exploit the possibilities
Showing 76 - 100 of 100 RSS Feed

Files

FaceTime RTP Video Processing Heap Corruption
Posted Nov 6, 2018
Authored by Google Security Research, natashenka

There is a memory corruption issue when processing a malformed RTP video stream in FaceTime that leads to a kernel panic due to a corrupted heap cookie or data abort. This bug can be reached if a user accepts a call from a malicious caller. This issue only affects FaceTime on iOS, it does not crash on a Mac.

tags | exploit, kernel
systems | ios
advisories | CVE-2018-4384
MD5 | e1efd0319dcc1218c75d95f35d08574b

Related Files

gShield-2.0.4.tgz
Posted Mar 29, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: There is now a traceroute toggle, the log-level is configurable, the CLOSED chain has been reordered, a "flush" option has been added, additional IANA reserved blocks have been folded in, and there is a miscellaneous cleanup.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | d3c649ab809234854fc917098d8e9230
gShield-2.0.2.tgz
Posted Jan 25, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: This release has misc. cleanup and removal of misc. redundant entries. Logging options for reserved drops and dhcp have been added/enhanced. Full highport access is now a toggle. Transparent-proxy options, fixes for passive ftp, and options for bind/domain forwarding have been added. Services now use getservent to determine port selection. misc cleanup.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | 01ffe4d74859ec8eb1657295f45979bc
gShield-2.0.1.tgz
Posted Jan 15, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Additional chains for output readability, cleanups to the logging output, no longer logging SMB broadcasts, and an option for easily adding user-defined open ports.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | 4ffd0ce19d3997319b984ede1092d6ed
gShield-2.0.0.tgz
Posted Jan 10, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Conversion to iptables, adding support for multiple NATs, support for routable addresses and protection, DMZ support, integrated port-forwarding, MAC-specific filtering for administrative hosts, and stateful tracking has been added.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | 7455acf0b872ad3625cccb72daa7eb67
gspy-0.1.2-src.tar.gz
Posted Jul 22, 2000
Authored by Lawrence P. Glaister | Site gspy.sourceforge.net

Gspy retrieves images from a video4linux device and processes these into a daily mpeg movie on the disk drive. Each image is recorded with a time stamp to insure accurate real world correlation. Special motion detection algorithms are used to reduce the size of the daily movies by eliminating pictures with similar content as well as the normal compression obtained via the mpeg process. The result is a time lapse video per day with nonlinear time compression using only the images of interest. Screenshot available here.

systems | linux
MD5 | 48e012647be50f3b40f1dc5039a4dd5a
gssftp.txt
Posted Jun 15, 2000
Authored by Tom Yu

Remote vulnerabilities in GSSFTP daemon - A remote attacker can preform denial of service attacks, and local users can get root access. Source distributions which may contain vulnerable code include MIT Kerberos 5 releases krb5-1.1 and krb5-1.1.1, while MIT Kerberos 5 releases krb5-1.0.x is not vulnerable.

tags | exploit, remote, denial of service, local, root, vulnerability
MD5 | e2ec2cc3f7dc8548a2e2a37fd25b53c2
gShield-1.5.4.tar.gz
Posted Mar 13, 2000
Authored by R. Gregory | Site linuxmafia.org

gShield is an aggressive, modular, ipchains-based firewall script. Features include: easy configuration through a BSD-style configuration file, optional IPmasq support, TCP-wrapper-like funtionality for service access, and extremely restrictive defaults. It hopes to make administrating a comprehensive firewall easier, as well as offering robust protection while being easy to setup/maintain.

Changes: Increased MASQ timeout for ICQ. Port-forwarding section can now accomodate not using ipmasqadm. Added DNS entries. Logs directly via logger. Forwarding now seperate from MASQ, Added auto-detection of interface status. BIND/imapd added to port-forwarding services.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | 4c1394450bd18316ddae5cc7cb1665d6
gShield-1.5.1.tar.gz
Posted Feb 22, 2000
Authored by R. Gregory | Site linuxmafia.org

gShield is an aggressive, modular, ipchains-based firewall script. Features include: easy configuration through a BSD-style configuration file, optional IPmasq support, TCP-wrapper-like funtionality for service access, and extremely restrictive defaults. It hopes to make administrating a comprehensive firewall easier, as well as offering robust protection while being easy to setup/maintain.

Changes: A serious typographical error was fixed in ipmasqadm. Outgoing blocks for non-routable source addresses were added, and a check to ensure ip-forwarding is disabled unless specifically enabled was added as well.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | d489791d7923dc102d7428d5ca48ef79
gShield-1.3.tgz
Posted Jan 10, 2000
Authored by R. Gregory | Site linuxmafia.org

gShield (formerly Godot's Modified Modular Firewall), is an aggressive, modular, ipchains-based firewall script. Features include: easy configuration through a BSD-style configuration file, optional IPmasq support, TCPwrapper-like funtionality for service access, and extremely restrictive defaults. It hopes to make administrating a comprehensive firewall easier, as well as offering robust protection.

Changes: Various typo fixes, an option to drop traceroutes, a safety option to ensure remote X connections are dropped, various ip_masq_mod tweaks, fixes for POP3 errors, fixes for incorrect cable DHCP port designations, and readdition of various winclient trojan protection.
tags | tool, firewall
systems | linux, bsd
MD5 | ecf13699acd6294f892f3611b696e5a6
gswin.zip
Posted Dec 21, 1999

gswin.zip

tags | encryption, steganography
MD5 | f7d4fd9ea14179e92489cec12d861aef
gsm.txt
Posted Dec 21, 1999

gsm.txt

tags | encryption
MD5 | 0ff04980a271c887cc615305d388baa1
gShield-1.0.tgz
Posted Dec 9, 1999
Authored by R. Gregory | Site muse.linuxgeek.org

gShield (formerly Godot's Modified Modular Firewall), is an aggressive, modular, ipchains-based firewall script. Features include: easy configuration through a BSD-style configuration file, optional IPmasq support, TCPwrapper-like funtionality for service access, and extremely restrictive defaults. It hopes to make administrating a comprehensive firewall easier, as well as offering robust protection.

Changes: The name has been changed to gShield (from GMMF), configuration is now BSD-style, the code has been cleaned up, and security enhancements have been made.
tags | tool, firewall
systems | linux, bsd
MD5 | c962810bef9364e5982312da3ecf0f00
gsal-19991128-pdf.tar.bz2
Posted Dec 2, 1999
Authored by Jose Antonio Revilla

Spanish translation, for the Kurt Seifried's Linux Administrator's Security Guide in pdf format.

systems | linux
MD5 | aa343d4cad1868a5015cdcd1fb0f0420
gsal-19991128-ps.tar.bz2
Posted Dec 2, 1999
Authored by Jose Antonio Revilla

Spanish translation, for the Kurt Seifried 's Linux Administrator's Security Guide in postscript format.

systems | linux
MD5 | e087366b9c142bd582500fe599e5ce84
gsal-19991128-txt.tar.bz2
Posted Dec 2, 1999
Authored by Jose Antonio Revilla

Spanish translation, for the Kurt Seifried's Linux Administrator's Security Guide in text format.

systems | linux
MD5 | eab95cafa18e36ede03018dc7330e1d5
gsal-19991128-htm.tar.bz2
Posted Dec 2, 1999
Authored by Jose Antonio Revilla

Spanish translation, for the Kurt Seifried's Linux Administrator's Security Guide in HTML format.

systems | linux
MD5 | a4ee26d5027153b236f9f8dfec463e5b
gscan.c
Posted Nov 5, 1999
Authored by shadowpenguin

A generic banner scanner. eg scan for qpop 110, wuftpd 21, wingates 23, telnet banners 23, etc etc

systems | unix
MD5 | ce09b86504ce12e42f80a4627d2abfc3
gsd_faq.html
Posted Oct 5, 1999

FAQ for gsd.exe

MD5 | 4422d2376a43b27252565bb9092618be
gsd.exe
Posted Oct 5, 1999
Authored by Arne Vidstrom

GSD (Get Service Dacl) gives you the DACL (Discretionary Access Control List) of the Windows NT service you specify as a command line option.

systems | windows, nt
MD5 | 68d340db93e090c0fd05c5b63b705d0c
gspot.2.0.patch
Posted Aug 17, 1999
Authored by Gordon Messmer

GSpot 2.0 - Gspot is a control panel for cDc's Back Orifice. As of 2.0, Gspot requires GTK+ 1.2. Gspot was written using cDc's original Unix client sources, only the front end has really changed. Right now Gspot has all of the capabilities of cDc's client for MS Windows, but also allows cut-and-paste, better layout, session saving and command scripting. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Added options to save the information returned by Gspot to a file, and to record and play back a sequence of commands (scripting).
tags | trojan
systems | windows, unix
MD5 | f31ab97084c37499894c3d41b96f7275
gspot.patch
Posted Aug 17, 1999
Authored by Gordon Messmer

GSpot 1.21 - Gspot is a control panel for cDc's Back Orifice. It uses the GTK+ widget set, and should compile with either GTK+ 1.0 or 1.2 series. Gspot was written using cDc's original Unix client sources, only the front end has really changed. Right now Gspot has all of the capabilities of cDc's client for MS Windows, but also allows cut-and-paste, and a larger, more descriptive list for the commands. This is the first release of gspot. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows, unix
MD5 | 3b68a6b6e6796693253c07245392bd95
gspot121.tar.gz
Posted Aug 17, 1999

GUI Back Orifice client for *NIX - GSpot 1.21 - Gspot is a control panel for cDc's Back Orifice. It uses the GTK+ widget set, and should compile with either GTK+ 1.0 or 1.2 series. Gspot was written using cDc's original Unix client sources, only the front end has really changed. Right now Gspot has all of the capabilities of cDc's client for MS Windows, but also allows cut-and-paste, and a larger, more descriptive list for the commands. This is the first release of gspot. Working hack of Hackers Information Report Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows, unix
MD5 | c6c51786cf9985324afb2e0012539243
gswtnet.zip
Posted Aug 17, 1999
Authored by Georgia Softworks

Windows NT Secure Telnet Server with FULL data stream encryption. Loads of features, turns NT servers into true, secure multi-user systems.

systems | windows, nt
MD5 | 6695c700cf15757bcea3dfbae60de133
gscan.c
Posted Aug 17, 1999
Authored by marv alpert

A generic banner scanner that can be modified to scan remote systems for banners of any vulnerable software programs desired.

tags | exploit, remote
MD5 | 515e097cc18ddca64cfc09177d929213
gscan.zip
Posted Aug 17, 1999
Authored by bzero

gscan is a generic banner scanner for windows, class A greps for any banner on any port. For Windows.

tags | exploit
systems | windows
MD5 | 9aef53e7d3ff4fe79f0c5142a6a790de
Page 4 of 4
Back1234Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    10 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close