what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

b2ePMS 1.0 SQL Injection
Posted May 14, 2012
Authored by Jean Pascal Pereira

b2ePMS version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 112e6c34c3eedab58b88fdde47ed4866

Related Files

b2ePMS 1.0 SQL Injection
Posted May 27, 2012
Authored by loneferret

b2ePMS version 1.0 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 42298de74f5e382122bf6d9b2440ee81
banner.c
Posted Sep 13, 2000
Authored by Cyber_Bob

Banner.c v1.0 is an improved banner grabber - It is faster then existing banner grabbers, and compiles on many platforms. Features the ability to scan a rage of hosts and check for keywords in the banners.

tags | tool, scanner
systems | unix
MD5 | 5357e552ec9eb86cf77186bc0187ae04
Banner.rotating
Posted May 17, 2000
Authored by Zillion | Site safemode.org

A file called adpassword.txt is world readable as it is assigned the wrong permissions. This will allow a malicious attacker to read the contents of the file, to crack the DES encrypted password it contains (using a common-or-garden password cracker), and to edit banner entries,to add or to remove banners.

tags | exploit
MD5 | f14c2253d94b28844892aa0865a6d3c1
Bastille-1.0.4.pre1.tar.gz
Posted Mar 16, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Redid user interface, use of ssh when downloading, and small bugfixes.
systems | linux, redhat
MD5 | 67883805db94e83ee754df8dfd9c1157
bsdscan-0.5.1.tar.gz
Posted Mar 13, 2000
Authored by Fflewddur

BsdScan is a light-weight port-scanner designed for the BSD operating system. It currently supports scanning single hosts, subnets, logging results, scanning ports in a random order, specifying a port range, and a speed option to only scan commonly used ports.

Changes: Fixes for some errors in the argument-parsing code, and -l, -p, and -i options should work properly now.
tags | tool, scanner
systems | unix, bsd
MD5 | fb1fad9e5108d904fa13fb289744c9f3
buGregCon-hotfix.EXE
Posted Mar 8, 2000
Authored by Carlos Eduardo Oliveira

Fix for bugregcon.vbs, a small script that added c:/con/con to the registry, rendering a windows system useless.

tags | registry
systems | windows
MD5 | a161cb76b1ce2eec070c1583f2ea1e62
bsdscan-0.5.tar.gz
Posted Mar 7, 2000
Authored by Fflewddur

BsdScan is a light-weight port-scanner designed for the BSD operating system. It currently supports scanning single hosts, subnets, logging results, scanning ports in a random order, specifying a port range, and a speed option to only scan commonly used ports.

Changes: A start on implementing syn/ack stealth scanning, and lots of code cleanup.
tags | tool, scanner
systems | unix, bsd
MD5 | 57c1f6f2ebb5cdebd816a65ff0b3aa5b
bugregcon.vbs.txt
Posted Mar 7, 2000
Authored by Carlos Eduardo Oliveira

Windows script which modifies the registy to include c:/con/con, rendering the system useless and unfixable. May affect win2k as well.

systems | windows, 2k
MD5 | f5f3625b5d51a67afa940368d118826e
binds.c
Posted Mar 4, 2000
Authored by LSD | Site hack.co.za

IRIX 5.3 and 6.2 remote bind iquery overflow.

tags | exploit, remote, overflow
systems | irix
MD5 | 2f117b3fcceb11a27bd2e4924725d9e5
biew501.tar.bz2
Posted Mar 4, 2000
Authored by Nick Kurshev | Site biew.sourceforge.net

Biew is Binary vIEWer with built-in editor for binary, hexadecimal and disassembler modes. It contains a PentiumIII/K7Athlon/Cyrix-M2 disassembler, full preview of MZ, NE, PE, LE, LX, DOS.SYS, NLM, arch, ELF, a.out, coff32, PharLap, and rdoff executable formats, a code guider, a text viewer with russian codepages support, and many other features.

systems | linux
MD5 | b2ce070901ee1e0b2949a595bf3c087f
bsd-sm884.c
Posted Mar 2, 2000
Site hack.co.za

FreeBSD Sendmail 8.8.4 mime 7to8 remote exploit.

tags | exploit, remote
systems | freebsd
MD5 | 7201288b9bc93b5a3c37a7cc89553b06
basic_callerid_logger-1.0.0.pl.txt
Posted Feb 25, 2000
Authored by Bill Adams | Site evil.inetarena.com

Basic CallerID Logger is a perl script which provides CID logging to a database. It was written to use mysql but as long as you can generate the table for your own database, it should work fine. It puts the data into the table without any format changes; the idea is that an auxiliary program can make the format changes when it displays the data.

tags | perl
systems | unix
MD5 | 5b75829247cd7a2d73a4c5ae89b10ebd
bo120p08.zip
Posted Feb 25, 2000

Back Oriface 1.20 (Patch 8) - Patched to avoid detection by Drweb, Avp, and Norton Antivirus. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
MD5 | 7c6bfad724688a8639c802a32e90cfdb
btodd-whitepaper.txt
Posted Feb 22, 2000
Authored by Bennett Todd

Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempts to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. Plain text format, PS and HTML available at the homepage, here.

tags | denial of service
MD5 | aa3bb0212d4996647acb70f05d80b4a2
biew500.tar.bz2
Posted Feb 17, 2000
Authored by Nick Kurshev | Site biew.sourceforge.net

The best of the Linux hexeditors, with integrated assembler and disassembler.

systems | linux
MD5 | e1b4b6b7f3a83ed1e28c3396d33b3a2e
Bastille-1.0.3.tar.gz
Posted Feb 17, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Red Hat 6.1 support, better automation with the curses front-end, a curses front-end for script, and type-editing and bug fixes.
systems | linux, redhat
MD5 | 579b2b81a65b22403ca142ea32ce67d2
bordermanager-dos.txt
Posted Feb 9, 2000
Authored by Chicken Man

Novell Bordermanager 3.0 through 3.5 is vulnerable to a slow DoS. After 2 days, the firewall will deny all requests, and eventually crash completely.

tags | exploit, denial of service
MD5 | 13c41dd2761be4d342547a7caa048560
bytesaber.c
Posted Feb 3, 2000
Authored by Sectorx

Bytesaber generates various TCP packets by your request, written for testing a TCP fingerprinting based OS detection routine.

tags | tool, tcp
systems | unix
MD5 | 1628abea40be676628a464d07b6640c2
bg.jpg
Posted Feb 1, 2000

Bill Gates is Hitler.

systems | unix
MD5 | 2bb2af773c76e6604d63ee46c1813dfd
bruterh.sh
Posted Feb 1, 2000
Authored by Michal Zalewski

Recent PAM implementations allow you to use su to rapidly crack accounts without being logged. Tested on RH 6.1.

tags | exploit
MD5 | 10423e8f8ff63e2145b21fec615ece68
bypass.viruscheck.txt
Posted Feb 1, 2000
Authored by Neil Bortnak | Site bortnak.com

Many virus checking software skips directories entitled \\recycled or similar. This allows viruses and trojans a safe haven on many Windows 95, 98, and NT systems. Exploit code included.

tags | exploit, trojan, virus
systems | windows, 9x
MD5 | 320a950d8efaa33854f465fdb9e7eca2
brutus-aet2.zip
Posted Jan 31, 2000
Authored by G | Site hoobie.net

Brutus AET2 obtains username / password pairs using simple dictionary attack. Uses the following protocols: Pop3, ftp, imap, telnet, web server passwords, routers, and switches, and custom scripting to brute force anything. Features Multi-stage authentication engine, Single User mode cracking, Multiple User mode cracking, Full brute-force capability, Up to 60 simultaneous connections, Save and Continue Session, Auto-backup session, Import and Export Custom authentication types, Word list processing/generation, SOCKS proxy support and HTML Form analysis.

tags | web, imap, protocol
MD5 | 1e40a2f8de389bb662f8322e05f28c6d
bsdnethack.c
Posted Jan 25, 2000
Authored by s0ftpj, Pigpen

FreeBSD kernel module which can change options at every layer in a connection.

tags | kernel
systems | freebsd
MD5 | ffc89a579ef3bce8fd43bc51f97a2bcd
Bastille-1.0.2.tar.gz
Posted Jan 22, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible and educational Security Hardening Program for Red Hat Linux 6.0. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Bug fixes including a fix to the "Bastille breaks useradd" bug.
systems | linux, redhat
MD5 | 73150243e224f3131b5fd45fb5634f8e
bind15.htm
Posted Jan 21, 2000
Site oliver.efri.hr

If you're running BIND 8.2.2, and you have the victim.dom name servers in your cache, and victim.dom changes its server names, then any user who can make recursive queries through your cache can break your victim.dom lookups until the old records time out. The complete attack is one brief burst of legitimate packets. This is, of course, not as disastrous as BIND's next buffer overflow, but it's still an interesting example of how an attacker can use BIND's bogus "credibility" mechanism to exacerbate the effects of a seemingly minor bug.

tags | exploit, overflow
MD5 | a446133c2e1c21a5ae719d9a14a6e07d
Page 1 of 4
Back1234Next

File Archive:

January 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    8 Files
  • 2
    Jan 2nd
    11 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    2 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    18 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    10 Files
  • 10
    Jan 10th
    13 Files
  • 11
    Jan 11th
    2 Files
  • 12
    Jan 12th
    4 Files
  • 13
    Jan 13th
    21 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    12 Files
  • 16
    Jan 16th
    18 Files
  • 17
    Jan 17th
    11 Files
  • 18
    Jan 18th
    3 Files
  • 19
    Jan 19th
    2 Files
  • 20
    Jan 20th
    15 Files
  • 21
    Jan 21st
    21 Files
  • 22
    Jan 22nd
    19 Files
  • 23
    Jan 23rd
    19 Files
  • 24
    Jan 24th
    11 Files
  • 25
    Jan 25th
    1 Files
  • 26
    Jan 26th
    1 Files
  • 27
    Jan 27th
    19 Files
  • 28
    Jan 28th
    9 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close