exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 256 RSS Feed

Files Date: 2004-05-01 to 2004-05-31

wgetuhoh.txt
Posted May 18, 2004
Authored by Hugo Vazquez

Wget versions 1.9 and 1.9.1 are susceptible to a symlink attack during a phase where it downloads the file to a temporary filename but does not actually lock the file.

tags | exploit
SHA-256 | 3e19a9e65f1b07c2febfde7d6bffc9cc7a814a75db5421d998b8a9cb89dcc8c5
802.11vuln.txt
Posted May 18, 2004
Site auscert.org.au

AUSCERT Advisory - A vulnerability exists in hardware implementations of the IEEE 802.11 wireless protocol that allows for a trivial but effective attack against the availability of wireless local area network (WLAN) devices.

tags | advisory, local, protocol
SHA-256 | a46c2a37097c474213beefb0ef777f388574dfbff75a232f91c1838edbf91fe4
lhasilly.txt
Posted May 18, 2004
Authored by Lukasz Wojtow

LHA has some additional buffer overflows in the extract_one function.

tags | advisory, overflow
SHA-256 | 5a53496931d36f0f0629ce52c2693ceccacf6032e71a671af6253290e91d1570
mailbomb.pl
Posted May 18, 2004
Authored by Mike Jackson

Mailbomb is a Perl script used to aid system administrators in locking down spam filters.

tags | denial of service, perl
SHA-256 | bd9b327974cf2fc56b8afff647d595772d8002fdff6715b18a99617f665b8b65
kernsh-0.2b-p1.tgz
Posted May 18, 2004
Authored by Kernsh Project | Site kernsh.org

This utility was written to allow for easy access to the kernelspace for testing insertion of modules, accessing miscellaneous kernel information, and allows for an easy test environment.

Changes: Various enhancements and bug fixes.
tags | tool, kernel
systems | unix
SHA-256 | 14b2a36a62e422787d27a7c092ba4f5173809ea1b33331a8a949a7e234f67f46
Aire-1.0-en.zip
Posted May 18, 2004
Authored by Oscar Gallego Sendin | Site robota.net

AIRE is an 802.11 network discovery utility for Microsoft Windows XP. Upon finding a wireless access point, it displays pertinent information (timestamp, ESSID, channel, mode, etc) and has various useful features like a power meter display and other APs within range.

tags | tool, wireless
systems | windows
SHA-256 | 3cda61bb9f2d7d08af278454ecb10065fe45d20e4c2f20c68b87c0fdbd223293
oinkmaster-1.0.tar.gz
Posted May 18, 2004
Authored by Andreas Oestling | Site nitzer.dhs.org

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

Changes: Feature enhancements, bug fixes, and many other improvements.
tags | tool, perl, sniffer
systems | bsd
SHA-256 | acd85eeb4b35eecc6aace83f16e870501f129c00ce925eb81da5576ff45a6827
lsassaroot.zip
Posted May 17, 2004
Authored by sub

Microsoft LSASS vulnerability auto rooter. Downloads and executes code from a FTP server.

tags | exploit
SHA-256 | f71ef7270796d05800fff06da2bb58e37b947b69d61fbedbb27101d5571716ba
tcpreplay-2.2.1.tar.gz
Posted May 17, 2004
Site sourceforge.net

tcpreplay is a BSD-style licensed tool to replay saved tcpdump files at arbitrary speeds. It provides a variety of features for replaying traffic for both passive sniffer devices as well as inline devices such as routers, firewalls, and the new class of inline IDS's. Many NIDSs fare poorly when looking for attacks on heavily-loaded networks. tcpreplay allows you to recreate real network traffic from a real network for use in testing.

Changes: Fixed some bugs and compile issues.
tags | tool, arbitrary, intrusion detection
systems | unix, bsd
SHA-256 | 9d8239023b75dd6c0b9e911839f95de8c525490ec95b4e149405ac24a212f5b2
xscreensaver-4.16.tar.gz
Posted May 17, 2004
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock and has more than 150 modes.

Changes: New modules 'polyhedra', 'fuzzyflakes', 'antinspect', and 'providence'. Fixed randomization in 'noof'.
tags | root
systems | unix
SHA-256 | e428b88cb6719b4deedf505ffb98fb7cbfecb4340e81c29857801aeeef329528
tcptrack-1.1.1.tar.gz
Posted May 17, 2004
Authored by Steve Benson | Site rhythm.cx

tcptrack is a packet sniffer which passively watches for connections on a specified network interface, tracking their states and listing them in a manner similar to the top command. It displays source and destination addresses and ports, connection state, idle time, and bandwidth usage. Screenshot available here.

Changes: Fixed a problem where tcptrack would silently not work on certain PPP connections, Support for NULL and RAW pcap interface types was added, tcptrack should now work on all Linux PPP, Ethernet, TUN/TAP, and local loopback interfaces. Tcptrack now compiles properly with gcc 3.4. An EXAMPLES section and a few extra notes were added to the man page about guessing, pause/sort options.
tags | tool, sniffer
SHA-256 | ffb8532569fd43819bf7a138a019f8da2eb141e62ce0b962d897e3e957d2f963
ettercap-NG-0.7.0_pre2.tar.gz
Posted May 17, 2004
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap NG is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 9e042be55dc3fc883314f68cf213147ecf2e919ac0fa03815dcf4e4ff60cb58b
mbd.tar.gz
Posted May 17, 2004
Authored by msconzo | Site security.tamu.edu

NetSQUID is a Perl script that sits inbetween Snort and IPTables. It looks at the alerts generated by Snort, then automatically creates an IPTables firewall entry to block problematic hosts (such as those infected by viruses). Web traffic is redirected to a webserver that can alert the user to the infection. The host is automatically unblocked after a specified time (hopefully reducing calls to your NOC). It can also send out DHCP address requests, so rogue DHCP servers can be detected by Snort.

tags | tool, web, perl, sniffer
SHA-256 | bcfefe2bdad05e3ef87f47860826e2d5667e3b1be86bc86bd387cc276c4aff77
webdevil-v1.tar.gz
Posted May 17, 2004
Authored by Mike Jackson

Webdevil is a tool used to create a distributed performance test against webservers by keeping connections alive until the server times them out. Slave daemon is included to assist in stress testing.

tags | denial of service
SHA-256 | 25e78e914b5eb91d497b9fe75d5d5c553156aa5477b01c8871545759d820db53
netjail-1.0.0.tar.gz
Posted May 17, 2004
Authored by Craig B. Agricola | Site netjail.sourceforge.net

netjail is a user-space mechanism for limiting the ability of a process to connect sockets in the PF_INET and PF_UNIX domain. The main motivation for this is to foil (or discover) spyware or "call home" code in suspect pieces of binary-distribution-only programs.

systems | unix
SHA-256 | 2062e3bd63e3da7ecd933c31add9dd03a66dafd8760d66429f68c0271fa79398
shellcode_kit.tgz
Posted May 17, 2004
Authored by priestmaster | Site priestmaster.org

Paper discussing shellcode usage that also includes troubleshooting and functionality information. Included are other whitepapers that help offer guidance, some tools, and some shellcodes.

tags | shellcode
SHA-256 | 4ec0245150d0f387da8ee2844e769c59d9caac00f74d87dd99b63675db28cafe
netwox_netwag-5.16.tgz
Posted May 17, 2004
Authored by Laurent Constantin | Site laurentconstantin.com

Netwox is a utility that can be thought of as a one stop shop network toolbox. It includes a graphical front-end called Netwag. This kit comes with 150 tools that can be used to perform a multitude of tasks that are very useful to any administrator. It supports various protocols (DNS, FTP, HTTP, NNTP, SMTP, SNMP) and performs low level functions like sniffing, spoofing traffic, and playing client/server roles. Both Windows and Unix versions are included.

tags | tool, web, spoof, protocol
systems | windows, unix
SHA-256 | d068f8caaf9544ef94715cbf215b51943bdd474f04bcc7da82636eeb7f0fd7c3
stresser-0.7.tar.gz
Posted May 14, 2004
Authored by Shen139 | Site sourceforge.net

Network Stresser is a traffic flooding utility designed to test the limits of a network. Supported protocols are TCP, UDP, ICMP, and IGMP.

tags | denial of service, udp, tcp, protocol
SHA-256 | 5a470bc7d3f865ca40fbcec208e4a8bbab5016ef9559792aaafb7edde840a8b5
HOD-symantec-firewall-DoS-expl.c
Posted May 14, 2004
Authored by houseofdabus

Remote denial of service exploit that makes use of the flaw eEye found in Symantec Norton Personal Firewall and other related products. Sends a malicious DNS response packet to a vulnerable host, causing the kernel to go into an infinite loop. Tested against Symantec Norton Personal Firewall 2004.

tags | exploit, remote, denial of service, kernel
SHA-256 | 210a95aedb58ff218b08a68c2698d26d830137378183d72bec41e0c872f2d24d
libShellCode-0.3.0.tar.gz
Posted May 14, 2004
Authored by ORK | Site orkspace.net

libShellCode is a library that can be included when writing Linux and BSD i386 based exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Multiplatform support. Support for chroot evasion and various other functionality.
tags | shellcode
systems | linux, bsd
SHA-256 | 006c6f21ee8c651042ebe887dc08fd248181cac69739071d143146cf6639a355
solaris-smc-advisory.txt
Posted May 14, 2004
Authored by Jon Hart | Site spoofed.org

Directory traversal attacks on the Sun Solaris SMC Web Server under releases 8 and 9 allow a remote attacker to determine whether or not a file exists on the underlying filesystem due to differences in error messages.

tags | advisory, remote, web
systems | solaris
SHA-256 | afadcf605c1e2463d9dc1006e2bcbc5d78588c56164f93b99e0edf5afbb88bee
ethereal-0.10.4.tar.gz
Posted May 14, 2004
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: This release fixes security-related bugs in AIM, MMSE, SIP, and SPNEGO. Various other features implemented as well.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 4401e49a993d9b5d017d7e4bc7705cc3873234e73d06b82f884dcd45213ec8d3
Ethereal Security Advisory 14
Posted May 14, 2004
Authored by Ethereal | Site ethereal.com

Ethereal Security Advisory Enpa-sa-00014 - It may be possible to make Ethereal crash or run arbitrary code by injecting a purposefully malformed packet onto the wire, by convincing someone to read a malformed packet trace file, or by creating a malformed color filter file. Versions affected: 0.9.8 up to and including 0.10.3.

tags | advisory, arbitrary
SHA-256 | 5bdf294b805f328fb3c4ea0444bf4b5ac67d19b595d748a2922380a8d2fd4d4f
icecast.txt
Posted May 13, 2004
Authored by Ned

A vulnerability exists in Icecast 2.x that can cause a denial of service condition.

tags | advisory, denial of service
SHA-256 | 99456ace2fa0f87f2f52c3e000095e321d0e4fa0dd63df8a4290735635761047
outpost.txt
Posted May 13, 2004
Authored by Armin Pelkmann

Outpost Pro Firewall has a flaw that allows malicious people to cause a Denial of Service. The issue has been reported in Agnitum Outpost Pro Firewall version 2.1. Prior versions may also be affected.

tags | advisory, denial of service
SHA-256 | 23a021e46fe713e14e1875d37a7ff9271b44c31c2d36e4da8d11ece37740c979
Page 5 of 11
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close