca477ec5c21e39ce2cade88a6e50fd1b459e1b2bfa5
Linux 2.2.21 Stealth Patch
Posted Aug 27, 2002
Authored by Sean Trifero | Site innu.org

The Stealth Kernel Patch for Linux v2.2.21 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.

Changes: Now works with kernel v2.2.21.
tags | kernel, tcp, patch
systems | linux, unix
SHA-256 | 99738a62126c4165132bf7eefd3fe9cfe6759da6566671e53723ef5e13215b2f
stealth.c
Posted Aug 27, 2002
Authored by Sean Trifero | Site innu.org

Stealth.c is a Linux 2.2.x kernel module which discards packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags.

tags | kernel, tcp
systems | linux
SHA-256 | 617372d951b886ece66db028d0d134637d1a62f13ff55eb4e94be19b042ea7a4
ecrack-1.0.tgz
Posted Aug 27, 2002
Authored by Sean Trifero | Site innu.org

ECrack v1.0 - Energymech (StarGlider Class - IRC bot) brute force password cracker. Tested with emech-2.99.65 but should work with other versions also.

tags | cracker
SHA-256 | 6a6306078b8ec81f2f6aeac1743765e0efc9a5f9f11bbb112fe6a22cac4160db
UNFburninhell1.0.tar.gz
Posted Aug 27, 2002
Authored by Byterage | Site u-n-f.com

Burncrack is a burneye cryptographic layer 1 & 2 cracker which can work together with john the ripper for password generation. It can crack and unwrap burneye layer 1 and layer 2 protected binaries without having to run them, on both windows (Cygwin) and linux platforms.

systems | linux, windows, unix
SHA-256 | 4bd45ab82150e82102a11bddd896f81fc3cb82859ae990319935b62731410e09
SMBdie.zip
Posted Aug 27, 2002
Authored by Zamolx3

SMBdie is a proof of concept tool which crashes Windows machines with Netbios enabled by sending a specially crafted SMB request. Tested against Windows NT/2k/XP/.NET RC1.

tags | exploit, proof of concept
systems | windows
SHA-256 | 5b21793e665c14f40e6ca342af31b249f2d4e215b15cdc697564836471942749
gdam123-expl.c
Posted Aug 27, 2002
Authored by netric, Sacrine | Site netric.org

Local proof of concept exploit for the gdam123 software package. Exploits an unchecked buffer in filename option.

tags | exploit, local, proof of concept
SHA-256 | 79b4ed49fba81c1e9bbe29fb3aacdd661eeb60bcd533162c9e334f350afee027
Practical COMSEC Equipment For Protecting Your Privacy
Posted Aug 26, 2002

This file is a brief overview of the field of advanced COMSEC pertaining specifically to data communications. COMSEC is technical jargon for those in the field of security, and it is an acronym for COMmunications SECurity.

tags | bbs
SHA-256 | 4fa0747b7347da4d9b2e50fd59fcfd8f03a7e1a13fcbdc95af118d67247312ff
fisa2.txt
Posted Aug 26, 2002

From the U.S. Code Online via GPO Access [wais.access.gpo.gov] [Laws in effect as of January 16, 1996] [Document not affected by Public Laws enacted between January 16, 1996 and August 28, 1996] [CITE: 50USC] TITLE 50--WAR AND NATIONAL DEFENSE CHAPTER 36--FOREIGN INTELLIGENCE SURVEILLANCE SUBCHAPTER I--ELECTRONIC SURVEILLANCE

tags | bbs
SHA-256 | 5d452d53f046ea9c03545ac70b1b048485b560b6a3abbcc89b42f88868588217
Product Review And Technical Analysis General Purpose Amplifiers
Posted Aug 26, 2002

This article deals with the field of surveillance. In this article the author performs a product review of the various General Purpose Amplifiers, whos purpose will be discussed below. The intent of this article is to make you aware of the various models of such units from different manufacturers as well as the prices of such units. In addition, each unit will be reviewd for quality and usefullness.

tags | bbs
SHA-256 | 55ae0f7abecbbb6cfbb2dde2210018715288eb0782296379f39b68de6f78c0f1
Page 3 of 122
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close