exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

022805.txt
Posted Mar 1, 2005
Authored by Amit Klein | Site webappsec.org

This paper describes several techniques for exposing file contents using the site search functionality. It is assumed that a site contains documents which are not visible/accessible to external users. Such documents are typically future PR items, or future security advisories, uploaded to the website beforehand. However, the site is also searchable via an internal search facility, which does have access to those documents, and as such, they are indexed by it not via web crawling, but rather, via direct access to the files. Therein lies the security breach.

tags | paper, web
SHA-256 | 95d07a72940beb4eb7d8ef7e8dce89e68ae8dd623e9569d62e531063c6e241f1

Related Files

grout-pre.tar.gz
Posted Apr 20, 2000
Authored by Ambient Empire

The geographical tracerouter for unix. It combines the fastest tracerouter with the ability to locate where the intermediate machines are located in the world.

tags | tool
systems | unix
SHA-256 | 957f35ba6bc4b75bb8076c3128b95ecfa078b5d0d8f18661cc29bd277d65b82a
lincrack.c
Posted Apr 20, 2000
Authored by w0rm

This is a very flexible, easy to use password cracker for the Linux/Unix platform. Just specify the dictionary file and the passwd file and your set. It attempts to crack each password in the passwd file using the words from the dictionary file.

tags | cracker
systems | linux, unix
SHA-256 | aaa548be3dd9642b28de076a0c47d9219f6698481dd270e20087bb6b40e3c253
ports2.c
Posted Apr 20, 2000
Authored by Dorian Goldman

Port scanner with a nice interface. Prompts for banner.

tags | tool, scanner
systems | unix
SHA-256 | 8bd800104043b93ad61675985333a24b5e4beecff4a27488c42726047481d2a1
f_ps.c
Posted Apr 20, 2000
Authored by telar

Fake PS. A ps trojan that hides multiple services of your choice.

tags | tool, trojan
systems | unix
SHA-256 | 3e09bcc70563d501bf7435df4fda3acaa09a7abdba7db06486c4dfa3bbb3af65
adv5.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit

systems | linux
SHA-256 | 6477942c86ee6dd52bac80bf956cbed6863e52d464ae92b66bef9d20f7902b03
adv4.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)

systems | linux
SHA-256 | 189114c1fe799648b677c16aa36fcc179942f685bacb5b0318c678f0cb0f01b9
x11amp.txt
Posted Apr 19, 2000
Authored by Grampa Elite

Vulnerability: Any user can overwrite any file in the system with x11amp ver .70.

tags | exploit
SHA-256 | f854507d6d5cef408de353bd42cf556273c973adfc5e305c7058e4a61a099eab
ids.ps
Posted Apr 19, 2000

Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection

tags | paper, denial of service
SHA-256 | 2159a30060cec7d5e267b083c2935a46e14e8b1e37d3534565f3efa1ef7b3539
mrtg-2.8.12.tar.gz
Posted Apr 19, 2000

MRTG is a The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing GIF images which provide a LIVE visual representation of this traffic. Check http://www.ee.ethz.ch/stats/mrtg/ for an example. MRTG is based on Perl and C and works under UNIX and Windows NT. MRTG is being successfully used on many sites around the net.

tags | tool, web, perl
systems | windows, unix
SHA-256 | 04f52e0390bd6cc108991b7624c21faa480891f43b97c671a973436de3a5f26b
cnd.txt
Posted Apr 15, 2000

Calling Number Delivery: An explanation of Caller ID and how it works.

tags | telephony
SHA-256 | 63b8cbc2ad0c10c550351d2b5c22369b7301879e7b3adede2c751ae2a07e7fb5
anon_email.txt
Posted Apr 4, 2000
Authored by David Mazi, M. Frans Kaashoek

The Design, Implementation and Operation of an Email Pseudonym Server - Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. This paper describes the design, implementation, and operation of nym. alias. net, a server providing untraceable email aliases.

tags | paper, protocol
SHA-256 | 0c099b336055f09c9351fc9c1f4348ed952daddd46f6257773bb376358b5bfab
ddos-routing.txt
Posted Feb 24, 2000
Authored by Fernando P. Schapachnik

Distributed Deniel Of Service attacks - A proposal based on routing. This paper describes a technique that -hopefully- can be used to defeat the recent DDOS attacks. The solution presented here is bases on routing. It requires a certain amount of extra network infrastructure.

tags | denial of service
SHA-256 | d4db3368713cb2f7d6a456ebc627dd45e014bc76bf35def353db951d27f392a7
UW-CSE-00-02-01.tgz
Posted Feb 11, 2000
Authored by Stefan Savage | Site cs.washington.edu

This paper describes a technique for tracing anonymous attacks in the Internet back to their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed", source addresses. In this paper we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by an attacker without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed "post-mortem" -- after an attack has completed. We present one implementation of this technology that is incrementally deployable, (mostly) backwards compatible and can be efficiently implemented using conventional technology. In pdf and postscript format.

tags | denial of service, spoof
SHA-256 | bb7e781a8fbc104cfd9119ecf7c8caf54c5aab786c654c2d11dd9b87b1c48922
ssh-1.2.27.tar.gz
Posted Dec 21, 1999

Secure Shell 1.2.27

tags | shell, encryption
SHA-256 | d8019676755739309815d9817b7335f0c3327e2fd6c7be60e4eea1500764d5cd
ssh-2.0.13.tar.gz
Posted Dec 21, 1999

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

tags | remote, shell, encryption
SHA-256 | 449d88890616bf676cfd4765d574bcc00c229de6f95d705ca527a86b5ca61eb9
syn.jpg
Posted Dec 10, 1999
Authored by synnergy

Synnergy Logo

SHA-256 | 7f4dc86b1699f79f287979fb5965ebcbcb44700c6c727c0f27567bfc66c6dbf6
backdoor.txt
Posted Aug 17, 1999

Text about hacking from your web browser by checking the PHF bug and some CGI bugs.

tags | paper, web, cgi
SHA-256 | 6083224d95d5acfbc20b146b869d6b1a8aa0534b55712a0e774946fd4dd73105
crh004.zip
Posted Aug 17, 1999
Authored by crh

Issue 4 of the Confidence Remains High e-zine - Contains 1. Generic scanner 2. VITO 3. Jolt.c 4. Phf shell spawning tekneek 5. Hide.c 6. Tridentd.c Phones / Scanning / Radio. 1. Norweigen PABX list.Miscellaneous. 1. Windows trick 2. sIn inf0z 3. DCC trick 4. Mars systems @*.jpl.nasa.gov 5. The issues list 6. Damned warez pups 7. Simple NFS techniques 8. #hebrew 9. Lord Somer

tags | shell, magazine
systems | windows
SHA-256 | ab3673a5fd3d0e022797d0cf47b3f120ea1c2ccd33dc3fe8f05d9a13b0a5aa72
crh005.zip
Posted Aug 17, 1999
Authored by crh

Issue 5 of the Confidence Remains High e-zine - 1. Gerbil.c 2. Replaceit.sh 3. Security.sh 4. Wozzeck.sh 5. Chattr tekneeq Phones / Scanning / Radio. 1. 617 dialups 2. FM radio bugs Miscellaneous. 1. AT&T and Intel assembly syntax 2. sIn inf0z 3. Wassup with NT?! 4. More #hebrew 5. Linking to /dev/zero 6. Creating a crypto-worm (philosophy)

tags | worm, cryptography, magazine
SHA-256 | 3fa51934a88561954c8318ec3d69cf59f1abadc37f847d6bc2e5f99c554cf641
crh006.zip
Posted Aug 17, 1999
Authored by crh

Issue 6 of the Confidence Remains High e-zine

tags | magazine
SHA-256 | c4a0a44b238b7db100423cd98f926f7890008ea6786b74d0a641bfcfd9030a5c
crh007.zip
Posted Aug 17, 1999
Authored by crh

Issue 7 of the Confidence Remains High e-zine - 1. ipwatch.c 2. Automountd remote exploit for SunOS 5.5.1 3. statscan.c - statd scanner 4. FrontPage exploit 5. sunscan.sh 6. classb.c 7. icmp444v.c Phones / Scanning / Radio. 1. Realistic Pro-50 scanner discriminator mod Miscellaneous.1. rpc-stat.pgp 2. If you're really dumb 3. inetd backdoors 4. 0wned 5. dnscan 6. The issues list for 1998

tags | remote, magazine
systems | solaris
SHA-256 | 0000b18b83a8bc1c2fafae6e1a5a952328f0b66526fd26bb4a84e4f2f47c78d8
crh008.zip
Posted Aug 17, 1999
Authored by crh

Issue 8 of the Confidence Remains High e-zine - 1. Jimmy J's "vintage warez" 2. routed remote 3. Wingate scanner 4. LinSniffer 0.666 5. SunOS 5.5.1 in.rshd trojan Phones / Scanning / Radio. 1. Outdials 2. BlueBoxing in the UK in '98 3. UK Phone Definitions and Abbreviations. Miscellaneous. 1. Top 10 reasons why 2. Hacking Digital Unix 4.0 3. FreeBSD 2.2.5 rootkit 4. l0ckd0wn.sh

tags | remote, trojan, magazine
systems | unix, solaris, freebsd
SHA-256 | 8d7a0d6c07136e9c1f56dd87465718cc4042e19e34b5fcb43820fd4cff4bfda8
NoisyBear.class
Posted Aug 17, 1999

Class file for NoisyBear hostile java applet.

tags | java
SHA-256 | 2356e655ef8f65240ce3e9e815263d301aded77d0bb5cda9b8d7d23294d4d67e
NoisyBear.java
Posted Aug 17, 1999

This Java Applet displays a stupid looking bear with a clock superimposed on his belly. It refuses to shut up until you quit the browser. Warning: Hostile applet!

tags | java
SHA-256 | a8fb75cb44029d31c379268156b4ceadae295db0140bc1d061957f3b057e2cfd
NoisyBear.txt
Posted Aug 17, 1999

Small text file on NoisyBear

tags | java
SHA-256 | 44bf00cb1fe432fe31d781a71262f0946a36f00f83328204b43c32407474a753
Page 4 of 4
Back1234Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close