exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 74 RSS Feed

Files Date: 2002-11-17 to 2002-11-18

IISUnicodeExplained.doc
Posted Nov 17, 2002
Authored by Gary Brooks

This paper goes into detail on Unicode exploitation with how it works and how to actually perform attacks against IIS servers that are vulnerable to this bug.

tags | paper
SHA-256 | 68fbbf6b12fa6d1da1c65f239128400e7232673eba42d725b52a0e5200e2b6df
amd-ex.c
Posted Nov 17, 2002

AMD remote exploit that uses the amq binary.

tags | exploit, remote
SHA-256 | f9d117869790e067d3a895a26af38832f3a03ce421b1cd1c1c538d7cc397b5af
linx86_bind.c
Posted Nov 17, 2002
Site lsd-pl.net

Bind 8.2 8.2.1 8.2.2 8.2.2-PX remote root exploit for Slackware 4.0 and Redhat 6.2. Exploits the infoleak bug to generate a DNS tsig exploit packet. The uses an assembly routine to bypass tightly configured firewall systems (with only 53 tcp/udp port open).

tags | exploit, remote, root, udp, tcp
systems | linux, redhat, slackware
SHA-256 | 07e26538f419d09ee9e0fc5519733ba25fb27bc9ccf20586e861c82bcc2d9146
7350cowboy.c
Posted Nov 17, 2002
Authored by teso

7350cowboy.c is supposedly a PHP/3.0.12, 3.0.15, and 3.0.16 with apache 1.3.12 remote format string exploit for FreeBSD 3.4, Slackware Linux 4.0, and 7.0. Very similar to http://packetstormsecurity.org/0010-exploits/phploit.c.

tags | exploit, remote, web, php
systems | linux, freebsd, slackware
SHA-256 | e940a4a8984ee2cd304f252e58a8dff2073d5977d73bfb168d98d7d54ca42f0f
SAFE-ASecurityBlueprintforEnterpriseNetworks.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: SAFE-ASecurityBlueprintforEnterpriseNetworks in PDF format

SHA-256 | cd609d1d56b3d851a8e78315b42d6e9ea0720e5ac9bdd7caa068a439becfc0cc
SAFE-WirelessLANSecurityinDepth.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: SAFE-WirelessLANSecurityinDepth in PDF format

SHA-256 | acaf8066dfdb4a0a4e82e92b6ecd73b59902da11d57906474cde3f87d7477064
SecurityBestPracticesforCiscoUnity3.0.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: SecurityBestPracticesforCiscoUnity3

SHA-256 | 656fa8ee0a912a61402b5d751f884f3317a74cfefe32ad06c7e4db79d44ec6d8
ServiceLevelManagement-BestPractices.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: ServiceLevelManagement-BestPractices in PDF format

SHA-256 | 92819aa5b578ac17c060e7d0d566d24cf41b4da068567fce646fb4a4992f2b5e
UsingtheCiscoIOSFirewalltoAllowJavaAppletsFromKno.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: UsingtheCiscoIOSFirewalltoAllowJavaAppletsFromKno in PDF format

SHA-256 | c3a142d10c8ca3fdbb1d2e930aa06590a554433ec7a6a5ff6c317438cacf7b7a
CiscoPacketTelephonyCenter-ANovelApproachfortheMa.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: CiscoPacketTelephonyCenter-ANovelApproachfortheMa in PDF format

SHA-256 | 8fc2f9cf3af25806fc61e3cc2f6aae3282bc8f9db7dd1b0e6397da06749a0904
CiscoSecureIntrusionDetectionSystemFrequentlyAskedQu.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: CiscoSecureIntrusionDetectionSystemFrequentlyAskedQu in PDF format

SHA-256 | 0577d7d2dd0a8dc797a2b8e7b1c7f8f71d0d71b74180855216321d138f40fca4
CiscosPIXFirewallandStatefulFirewallSecurity.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: CiscosPIXFirewallandStatefulFirewallSecurity in PDF format

SHA-256 | 54754cf9b58f45072f8e1afaaaad678d3068cd8a5ec94290eed8d9a2447b3da8
CiscoUnifiedVPNSuite.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: CiscoUnifiedVPNSuite in PDF format

SHA-256 | 7d7af23c163c7122958d09d6ac4d5441fdabee436f24930a95d71251517069b4
CiscoUnityDataandtheDirectory.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: CiscoUnityDataandtheDirectory in PDF format

SHA-256 | 0ed981ee6f56020843dbe31ca7c5323ef05162a60cf1b117b6df8baebfe77ac8
CiscoUnityDataArchitectureandHowCiscoUnityWorks.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: CiscoUnityDataArchitectureandHowCiscoUnityWorks in PDF format

SHA-256 | fdd46bc13dc1eace820102ad4888d65cb13f89fc929311b9880a833b35f23a91
CiscoVPNSolutionCenter2.2.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: CiscoVPNSolutionCenter2

SHA-256 | 5fa025c7778c981b1c537167a84fc0842e7aa89478f152486877e399d6540f29
ConfigurationManagement-BestPractices.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: ConfigurationManagement-BestPractices in PDF format

SHA-256 | de9b1ec357a9d6894cbb00fd9068d7f61c373c5727ce3e64d52511d1448907ff
ConfiguringIPAccessLists.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: ConfiguringIPAccessLists in PDF format

SHA-256 | 0b1fca23bf03e6a69d0fba3a06e0251a37cc2fb546eef34067bc0b832f47f651
Context-BasedAccessControl-IntroductionandConfiguration.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: Context-BasedAccessControl-IntroductionandConfiguration in PDF format

SHA-256 | 07f3d45e8c6cd60479c694cdc012a39ccca3202f7eae86427145c9bb17229e05
DeployingCiscoUnityinDiverseMessagingEnvironments.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: DeployingCiscoUnityinDiverseMessagingEnvironments in PDF format

SHA-256 | 7184e580d418bc614f24a811fcf96d9688f11b18098f5c6451000134f0619e24
DisasterRecovery-BestPractices.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: DisasterRecovery-BestPractices in PDF format

SHA-256 | d1cf1f2d33ac3e450eaa14ff5aad36df44c5a3dca56e24dbe4110d6cf1ad7c81
GPRS.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: GPRS in PDF format

SHA-256 | 50d9c9b9d2f9733e7100b1210b9306081cc0bdc21b4741e2a784445964f03ffb
HowNATWorks.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: HowNATWorks in PDF format

SHA-256 | 012fddb51ac6173b4768bead3579d97c6681c355a673f25ccdb15eba75bf85cd
HowVirtualPrivateNetworksWork.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: HowVirtualPrivateNetworksWork in PDF format

SHA-256 | d4e2850ad2d9102e4f77ffdbf391a51d875f0a33be19575f343c903bc4f519b6
ImprovingSecurityonCiscoRouters.pdf
Posted Nov 17, 2002

Defcon 10 Presentation: ImprovingSecurityonCiscoRouters in PDF format

SHA-256 | cdefa4914551dad92e8902c0503c7c2309b2eb12de2117c59dbe9bdb8114728f
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close