what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 557 RSS Feed

Files Date: 2002-11-01 to 2002-11-30

winfingerprint-0.5.4.zip
Posted Nov 17, 2002
Authored by Vacuum | Site winfingerprint.sourceforge.net

Winfingerprint v0.5.4: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQLSERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, E numerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes.

Changes: Fixed Multiple connections to remote registry leaving open handles. Added memory leak checking for DEBUG builds and fixed some memory leaks found with it. Added nbtstat-like query to UDPSockets() function to perform NetBIOS Lookup if NetWkstaGetInfo() call fails. Multitudes of other changes included in the changelog.
tags | remote, registry
systems | windows
SHA-256 | c45a685becd894b737307ef8fc67eb36056f51363c88acc40028f5fd07a243f4
mapper-2.19.tar.gz
Posted Nov 17, 2002
Authored by phish

Mapper is a network connectivity tester that employs a number of techniques to try and guess if a host is alive or not. Since many machines have ICMP firewalled off, it uses 7 different TCP and ICMP tests in attempting to gain some sort of response. Mapper can send spoofed decoys and use random delays for added stealth.

tags | tool, spoof, tcp
systems | unix
SHA-256 | 8e6ed6fd200d9037a5a4ceeac6f7a9e3a958b867e1b25983b6da7715b9c81c01
pfilter.pl
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

PFilter filters OpenBSD PF log files parsed by tcpdump and prints colored messages. Both /var/log/pflog and pflog0 are supported for real-time logging. Tested on OpenBSD 3.2.

tags | tool, sniffer
systems | openbsd
SHA-256 | 06aabdf94e4b27e355ac9c84239893655812953cf957332b8fdef3f30e001dd9
amnesia.pl
Posted Nov 17, 2002
Authored by cers | Site cers.tk

Amnesia is a simple encryption/decryption tool for files and directories that uses a 702 bit key built off of a user provided password.

tags | perl, encryption
SHA-256 | a64c0312a17205d862e7a23e63ab2d92577591796a8be88bf0c8a50a5deb33de
liteserve.txt
Posted Nov 17, 2002
Authored by Matthew Murphy

A vulnerability in the LiteServe combination server for Win32 exists in that the handling of filenames on Win32 platforms may reveal the code of a desired CGI script to an attacker. Windows handles file names with the period character (0x2E) on the end as if the character had been removed. LiteServe fails to compensate for this behavior, and is vulnerable to a simple CGI disclosure attack.

tags | exploit, cgi
systems | windows
SHA-256 | 2c3ca28c00d0930e2a9c6fbc4f72dc74895e351d73e4de6f97aa89bb5230a2ad
XSS-Cookie-Advisory.txt
Posted Nov 17, 2002
Authored by NightHawk

Cross Site Scripting vulnerabilities exist in the e-mail web services of hotmail.com, yahoo.com, and excite.com. These problems allow for cookie capturing of unsuspecting victims who may easily give up their cookies via clicking on a link in an e-mail or elsewhere and with the link actually pointing to the legitimate site.

tags | exploit, web, vulnerability, xss
SHA-256 | 0e1d0d54940384d01ff7c3049f87a8a7e2540acdafd2a17cb783e60afe5122f5
psibrute.com.txt
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

This DCL script abuses the old psi_mail trick on VAX/VMS systems to remotely find valid users.

systems | vax
SHA-256 | b300bdc9bf7a8a50ee833fcd7c6502f1b542165feca28c88b135ae16d0afbccb
snortctl.tar.gz
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site aenigma.mediaservice.net

A suite of scripts that were originally part of the AEnigma DIDS Project. The script snortctl is for management of the Snort NIDS. The snortfilter is a log parser and colorized.

tags | tool, sniffer
SHA-256 | a20e34b031a3b811e776cf26ef2b23b8da7a07a37c0d686dcea96aab426d35a4
havoc-0.1d.tar.gz
Posted Nov 17, 2002
Authored by Marco Ivaldi | Site 0xdeadbeef.info

HAVOC is a random ARP traffic generator which will temporarily hose your ethernet segment. Bug fix of previous release (0.1c)

tags | denial of service
SHA-256 | 74e17c81361042e28aa21c339279aa472c86be6884323f0e8f0583ed01d48727
proxyscan.c
Posted Nov 17, 2002
Authored by sit0 | Site defcon.one.pl

Multithreaded Proxy Scanner for UNIX v0.7.0. This proxy scanner uses a small PHP script to collect open proxy servers.

tags | tool, scanner, php
systems | unix
SHA-256 | f104e807c621cceb31c16056158d12c795b3dc603408f99872db08030dd301e3
sorsync.c
Posted Nov 17, 2002
Authored by Sorbo

Remote exploit for rsync version 2.5.1 and below run on Linux. This exploit makes use of a simple frame pointer overflow.

tags | exploit, remote, overflow
systems | linux
SHA-256 | 6d22b5088d7fc52eb994bcfe37975d15f67800c96849738dce0efa68d5b1fe86
exploitipppd.c
Posted Nov 17, 2002

Another exploit for ipppd, the daemon that is part of the isdn4linux-utils package and is part of the default install for many linux distributions. Tested on SuSE 7.3 and should work on SuSE 8.0. Anonymously submitted.

tags | exploit
systems | linux, suse
SHA-256 | 5010025186a5b9e7bdc4e46a0ff7cd95eee0761951c2b034cc7db0f606d8cd82
iispop.txt
Posted Nov 17, 2002
Authored by Securma Massine

The IISPop E-Mail Server from Curtiscomp.com is vulnerable to a denial of service attack via a simple buffer overflow on the listening daemon.

tags | denial of service, overflow
SHA-256 | f1e9f711eabd7012bda2d2d99a807a06d454bfa9e37157608e2983ae2f405a47
zeroobug.txt
Posted Nov 17, 2002
Authored by Xpl017Elz | Site wizard.underattack.co.kr

INetCop Security Advisory #2002-0x82-004 - Various buffer overflow vulnerabilities exist in Zeroo HTTP Server v1.5. Remote linux exploit included to gain root privileges.

tags | exploit, remote, web, overflow, root, vulnerability
systems | linux
SHA-256 | a3c4fb3627efc81e628826beed19110486973e4f8ac5a7bd42bc897ce5b93c6a
libhttpdbug.txt
Posted Nov 17, 2002
Authored by Xpl017Elz | Site wizard.underattack.co.kr

INetCop Security Advisory #2002-0x82-003 - LibHTTPD, a utility that can be used to add basic web server capabilities to an application or embedded device, is vulnerable to a buffer overflow which allows remote attackers to gain root access to the system.

tags | exploit, remote, web, overflow, root
SHA-256 | 42b98d2d9176568731b8e14b52d0f6712290e40350893e64b5996c712275747a
lightwebug.txt
Posted Nov 17, 2002
Authored by Xpl017Elz | Site wizard.underattack.co.kr

INetCop Security Advisory #2002-0x82-002 - A buffer overflow in Light HTTPd version 1.0 allows for remote attackers to grab a shell or perform related activities as the webserver uid.

tags | exploit, remote, overflow, shell
SHA-256 | 4394e54d71505d1fce1d0784dbc84067ece93adfb1a1d1cad4e863b4f87b14c9
Tinywebug.txt
Posted Nov 17, 2002
Authored by Xpl017Elz | Site wizard.underattack.co.kr

INetCop Security Advisory #2002-0x82-001 - A directory traversal vulnerability has been found in Tiny HTTPd 1.0. Basic exploitation is documented.

SHA-256 | a49d55847f0e0b697cc4797e61934daffcf7b2aaf646fca37369ef068a3705ce
loggy-0.3.tgz
Posted Nov 17, 2002
Authored by Evil

Loggy is a log cleaner that will remove an IP address in the standard /var/log files under linux along with cleaning up wtmp, utmp, lastlog, etc.

tags | tool, rootkit
systems | linux, unix
SHA-256 | 287d1642b6111bc0527c95c818dcc5263a986daa55198b2805ec37c83adc5a56
filelist.xml
Posted Nov 16, 2002

Defcon 10 Presentation: filelist

SHA-256 | 434f931c401a3a76527e65459c234d2a93ae568a54e248afe8ad4aee195e3889
frame.htm
Posted Nov 16, 2002

Defcon 10 Presentation: frame

SHA-256 | 03f5c9cfcd17038408545ba3a9207b8f631c9804e36c4c699cf81cc92a3c034c
fullscreen.htm
Posted Nov 16, 2002

Defcon 10 Presentation: fullscreen

SHA-256 | 6c219ceea2a7b7279bb55e020ca34467d49038eb48b00a380a8005e6d7349665
master01.htm
Posted Nov 16, 2002

Defcon 10 Presentation: master01

SHA-256 | 3ae84ca169f8d767ee5ca4f9cdf8967703c9725aa6ccba67264d8ee50f2dfc0c
master56_image004.gif
Posted Nov 16, 2002

Defcon 10 Presentation: master56_image004 in GIF format

SHA-256 | d1ff3c4714eb5c9622f6b60715681dc0c595df90b59f7a197fe20b58c8d90986
master56_image005.gif
Posted Nov 16, 2002

Defcon 10 Presentation: master56_image005 in GIF format

SHA-256 | 8807e8e8248bd8aa6ece9b59cd1aab6e0f2d27f639ca6d6b7b2e005836b3478e
master56_stylesheet.css
Posted Nov 16, 2002

Defcon 10 Presentation: master56_stylesheet

SHA-256 | 109f4ffb9b4cdd248ebd506dc591b33c59e193963ed123173dbea8648736e03c
Page 5 of 23
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close