what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 256 RSS Feed

Files Date: 2004-05-01 to 2004-05-31

httprint_freebsd_202.zip
Posted May 25, 2004
Authored by Saumil Shah | Site net-square.com

httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the FreeBSD release.

Changes: Version 202 has a completely rewritten engine, internally, to increase efficiency and portability across platforms. A minor feature enhancement in version 202 is the ability to automatically follow 301 and 302 redirections.
tags | tool, web, scanner
systems | unix, freebsd
SHA-256 | a29d163083835e04f3ac34d48e56fcbc39f8f5cc7c18ea0d79acbfd4686fbc7b
httprint_linux_202.zip
Posted May 25, 2004
Authored by Saumil Shah | Site net-square.com

httprint is a web server fingerprinting tool. It relies on web server characteristics to accurately identify web servers, despite the fact that they may have been obfuscated by changing the server banner strings, or by plug-ins such as mod_security or servermask. httprint can also be used to detect web enabled devices which do not have a server banner string, such as wireless access points, routers, switches, cable modems, etc. httprint uses text signature strings and it is very easy to add signatures to the signature database. httprint can import web servers from nmap network scans, if they are saved in XML format. The current version adds the ability to save reports in CSV and XML formats, and features a completely new method of scoring by confidence ratings to minimize false positives. This version is the Linux release.

Changes: Version 202 has a completely rewritten engine, internally, to increase efficiency and portability across platforms. A minor feature enhancement in version 202 is the ability to automatically follow 301 and 302 redirections.
tags | tool, web, scanner
systems | linux, unix
SHA-256 | 3abdeb0ba0bc07b69489438ae6647d34460512df310036ac0f7ce7785a824e2f
netgearURI.txt
Posted May 25, 2004
Authored by Marc Ruef | Site computec.ch

Netgear RP114 devices, and possibly other related Netgear hardware, have a URI filtering bypass vulnerability when the URI being evaluated is larger than 220 bytes long.

tags | advisory, bypass
SHA-256 | 7c2791d42f4fe25ac35ea87b471ff12f43f5d2022deaf13d5ef51f4d2621d65f
nmapgrep-0.2.c
Posted May 25, 2004
Authored by blh | Site blh.se

nmapgrep is a small tool customized to grep regular expression patterns from a nmap log file and output the IP addresses that match the pattern.

Changes: Improved matching code.
tags | tool, nmap
systems | unix
SHA-256 | fee7b6368d25712423e3f5c6f72366c8809222691257594176a7019b4973204e
microsoft.owned.jpg
Posted May 25, 2004

Amusing graphic of Microsoft's UK web site getting compromised and defaced again in May, 2004.

tags | web
systems | unix
SHA-256 | edb2ed3493028fcae986a0d3855973827917f057e0b23a9a519176ced4557a53
The_Basics_of_Shellcoding.pdf
Posted May 25, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

White paper discussing the basics of shellcoding, a quick overview of assembly, and usage of shellcodes.

tags | shellcode
SHA-256 | 91df4a2a5aa6a6b5d59ad6bb47315c025fe3c9ede801c8998cd641028cfa2e6a
021829.html
Posted May 24, 2004
Authored by Rosalina Hamar

Variant vulnerabilities have been disclosed regarding the flaw in Mac OS X where code can be silently delivered via the disk URI handler vulnerability.

tags | advisory, vulnerability
systems | apple, osx
SHA-256 | 7f4de2005e09f74eb0be7ac3e2f6d7f05ddc88c8a54064407622cfebe1b4a6ca
liferayxss.txt
Posted May 24, 2004
Authored by Sandeep Giri

Liferay Enterprise Portal is said to be subject to multiple cross site scripting flaws.

tags | advisory, xss
SHA-256 | 6a406562d84aca76726075d51e3b23200851d5566a3bce7dbf86b4d418ad6b38
SP Research Labs Advisory 12
Posted May 24, 2004
Authored by Badpack3t, SP Research Labs | Site security-protocols.com

BNBT BitTorrent Tracker Beta 7.5 Release 2 and earlier versions are susceptible a denial of service due to a malicious crafted HTTP GET request. Sample exploit included. Tested on Windows XP SP1.

tags | exploit, web, denial of service
systems | windows
SHA-256 | 9890d7016baddf8fdcf712e31a16c8da51096b32a041e1fa58e9d203e5c84240
allegrodos.txt
Posted May 24, 2004
Authored by Seth Alan Woolley

Amusing simple one-liner that shows that 3COM 812 ADSL modems are still susceptible to 4 year old denial of service attacks.

tags | exploit, denial of service
SHA-256 | 26aae1a7af5d89cbe48405ff5017b10bf4bc1bca154fd25e8194f64e0b22955e
hydra-4.1-src.tar.gz
Posted May 23, 2004
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Ph-Neutral special release. New GTK GUI added and some bug fixes.
tags | web, cracker, imap
systems | cisco
SHA-256 | 8b59d0d841cc4678b31bce621bd10bf3cb81be9f314edbc697911c8026447c4e
Secunia Security Advisory 11678
Posted May 21, 2004
Authored by Secunia

A vulnerability, caused due to an unspecified error within Xconfig, has been discovered in Exceed versions 9.x. When exploited, local users can bypass certain restrictions.

tags | advisory, local
SHA-256 | ed2ff2c4f566f565d33db59092d739c063a6c615a912c4ac303918b0f624d4d2
zm-1.19.4.tar.gz
Posted May 21, 2004
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Language fixes and updates.
tags | web
systems | linux
SHA-256 | 357a2bc9ed8983c10210da4f617486ae2dd60362fba21b11f3e966eec2f996ef
boclient-1.3.1.tar.gz
Posted May 21, 2004
Authored by Dobrica Pavlinusic, Omega

boclient 1.3.0 - boclient is a remote windows administration tool which uses BackOrifice or NetBus servers on Windows. It is an improvement of version 1.21. Most recent versions have GNU readline support, NetBus commands, portability to other platforms (BeOS, QNX and 64bit architectures like Alpha) and async network I/O. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Initial non-developer release.
tags | remote, trojan
systems | windows, beos
SHA-256 | 4db03812b64cf1b08496e4cd2aadfdbcb229c4bcdfb7eae12997ad4e2a2ef389
jailutils-0.6.tar.gz
Posted May 21, 2004
Authored by Nate Nielsen | Site memberwebs.com

JailUtils is a collection of utilities for managing FreeBSD jails. They facilitate the orderly startup and shutdown of jails, list processes in jails, and do various other things.

systems | unix, freebsd
SHA-256 | c9d041599e62770672605ddf3c368a7c224e70f5897a27edcdf1db91ecdf06eb
snsadv72.txt
Posted May 21, 2004
Authored by Yuu Arai

An ActiveX Control provided by Symantec Norton Antivirus 2004 contains a remotely exploitable DoS condition. In order to trigger this vulnerability, malicious website administrators must induce Internet Explorer users to view a specially crafted web site, which will consequently consume a lot of system resources.

tags | advisory, web, activex
SHA-256 | b8d95ab82a67ea2b5d834503696acb10b2db9577517d8d464b4f51e4ac230bb8
snmpdadv.txt
Posted May 21, 2004
Authored by priestmaster | Site priestmaster.org

ucd-snmp versions 4.2.6 and below suffer from a buffer overflow on the command line when the daemon is spawned.

tags | advisory, overflow
SHA-256 | 24514b893dcbc9255cf0b3b4192324d7c0f00059646711e8fb3fc0a35111ed7c
e107flaw.txt
Posted May 21, 2004
Authored by Chinchilla

All versions of e107 have a vulnerability that allows html tags and content to be posted to the stats page and to be listed under Referers. This allows an attacker to put any site link or code they want on the list of Referers.

tags | advisory
SHA-256 | 3d071845699b3f18e1a62591cd0f475ad46e2ef07f146eec7372ff10fd3ab1a3
clsid.txt
Posted May 21, 2004
Authored by Roozbeh Afrasiabi

Microsoft Windows Explorer suffers from a flaw where it will execute underlying files when they are linked in html pages.

tags | advisory
systems | windows
SHA-256 | fa8e114e14244e1f93821759c64b4ffa1f4446012b15d9869310e70a1b766d32
mix.c
Posted May 20, 2004
Authored by Serial Killah

Simple generic backdoor protected by a password encrypted with an MD5 hash. Gets added into inittab.

tags | tool, rootkit
systems | unix
SHA-256 | e882134c2334e44c8578e2e5edbc6cf3a3e29bd4f6d910f9a7118cca31ac094f
openaanval-1.48-stable.tar.gz
Posted May 20, 2004
Site aanval.com

OpenAanval is an open-source web based Snort intrusion detection console. Currently supporting Snort and syslog, OpenAanval provides dynamic monitoring, comprehensive reporting and powerful alerting capabilities. OpenAanval supports multiple sensors of multiple intrusion detection system types. OpenAanval's web-browser interface provides live auto-updating technology which provides real time event viewing from any Internet connected web-browser.

Changes: Miscellaneous bug fixes including a client side memory leak. In addition various new features have been added and streamlined.
tags | tool, web, sniffer
SHA-256 | 77b12ac17e409a561b564cf05f38a1870ee616305166f1153043e242df097cef
cvs_solaris_HEAP.c
Posted May 20, 2004

Remote root exploit for stable CVS releases up to 1.11.15 and CVS feature releases up to 1.12.7. Solaris version. Anonymously submitted.

tags | exploit, remote, root
systems | solaris
advisories | CVE-2004-0396
SHA-256 | 65c674ac77ccd4a45957f097a3fcebfc7836743e95663c5b329449a7e1d5d93e
cvs_linux_freebsd_HEAP.c
Posted May 20, 2004

Remote root exploit for stable CVS releases up to 1.11.15 and CVS feature releases up to 1.12.7. Linux and FreeBSD version. Anonymously submitted.

tags | exploit, remote, root
systems | linux, freebsd
advisories | CVE-2004-0396
SHA-256 | cbba2ce54b3c6d2fab06e83029be065535aa55e80f9747949b5f4579b7f3ef21
CookiePathBestPractice.pdf
Posted May 20, 2004
Authored by Martin O'Neal | Site corsaire.com

Corsaire White Paper: Cookie Path Best Practice. A brief document discussing how and why a cookie path should be strictly defined.

tags | paper, web
SHA-256 | c30fa2410156b0fdf005bdaacdb6fc9efd561e2ce36194f3f8f20250a403b84a
SecureDevelopmentv06.pdf
Posted May 20, 2004
Authored by Glyn Geoghegan | Site corsaire.com

Corsaire White Paper: Secure Development Framework. This paper addresses the need for an infrastructure to exist in which things are securely developed to help mitigate the high costs incurred when vulnerable software is released into the wild.

tags | paper
SHA-256 | ae3a4aef9a3c1fb41a54ed92d274edc5a78883a841e8f4a1e084e12fb15c408e
Page 3 of 11
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close