exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 32 of 32 RSS Feed

Files Date: 2006-03-22 to 2006-03-23

patch-2.6.16-karp
Posted Mar 22, 2006
Authored by Don "north" Bailey | Site aversion.net

kArp, the Kernel ARP hijacking kernel patch for Linux. Any ethernet driver (including 802.11 drivers) is supported. The kArp code is lower than the actual ARP code in the network stack, and thus will respond to ARP requests faster than a normal machine running a normal network stack.

tags | kernel, patch
systems | linux, unix
SHA-256 | 0041c5c641a9fe9c4986490cf0fd17c3e0820f599289f6d95ee0da1ff8e6a2c7
Mercur-5.0.c
Posted Mar 22, 2006
Authored by Tang Ellison

Mercur IMAPD 5.0 SP3 Remote Exploit

tags | exploit, remote
SHA-256 | dd30eb87449435a179e9bb86708d4bcd13589508b49294f43757046154a8e7b8
BetaParticle-6.0.txt
Posted Mar 22, 2006
Authored by Mustafa Can Bjorn | Site nukedx.com

BetaParticle Blog versions less than or equal to 6.0 suffer from multiple SQL injection vulnerabilities.

tags | advisory, vulnerability, sql injection
SHA-256 | 7c8c24a9f7606deb31b7173b397b8ea5d9a356a20399210ad028fe0d2818ac54
SLAB500.txt
Posted Mar 22, 2006
Authored by Justin_T

Due to insufficient sanity checking, SLAB500 suffers from arbitrary file read and full path disclosure vulnerabilities.

tags | advisory, arbitrary, vulnerability
SHA-256 | c8283285aefa40bf1a23e474f42d3e425a89f332c06952c023e0683e1409899d
DNS-Amplification-Attacks.pdf
Posted Mar 22, 2006
Authored by Gadi Evron | Site isotf.org

This paper outlines a Distributed Denial of Service (DDoS) attack which abuses open recursive Domain Name System (DNS) name servers using spoofed UDP packets. A network analysis of one of these attacks is looked at in detail.

tags | paper, denial of service, udp, spoof
SHA-256 | 3f4668679ef95860c66856b62884f8dbb32079765e1a7b9e0c0e4d1653bf2ad4
vm.pdf
Posted Mar 22, 2006
Authored by Val Smith | Site offensivecomputing.net

Detecting the Presence of Virtual Machines Using the Local Data Table - This paper describes a method for determining the presence of virtual machine emulation in a non-privileged operating environment. This attack is useful for triggering anti-virtualization attacks and evading analysis.

tags | paper, local
SHA-256 | 48ac374b43d646206bf8a59b9cc0aed6ac19a76791acaea176314b493393c68e
ibp-v2.0.4.txt
Posted Mar 22, 2006
Authored by Mr.SNAKE

Invision Power Board v2.0.4 suffers from multiple XSS vulnerabilities.

tags | advisory, vulnerability
SHA-256 | ac2ab60398ce81f909efcecb6103b98ab8288411aa0539b0331d4fbf19a9fc0e
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close