what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 757 RSS Feed

Files Date: 2007-05-01 to 2007-05-31

firehol-1.255.tar.bz2
Posted May 22, 2007
Authored by Costa Tsaousis | Site firehol.org

FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.

Changes: See changelog.
tags | tool, spoof, firewall
systems | linux
SHA-256 | 9bf6cfa2765f05571a2301f0e9cef9e1c13cab4281f2ed0396e6cbf0d374b83d
honeytrap-0.7.0.tar.gz
Posted May 22, 2007
Authored by Tillmann Werner | Site honeytrap.sourceforge.net

Honeytrap is a network security tool written to observe attacks against TCP services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks and thus can provide early-warning information. The daemon monitors the network stream for incoming connections and dynamically starts server processes if it detects a request to an unbound port. Honeytrap can also be set up as a meta honeypot that forwards several attacks to other systems or, in mirror mode, redirects a connection back to the initiator. Several plugins are available for automated attack analysis.

Changes: Plugins can be prioritized. x86 CPU emulation module for generic shellcode analysis. Various other additions and improvements.
tags | tcp, system logging
systems | unix
SHA-256 | 30c5a5de71a068c6cd236063b57173bb15fa8e0408ee74e0eb080ccf00a41cdc
leadtools-overwrite.txt
Posted May 22, 2007
Authored by shinnai | Site shinnai.altervista.org

LeadTools Raster variant remote file overwrite exploit.

tags | exploit, remote
SHA-256 | 19ddae12e8d896f3cad71594b0c414bb26ca7413039dac580f3a6d50f71bc328
olbookmarks-sql.txt
Posted May 22, 2007
Authored by Cyber-Security | Site cyber-security.org

Ol Bookmarks Manager version 0.7.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c3c538bab37e275b2bf73188916fa35f71b99a7bc75dd5472e50cde460ca2e63
tutorialcms-bypass.txt
Posted May 22, 2007
Authored by Silentz | Site w4ck1ng.com

TutorialCMS versions 1.01 and below suffer from an authentication bypass vulnerability.

tags | exploit, bypass
SHA-256 | a07951fc5266415f66cf3c33cea26d50d130ac95fb053f6081b110e3670cc2b3
olbookmarks-rfi.txt
Posted May 22, 2007
Authored by ThE TiGeR

Ol Bookmarks Manager version 0.7.4 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | c2e02bba9562b20fc0f2c4746e45893102054dee2bb9c77292c7f5df0082a2de
wp213-ajax.txt
Posted May 22, 2007
Authored by Janek Vind aka waraxe | Site waraxe.us

Wordpress version 2.1.3 suffers from a blind SQL injection vulnerability in admin-ajax.php.

tags | exploit, php, sql injection
SHA-256 | 10c405189b522f3fdc50b8f1ca2a00587c6d7ee520495bc6b430efd405303e66
iis-dos.txt
Posted May 22, 2007
Authored by Kingcope

Microsoft IIS 6.0 /AUX/.aspx remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | befbaf311c1be1ef98f6433ed95ff3daee31ee10c817e56192b648bb3118e662
csrf-surf.txt
Posted May 22, 2007
Authored by Nexus | Site playhack.net

Whitepaper titled Cross Site Request Forgery: The Sea Surf.

tags | paper, web, csrf
SHA-256 | 5f2993a62fbb64d5422e96ba9b08bcc4be5bff77401acc7bef23bc85e71da389
suf-v1.1.zip
Posted May 21, 2007
Site loranbase.com

This program can send spoofed UDP packets with a user specified data, source and destination port. For Windows XP versions prior to SP2. Includes Delphi source code.

tags | denial of service, udp, spoof
systems | windows
SHA-256 | bd4242c6c7bce4fc24809fa15081e36d14cdf2202cab3d216c8c38a3bc162b6d
syn-v1.6.zip
Posted May 21, 2007
Site loranbase.com

Syn flooder for Windows XP versions prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | 08371b9ac880c3b02c72fbf7f7253ca3d95197f177fbec9238468e3601f9816d
udpflood-v1.0.zip
Posted May 21, 2007
Site loranbase.com

UDP Flooder for Windows 95 and above. It can send udp packets with a user specified data, source and destination port. Includes Delphi source code.

tags | denial of service, udp
systems | windows
SHA-256 | bd346a39aaf24f9e828d6fbd7d3529e7f49eea2dc33ef9234a102b9abcf13044
windowsrat-v1.0.zip
Posted May 21, 2007
Site loranbase.com

WindowsRAT is a small sized dos shell for windows. Just execute the exe on remote computer and connect it with telnet.

tags | remote, denial of service, shell
systems | windows
SHA-256 | 95079a022e0447fadfa904018f9e8e3335ef5426189f856ce83cefbd3afef6bb
smurf-v1.7.zip
Posted May 21, 2007
Site loranbase.com

Smurf for Windows XP takes advantage of networks without broadcast address filtering to flood a remote host with lots of ICMP traffic. For Windows XP versions prior to SP2. Includes Delphi source code.

tags | remote, denial of service
systems | windows
SHA-256 | 9aa5e2899788c6de2159246f9c7eea9b411aca4db98e5b706b38048695ce386d
sin-v1.3.zip
Posted May 21, 2007
Site loranbase.com

This program is a spoofed IRC nuker. For Windows XP versions prior to SP2. Includes Delphi source.

tags | denial of service, spoof
systems | windows
SHA-256 | cf4598606e7ec6528ad48e13aef00e638ef552f8af6f0c873a337e75a2f7c03f
pingflood-v1.0.zip
Posted May 21, 2007
Site loranbase.com

An ICMP Type 8 (ping) flooder for Windows 95 and above. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | 4eeee02e8f122c7a16100f6fde75cfc7e18ec63370facb7f56928c7759395071
kod-v1.3.zip
Posted May 21, 2007
Site loranbase.com

Kiss of Death denial of service attack. Only works on Windows XP prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | bd51e7f7f622a7c28cc58dff4607981e7d04d4dae47555fcdc2bfa4883366c32
jolt2-v1.3.zip
Posted May 21, 2007
Site loranbase.com

This program is the port of jolt2 attack to Windows XP for versions prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | fab47a4257313739a2c082a7ac1a8cf4d019cad352005ac19e177b6176cbf218
igmpbomb-v1.4.zip
Posted May 21, 2007
Site loranbase.com

This program sends oversized IGMP packets. This causes bluescreens and crashes Windows 98 boxes. Works with winsock2 (Windows 98 and above). Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | d1a245a1aeda797aab17e60c4907a711e66273f790fe5d8bf1a134c5db7030d4
bonk-v1.1.zip
Posted May 21, 2007
Site loranbase.com

This program is the port of bonk attack to Windows XP versions prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | 7a4bdb9008edfd098eca1bca2c37bde4eef7ae3dd1271967030ba4a7e8face0f
ath-v1.3.zip
Posted May 21, 2007
Site loranbase.com

Sends an icmp echo request including +++ATH0 string in its ICMP data. This data resets vulnerable modems if victim replies the request. Only works on Windows XP prior to SP2. Includes Delphi source code.

tags | denial of service
systems | windows
SHA-256 | 292e5a0f49bc5fa0f5224e5e7ade8b35988d806db25ed0868b2f54bc5ed760c9
Ubuntu Security Notice 436-2
Posted May 21, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 436-2 - USN-436-1 fixed a vulnerability in KTorrent. The original fix for path traversal was incomplete, allowing for alternate vectors of attack. Bryan Burns of Juniper Networks discovered that KTorrent did not correctly validate the destination file paths nor the HAVE statements sent by torrent peers. A malicious remote peer could send specially crafted messages to overwrite files or execute arbitrary code with user privileges.

tags | advisory, remote, arbitrary
systems | linux, juniper, ubuntu
advisories | CVE-2007-1799
SHA-256 | 9639d94610747e9a97954734b5c101e1362174b07ea0275b2e5704d1ab214c07
VMware Security Advisory 2007-0004.1
Posted May 21, 2007
Authored by VMware | Site vmware.com

VMware Security Advisory - Multiple denial of service issues along with a directory traversal vulnerability has been fixed.

tags | advisory, denial of service
advisories | CVE-2007-1069, CVE-2007-1337, CVE-2007-1877, CVE-2007-1876, CVE-2007-1744
SHA-256 | a678b12e0b8ba30554e0498fe1d9269a513afd99bd97dd8c32508c86d25ff94e
REWTERZ-20070518.txt
Posted May 21, 2007
Authored by Muhammed Ahmed Siddiqui | Site rewterz.com

rewterz has discovered a critical vulnerability in Hidden Administrator. This vulnerability allows a remote attacker to execute arbitrary code in the context of the user who executed Hidden Administrator. Versions 1.7 and below are affected.

tags | advisory, remote, arbitrary
SHA-256 | 526e6ff2a121cacdb5f197605ddc3c3c999ac066ac8b15c49da5c127dc47f66a
ASPR-2007-05-14-1.txt
Posted May 21, 2007
Site acrossecurity.com

ACROS Security Problem Report #2007-05-14-1 - There is a session fixation vulnerability in HP Systems Insight Manager 4.2 and 5.0 SP4/5 (IM) that allows an attacker to gain administrative access to IM console. As a result, the attacker can take complete administrative control over all managed systems, upload and execute malicious code on them, extract any information from them and disable them at her will.

tags | advisory
SHA-256 | d39d5adb853db233faf38cc0069a7c6e5065e71f431d97ee7d5b6666e9216a87
Page 5 of 31
Back34567Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close