exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 146 RSS Feed

Files Date: 2002-12-01 to 2002-12-31

sneaky-sneaky-1.48.tar.gz
Posted Dec 24, 2002
Authored by phish

Sneaky-sneaky is a bidirectional spoofed ICMP tunnel backdoor that has built-in encryption and logging capabilities. It communicates via echo replies keeping the true source IP address encrypted inside of the payload.

Changes: Now with delays, decoys, timeouts and spoofing options.
tags | tool, spoof, rootkit
systems | unix
SHA-256 | 68642e29c750a07324bbd4b41c47ada6295fab5d3d2fd03cca555ec48dd88322
iDEFENSE Security Advisory 2002-12-23.t
Posted Dec 24, 2002
Authored by Zen-Parse, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 12.23.02 - Easy Software Products' Common Unix Printing System (CUPS) and Xpdf contains an integer overflow which allows local users to access to privileges of the lp user.

tags | advisory, overflow, local
systems | unix
SHA-256 | e81e2a28739ce0e03f0d90790fd5da01dbb23ef7ab8ffd101528dfb6b83c6577
sara-4.1.3.tgz
Posted Dec 24, 2002
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Added test for newdsn.exe, Microsoft IIS Executable File Parsing, Updated smb.sara to check for user enumeration, registry access, and guessable passwords, Updated to detect vulnerable mysql services, fixed bugs.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 8f025cf31750a12703c64a86eacd722bd5f5d51bb400edb7c5850782e15094d6
Samhain File Integrity Checker
Posted Dec 24, 2002
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Improved spec files, several other small fixes.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 5785571526df2595b8b223c853a6586d8b19777dce109d2f53d620b3bb2fbf10
eeye.flash.6.0.65.0.txt
Posted Dec 21, 2002
Authored by eEye Digital Security | Site eEye.com

Macromedia Shockwave Flash Malformed Header Overflow #2 - Macromedia Flash Player versions less than 6.0.65.0 allows remote code execution via HTML email and web pages. Fix available here.

tags | advisory, remote, web, overflow, code execution
SHA-256 | 018888a6c288f72d88dd0f5fddd22ecea22e5d438947c9dabdd5059490d624a6
iDEFENSE Security Advisory 2002-12-20.t
Posted Dec 21, 2002
Authored by iDefense Labs, David Zentner | Site idefense.com

iDEFENSE Security Advisory 12.20.02 - Microsoft"s Hotmail service contains cross site scripting vulnerabilities which allow session hijacking and arbitrary action execution.

tags | advisory, arbitrary, vulnerability, xss
SHA-256 | aafa3e18425d9f046e54dc567ee2fcce025cf56610f8af6c1a137a6f802f4eca
real.helix.9.0.txt
Posted Dec 21, 2002
Authored by Mark Litchfield | Site ngssoftware.com

RealNetworks Helix Universal Server v9.0 and below for Windows, FreeBSD, HP-UX, AIX, Linux, Sun Solaris 2.7 & 2.8 contains buffer overflows which can cause code to be executed as SYSTEM over tcp port 554.

tags | advisory, overflow, tcp
systems | linux, windows, solaris, freebsd, aix, hpux
SHA-256 | b39acaf9964d4389121ef064fdeeef266502772719c45556094be1fe82988b89
tmpwatch.txt
Posted Dec 21, 2002
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Common use of 'tmpwatch' utility and its counterparts triggers race conditions in many applications, sometimes allowing privilege escalation. Includes information on races, file removal, fixes, and more.

tags | paper
systems | unix
SHA-256 | b15d4299f68a0564b2dbf1976f2695381bb7cba4b78e5f66221c135ce941492e
enceladus-3.9.11.txt
Posted Dec 21, 2002

The Enceladus Web and FTP server suite for Windows below v3.9.11 contains a buffer overflow which allows remote command execution. More information available http://www.mollensoft.com.

tags | advisory, remote, web, overflow
systems | windows
SHA-256 | bc56ff8f7fcff42ba61b72dc3e45978976994ff033fe3cee6516d6863ba75f6e
php-nuke_mail_crlf.patch
Posted Dec 21, 2002
Authored by Ulf Harnhammar

PHP-Nuke v6.0 allows remote users to send email to any address on the internet by entering malformed email addresses. Patch included.

tags | advisory, remote, php
SHA-256 | f324c19dbb506141832f85077a736850e56b7b492f689c7d1dbbcc19a71e156e
oss-00001.txt
Posted Dec 21, 2002
Authored by Burn-X | Site opensourcesecurity.com

Pine v4.44 contains a local buffer overflow in the -x command line option.

tags | advisory, overflow, local
SHA-256 | 1ef3e1c8a908d842ce87bbcf654b3e3ef0f8778d1b327a332d6955a77aa0658f
CA-2002-37.windows.shell
Posted Dec 21, 2002
Site cert.org

CERT Advisory CA-2002-37 - A buffer overflow vulnerability in the Microsoft Windows Shell allows remote attackers to execute arbitrary code via malicious email message, malicious web page, or browsing through a folder containing a malicious .MP3 or .WMA file. More information available here.

tags | remote, web, overflow, arbitrary, shell
systems | windows
SHA-256 | b026b59e3f14b7596aad9085a7b4d8183bb3649a364863979123a168facb9351
CA-2002-36.ssh
Posted Dec 21, 2002
Site cert.org

CERT Advisory CA-2002-36 - Multiple vendors' implementations of the secure shell (SSH) transport layer protocol contain vulnerabilities that could allow a remote attacker to execute arbitrary code with the privileges of the SSH process or cause a denial of service. The vulnerabilities affect SSH clients and servers, and they occur before user authentication takes place. OpenSSH is not vulnerable. More information available here.

tags | remote, denial of service, arbitrary, shell, vulnerability, protocol
SHA-256 | fc2411c6232f4bec9861e44cc3a10cda790c69eb0b22484d00b48e73b52c0feb
iDEFENSE Security Advisory 2002-12-19.t
Posted Dec 21, 2002
Authored by Zen-Parse, David Endler, iDefense Labs | Site idefense.com

iEasy Software Products' Common Unix Printing System (CUPS) vCUPS-1.1.14-5 to 1.1.17 contains an integer overflow in the CUPSd interface which allows attackers to gain the permissions of the LP user and the sys GID. In addition, a race condition allows any file to be overwritten as root. Affected systems include Red Hat 7.3, 8.0, and OS/X 10.2.2.

tags | advisory, overflow, root
systems | linux, redhat, unix, apple, osx
SHA-256 | 7c6ba1d4608fa090e656e197e22e24c9627af18d3d3a39b6434f0b189bc7eae8
polycom.auth-bypass.txt
Posted Dec 21, 2002
Authored by Tamer Sahin | Site securityoffice.net

The Polycom ViewStation FX set top video system allows users to change configuration of the video conferencing system. A bug introduced in the Polycom ViewStation FX Release v4.2 allows users full access to the video conferencing system including changing the admin password.

tags | advisory, bypass
SHA-256 | efc1399c213252cbb952cdd78a552988b8c768fd731044eb40928f453a8af4c3
smbrelay.cpp
Posted Dec 21, 2002
Authored by Sir Dystic | Site cultdeadcow.com

Smbrelay.cpp is a TCP NetBT level SMB man-in-the-middle relay attack for Windows in c++ which uses Winsock.

tags | tcp
systems | windows, unix
SHA-256 | 25be6d08cf50dae600f844fd91c3a35cfea28bd3048af0b343fac39a45b76dee
lcrack-1.0.1.tar.gz
Posted Dec 20, 2002
Site usuarios.lycos.es

Lepton crack is a password cracker that works on Cygwin and Linux and cracks MD4 hashes, MD5 hashes, NTLM, and HTTPpassword hashes from Domino R4.

tags | cracker
systems | linux
SHA-256 | 89875cf60cf3828b1d061d9b94f2b56f562e545a14a3fce1a7d6e664ea91568e
sshd.sh
Posted Dec 20, 2002
Authored by Cow Dog

Ssh client local root exploit which sets LD_PRELOAD and attempts to run /tmp/setuid. Works against old ssh clients.

tags | exploit, local, root
SHA-256 | eef2877afe4d941e69f7ba9aa3a9436d5478e81477e99426820f9fedbae143fc
session_fixation.pdf
Posted Dec 20, 2002
Authored by Mitja Kolsek | Site acros.si

Session Fixation Vulnerability in Web-based Applications - Many web-based applications employ some kind of session management to create a user friendly environment. Sessions are stored on a server and associated with respective users by sessions identifiers (IDs). Naturally session IDs present an attractive target for attackers, who, by obtaining them, effectively hijack users' identities. Knowing that, web servers are employing techniques for protecting session IDs from three classes of attacks: interception, prediction, and brute force attacks. This paper reveals a fourth class of session attacks against session IDs: session fixation attacks.

tags | paper, web
SHA-256 | e8a24bd745c20648c072b561ba4717627c93a9e649320428356139d804231bd5
fk-018.tgz
Posted Dec 20, 2002
Authored by Wizdumb, fk

Forbidden Knowledge Issue 18 - This issue has information on smart cards and GSM hacking. Includes gsm-hack, a package to communicate with the fake smart card described in the article.

tags | magazine
SHA-256 | f80d18d00accc92b12462e6b9e7eccdfef86aa8fe1da7ddf06eeb87be438c618
Nmap Scanning Utility 3.10 ALPHA 7
Posted Dec 20, 2002
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Newest alpha - Upgraded libpcap from version 0.6.2 to 0.7.1. Fixed Windows, OpenBSD, and non-IPv6-enabled machines compilation problems. Improved the way ICMP port unreachables from intermediate hosts are handled during UDP scans.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | f02fc48d1103101fd976d849cc82fa1a7ee17c7f6735b55bd103dfbb2ffaa579
logrep-1.2.9.tar.gz
Posted Dec 18, 2002
Site logrep.sourceforge.net

Logrep is a framework for extraction and presentation of information from several kinds of logfiles. Currently Snort, Squid, Postfix, Apache, Trend Micro VirusWall, and Microsoft IIS are supported. Includes HTML reports, 2D analysis, overview page, secure communication, and bar charts.

Changes: Bug fixes.
tags | system logging
systems | unix
SHA-256 | fa96bac45d395d3ac5d8b750aaf90bb7099fbcf5ef096ceff0272c03a8fdd237
LDasm-0.04.53.tar.gz
Posted Dec 18, 2002
Authored by Ravemax | Site rover.wiesbaden.netsurf.de

LDasm (Linux Disassembler) is a Perl/Tk-based GUI for objdump/binutils that tries to imitate the look and feel of W32Dasm. It searches for cross-references (e.g. strings), converts the code from GAS to a MASM-like style, and much more.

Changes: Fileoffset is calculated and is displayed. Screen shot here.
tags | perl
systems | linux
SHA-256 | f6adaed7d64c1cb2b5338b0f8a9ca16f597170edb56fca926f6a82e2d426c189
radmind-0.9.2.tgz
Posted Dec 18, 2002
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: User support has been added to the server with PAM, and there is a new version of libsnet. Bugs were fixed.
tags | tool, intrusion detection
systems | unix
SHA-256 | f71badc22a7689502a4abfd3a2248515c5651fe679af719925c5f9ff7499d980
mimedefang-2.28.tar.gz
Posted Dec 18, 2002
Authored by Dianne Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.11 / 8.12's "milter" API and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: A final bug in the scheduler has been fixed, and mimedefang-multiplexor should run very smoothly on busy mail servers. You can now skip body filtering based on sender, relay, or recipient; this improves performance if you don't want to filter outbound mail. Bug fixes added.
systems | windows, unix
SHA-256 | e8d4693d63f13b1cbd05dce7e995ebe42d31c50b0b44908a882e5a3a63875af5
Page 3 of 6
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close