what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 184 RSS Feed

Files Date: 2002-10-01 to 2002-10-31

ward18.c
Posted Oct 4, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

WARD v1.8 is a classic war dialer - it scans a list of phone numbers, finding the ones where a modem is answering the call. WARD can generate phone numbers lists based on a user-supplied mask, in incremental or random order. Remember to change some defines to make it fit your current system configuration. WARD is one of the fastest PBX scanners around (and possibly the best for UNIX environment). Tested on OpenBSD and Linux.

tags | tool, wardialer
systems | linux, unix, openbsd
SHA-256 | de328d9308ffc5500adcca4fe49a4be425aed38f7e62550cd8043829c52709a5
ms02-057
Posted Oct 4, 2002
Site microsoft.com

Microsoft Security Advisory MS02-057 - The Sun Microsystems RPC library in Microsoft's Services for UNIX (SFU) 3.0 on the Interix SDK contains three vulnerabilities, some of which allow remote code execution.

tags | remote, vulnerability, code execution
systems | unix
SHA-256 | 5acec35c4cedcc8aff24a306b384a7772763962d930ae71f8b073f37ff63e2fb
ms02-056
Posted Oct 4, 2002
Site microsoft.com

Microsoft Security Advisory MS02-056 - A Cumulative Patch for SQL Server 7.0, Microsoft Data Engine (MSDE) 1.0, Microsoft SQL Server 2000, and Microsoft Desktop Engine (MSDE) 2000 fix four vulnerabilities, some of which allow attackers to take complete control over the system.

tags | vulnerability
SHA-256 | 3bf76166be49ef8d4f9d411cefac284e9a953d42055775e31b63ba8cd2072d44
ms02-055
Posted Oct 4, 2002
Site microsoft.com

Microsoft Security Advisory MS02-055 - A remotely exploitable buffer overflow in the HTML Help facility in Windows allows remote code execution via web page or HTML email on all versions of Windows.

tags | remote, web, overflow, code execution
systems | windows
SHA-256 | 40085ad491b3bf7c5e066a96491cdee2d23461e4cae9eca0322bf8b25086bcb8
ms02-054
Posted Oct 4, 2002
Site microsoft.com

Microsoft Security Advisory MS02-054 - On Windows 98 with Plus! Pack, Windows Me and Windows XP, the Compressed Folders feature has an unchecked buffer in the program that handles the decompressing of files from a zipped file, allowing code of the attackers choice to run.

systems | windows
SHA-256 | 0073160f2cd0980100428ae4c75321cad44b866e6c57d5aca764031e6e60a48a
snort-1.9.0.tar.gz
Posted Oct 4, 2002
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: New stable release with a large number of enhancements and bug fixes. This is the first release to use the "flow" keyword. Full changelog available here.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 405a94e8fcc2629b63d6e303d88e32b16e4fd2363154cf2d02bd4de74d10d041
httpd-2.0.43.tar.gz
Posted Oct 4, 2002
Site apache.org

Apache v2.0.43 - Apache is the most popular webserver on the Internet, and ranks well in terms of security, functionality, efficiency, and speed. Changelog available here.

Changes: Fixes a cross-site scripting vulnerability in the default error page of Apache 2.0 before 2.0.43 when UseCanonicalName is "Off" and support for wildcard DNS is present which allows remote attackers to execute html and java script as other web page visitors via the Host: header.
systems | unix
SHA-256 | 340e0f3ddc87e1dd13973c52b1bc99ec86ac5b5ef5cc105cda34cc7ff32d0d93
kerb4.tar.Z
Posted Oct 4, 2002
Authored by Mudge | Site atstake.com

Kerberos 4 cracker.

SHA-256 | 1e2ec4124c5ea5abc860098482da56da54827ff1882ff0bc51e8a78488c36135
skey_paper_and_tool.txt
Posted Oct 4, 2002
Authored by Mudge | Site atstake.com

Monkey S/Key challenge/response auditor and white paper. Works similarly in nature to Alec Muffet's CRACK. In essence it takes the md4 value in either HEX or English words and compares it to a dictionary.

SHA-256 | 91361b4f1c1136c90bd9c318b67f64854190eb95ae32e1899a0166c2aa19e602
notsync.zip
Posted Oct 4, 2002
Authored by Kingpin | Site atstake.com

NotSync demonstrates the simplicity of obtaining and decoding the Palm system password. This version imitates the initial stages of the HotSync process via the IR port and retrieves and decodes the password of the target device.

SHA-256 | 7c3c502a14191792cb5a0b396a99c3ae44638139bd248d926f033f961fd04774
dcetest-2.0.tar.gz
Posted Oct 4, 2002
Authored by Dave Aitel | Site atstake.com

Dcetest is a tool which probes a windows machine over TCP port 135, dumping MSRPC endpoint information. It can be though of as the equivalent of rpcinfo -p against a Windows box. Dcetest can also be very useful once inside a DMZ to fingerprint Windows machines on the network. Similar to the rpcdump program from Microsoft, but does not need a DCE stack and so runs on Unixes.

tags | tool, scanner, tcp
systems | windows, unix
SHA-256 | 4a319a08ae0838234f5b6fbd0b4d2e0fac7560a7553a4e1b043527cc17032aa3
apache_1.3.27.tar.gz
Posted Oct 4, 2002
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed. Changelog available here.

Changes: Fixed a Cross Site Scripting vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present which allows remote attackers to execute HTML and javascript as other web page visitors via the Host: header.
systems | unix
SHA-256 | 921d6d247d3ad958a4453d6f5d00e4c8b68b958b021542ec1ad3a6c640b4bef8
sara-4.1.1.tgz
Posted Oct 4, 2002
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Added test for '8-11' Windows backdoor, Updated XML interface, Updated CSV interface to include service and port, Tweaked tcpscan.sara for performance, Updated XML tag descriptions, Added MAC proxy interface, and supports new FBI/SANS Top 20 Consensus List.
tags | tool, cgi, scanner
systems | unix
SHA-256 | a661b9f271e0bf1ffb19d638027beb79af15e52c66aa40ddb44a06a329ede7c0
kismet-2.6.1.tar.gz
Posted Oct 3, 2002
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

Changes: Fixed security flaws with suid-behavior and bugs with adhoc network detection and output. Updated manufacturer tracking. Updated documentation. Added GPSMap bugfixes and improved ACPI support.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | 4210118493aece128667e5ee06bb4738541b3ed774f2e91bdcf4437e6b790e9c
iptables_logger_v0.2.tar.gz
Posted Oct 3, 2002
Authored by Gege | Site gege.org

IPTables log analyzer displays Linux 2.4 iptables logs (rejected, accepted, masqueraded packets...) in a nice HTML page. This page shall be easy to read and understand to reduce the manual analysis time. This page contains statistics on packets and links to more detailed information on a given host, port, domain and so on. Screenshot available here.

tags | tool, firewall
systems | linux
SHA-256 | 4fd30f4b30ce34e48fbd6dc461f80e94b035021d98193ee59f25a5ed35b088f7
sendmail.8.11.x.c
Posted Oct 3, 2002
Authored by sd

Sendmail 8.11.5 and below local root exploit. Tested against Red Hat 7.0 and 7.1, SuSE 7.2, and Slackware 8.0.

tags | exploit, local, root
systems | linux, redhat, suse, slackware
SHA-256 | 91760643cbea23f0d407bfbe6adb92fff440f2e21775e64c29e8d836351f91b9
hackingcitrix.txt
Posted Oct 3, 2002
Authored by wirepair

Citrix is a Remote Desktop application that is becoming widely popular. It is similar to Microsoft's Terminal Services, RDP (Remote Desktop Protocol). Unlike Terminal Services, Citrixs' lines of products allow the administrator to specify certain applications to be run on the server. This allows them to control which programs they want to allow the end user to execute. There exists an interesting gray line for the security of Citrix applications due to the mixing of both Citrix technology, and Microsoft technology. With an application that allows users remote access to not only published programs, but remote desktops, a serious threat arises.

tags | exploit, remote, protocol
SHA-256 | f66ebd0278ec5919fe8ede3d0ec55a3aa78b31d7b9b07b606409974660c1ca5f
solx86_bind.c
Posted Oct 3, 2002
Authored by The Last Stage of Delerium | Site lsd-pl.net

Bind v8.2, 8.2.1, 8.2.2, and 8.2.2-PX remote root exploit for Solaris 2.7 x86.

tags | exploit, remote, x86, root
systems | solaris
SHA-256 | ae23adfe8e413cf29b90daaa2aa3fa68779d3affba2a40e82e14dc7e57560754
idefense.net-snmp.txt
Posted Oct 2, 2002
Authored by David Endler, Andrew Griffiths | Site idefense.com

iDEFENSE Security Advisory 10.02.2002 - The SNMP daemon included in the Net-SNMP (formerly known as ucd-snmp) package crashes if it attempts to process a specially crafted packet. This affects Net-SNMP 5.0.1, 5.0.3 and 5.0.4.pre2. Net-SNMP is no longer affected and can be downloaded here.

SHA-256 | 5c79243b80e30f146fd1dc449457202730c88daf5ec519bc3267742a3e57f584
solaris.login.txt
Posted Oct 2, 2002
Authored by Jonathan Stuart

This document describes how to compromise Solaris systems prior to version 9 by using a telnet client only.

tags | exploit
systems | solaris
SHA-256 | ba05ee6ac0393c5d63a2046f794f28c1c85e51bfa90d2ea02db8150c95501fd7
apache-2-xss.txt
Posted Oct 2, 2002
Authored by Matthew Murphy

The Apache servers prior to 2.0.43 insecurely include the value of the 'Host:' header field, received from a connected client, into the SSI error pages. This can be abused for remote cross-site scripting. Apache 1.3.x servers are not affected.

tags | remote, xss
SHA-256 | d50f05528a29fbb5a05af733fd529fd69f45701adeb8c86c64d8718b418adecd
e-matters.fetchmail.txt
Posted Oct 2, 2002
Authored by Stefan Esser | Site security.e-matters.de

E-Matters security advisory - Several buffer overflows have been found in fetchmail versions prior to 6.1.0. Overflows in the readheaders() and getmxrecord() function can be used in remote denial of service attacks that may cause data loss. An overflow found in the parse_received() function allows remote code execution and may be used to compromise an affected host.

tags | remote, denial of service, overflow, code execution
SHA-256 | 1c6a40ce9f52ec5bad26332b8020746c2492bdf33417e8c825422b64fdfc8d11
idefense.smrsh.txt
Posted Oct 2, 2002
Authored by Zen-Parse, Pedram Amini, David Endler | Site idefense.com

iDEFENSE Security Advisory 10.01.2002 - It is possible for an attacker to bypass the restrictions imposed by The Sendmail Consortium's Restricted Shell (SMRSH) and execute a binary of his choosing by inserting a special character sequence into his .forward file. Two attack methods both of which are detailed. Patch available here.

tags | exploit, shell
SHA-256 | e1968987be598ce21fb8b01554f9dd70ecddae77782675c6591f723f39c2dab1
lcrzoex-4.15-src.tgz
Posted Oct 1, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Bugs fixed.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | a03f7f6f74c7988b37fef255789605381b0369b5b79b43b9645a1aa255f0a735
Firewall Builder With GUI
Posted Oct 1, 2002
Site fwbuilder.org

Firewall Builder consists of object-oriented GUI and set of policy compilers for various firewall platforms. In Firewall Builder, firewall policy is a set of rules, each rule consists of abstract objects which represent real network objects and services (hosts, routers, firewalls, networks, protocols). Firewall Builder helps user maintain database of objects and allows policy editing using simple drag-and-drop operations. Firewall Builder can be used to manage firewalls built on variety of platforms including, but not limited to, Linux running iptables and FreeBSD or Solaris running ipfilter.

tags | tool, firewall, protocol
systems | linux, solaris, freebsd
SHA-256 | 7472d8b561d8e35156b48704209672df84c19ff6aad52591c42cdad22c8e046b
Page 7 of 8
Back45678Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close