exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 41 of 41 RSS Feed

Files Date: 2006-06-05 to 2006-06-06

snortEvasion2.txt
Posted Jun 5, 2006
Site sigint-consulting.com

The recent Snort evasion vulnerability discovered had a patch released that may also be subverted.

tags | advisory
SHA-256 | 6713c1c92f3b4767472aff22b3efa487e4a2c9723ad15df8eb7a0ddb0ad7aa3a
timberland.txt
Posted Jun 5, 2006
Authored by O.G.

Timberland's search engine is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 23c9655851ea803ba9e09210220aa221603c74417ee0849d35a39c4f76a79428
joomlaMamboXSS.txt
Posted Jun 5, 2006
Authored by Yannick von Arx

Joomla/Mambo CMS component SimpleBoard versions 1.1.0 Stable is susceptible to cross site scripting vulnerabilities. Details provided.

tags | exploit, vulnerability, xss
SHA-256 | 201539348312a39f9dc5fa9bf0962c928f7d01a34a4a3f48604680f84265b27e
thc-nokia-rom-images.tar.gz
Posted Jun 5, 2006
Authored by thc | Site thc.org

This archive holds mobile phone ROM images for the Nokia 6630, Nokia n70, Nokia N-GAGE, and the Sony-Ericsson P900. THC has launched the Mobile Phone ROM Image and Reverse Engineering Invitation. Their intention with this release is to motivate other reverse engineers to take a look at the images and to discover other hidden secrets.

SHA-256 | bc4fb590e0a44fadd491f26c30c08691e07b7d46405ffc3de2c0f1f3862b4128
vmwareXSS.txt
Posted Jun 5, 2006
Authored by Stephen de Vries

VMware ESX server versions prior to 2.5.2 upgrade patch 2, prior to 2.1.2 upgrade patch 6, and prior to 2.0.1 upgrade patch 6 suffer from a cross site scripting issue.

tags | advisory, xss
advisories | CVE-2005-3619
SHA-256 | a34796941c3f2d47f3efc4621f3a3bf1f5ee34cf260af386d81d550d414dd84c
snortBypass.txt
Posted Jun 5, 2006
Site demarc.com

An evasion vulnerability in Snort allows an attacker to bypass detection of uricontent rules by adding a carriage return to the end of a URL.

tags | advisory
SHA-256 | 803dd63a6a3778f6ee004363050307a0c784353aab32515a427e3109498ca771
sourceEvade.txt
Posted Jun 5, 2006
Site sourcefire.com

Sourcefire is aware of a possible Snort evasion that exists in the http_inspect preprocessor. This evasion case only applies to protected Apache web servers. Patches will be released for the 2.4 and 2.6 branches on Monday, June 5th.

tags | advisory, web
SHA-256 | 0e8a450fd24d62290211428c042625ede7054755466104967d1cfbb243895d14
phpNukeInclude.txt
Posted Jun 5, 2006
Authored by ErNe | Site milli-harekat.org

All versions of PHP-Nuke suffer from remote file inclusion vulnerabilities.

tags | exploit, remote, php, vulnerability, file inclusion
SHA-256 | ad2eaccbee4c224dda71a27bcfb3c02a466cfc4dc07d608094d422fb03a6701d
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Jun 5, 2006
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: Various bug fixes.
tags | kernel, encryption
systems | linux
SHA-256 | b6b0b810276ab113630ca1b7c4eb99d35acd567ec7c0d33c1aa4b475caebbdb9
ZoneMinder-1.22.2.tar.gz
Posted Jun 5, 2006
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Mostly bug fixes with a couple of minor feature additions.
tags | web
systems | linux
SHA-256 | f8d0ee7e19eb17ff793cd0cc92629919233f1e52e07d5dbc73e02b7a611bd360
john-1.7.2.tar.gz
Posted Jun 5, 2006
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.

Changes: Bitslice DES assembly code for x86-64 making use of the 64-bit mode extended SSE2 with 16 XMM registers has been added for better performance at DES-based crypt(3) hashes with x86-64 builds on AMD processors. New make target for FreeBSD/x86-64.
tags | cracker
systems | windows, unix, beos
SHA-256 | 9a94d2417b13d49cb11aeb11186933fe0e0491904987ca47c88bf5710935c3cb
TOR Virtual Network Tunneling Tool 0.1.1.20
Posted Jun 5, 2006
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Various bug fixes including security fixes.
tags | tool, remote, local, peer2peer
SHA-256 | b251fd9079a40345beb5b67bcdf30c3292ee9220d2d062d583b89f3526015138
framework-2.6-snapshot.tar.gz
Posted Jun 5, 2006
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. The Framework will run on any modern system that has a working Perl interpreter, the Windows installer includes a slimmed-down version of the Cygwin environment.

Changes: More exploits added. Various bug fixes.
tags | tool, perl
systems | windows, unix
SHA-256 | 8b0e79b55fb861c947bbdb882b3f3655dece2693dd870f99d19cbd3fed23a35e
tinyca2-0.7.3.tar.gz
Posted Jun 5, 2006
Authored by Stephan Martin | Site tinyca.sm-zone.net

TinyCA is a simple GUI written in Perl-Gtk to manage a small certification authority. It works as a frontend to OpenSSL. TinyCA lets you manage x509 certificates. It is possible to export data in PEM or DER format for use with servers, as PKCS#12 for use with clients, or as S/MIME certificates for use with email programs. It is also possible to import your own PKCS#10 requests and generate certificates from them. It also lets you create and manage SubCAs for more complex setups. The most important certificate extensions can be configured with the graphical frontend. English and German translations are included.

Changes: Enhanced version detection. Changed command for openssl due to changed openssl behavior regarding fingerprints. Added "friendly name" to PKCS#12 export.
tags | perl, encryption
SHA-256 | cf7cbeed216e16b3674b69897b3ee62abdcaaf6bc30f305a760d800bd1c8b612
popa3d-1.0.2.tar.gz
Posted Jun 5, 2006
Authored by Solar Designer | Site openwall.com

popa3d is a POP3 daemon which attempts to be extremely secure, reliable, RFC compliant, and fast (in that order).

Changes: A couple of optimizations specific to x86-64 have been applied to the included MD5 routines.
systems | unix
SHA-256 | e7034336c1e4b6ed1ddff7c92851292d396d011237acb2268492f44cedbb7a7f
alph-0.21.tar.gz
Posted Jun 5, 2006
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Fixed some VERNAM trouble. Added input / output file support. Updated man page.
tags | encryption
SHA-256 | bea972240387196acb74685c83bfae93eabe38a36f2935b5f545f2456c9a38a3
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close