what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 177 RSS Feed

Worm Files

html-trap.procmail.gz
Posted Dec 25, 2002
Authored by John Hardin

Email Security through Procmail 1.137 - Email Security through Procmail attempts to address the trend towards "enhancing" email clients with support for active content, which exposes end-users to many and varied threats, by "sanitizing" email: removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.

Changes: A bug in filename shortening that broke older Perl versions has been fixed. MIME mangling has been changed away from TEXT/PLAIN, as some mailers perform text-related operations on that MIME type, corrupting the attachments.
tags | worm, trojan
systems | unix
SHA-256 | 5835b37fa391d7f8b9c86f8d02e7ae80e677ffe9aa99a75bb00380be8f5fb085
nb_worm.c
Posted Dec 6, 2002
Authored by r-22 | Site manshadow.org

Netbios Worm v1.0 is a simple program which shows how a worm can spread across netbios shares.

tags | worm
SHA-256 | 5537a2f48a21330e64b052695d14ffa0b6b83bfeb27f1a5920b8dbc6e6617e57
CS-2002-04
Posted Nov 30, 2002
Site cert.org

CERT Quarterly Summary CS-2002-04 - Popular vulnerabilities being exploited by attackers these days include an Apache/mod_ssl worm, OpenSSL bugs, Trojan horse sendmail, libpcap, and tcpdump, multiple BIND bugs, and a heap overflow in Microsoft MDAC.

tags | worm, overflow, trojan, vulnerability
SHA-256 | 9533ea880a378b11d111894d5f2c202e138383a35bb1203499c902284363b2ee
wc.tar.gz
Posted Oct 25, 2002
Authored by Aion

Two modified versions of the slapper worm exploit made more user-friendly with simple interaction to define what host and port will be hit with the exploit.

tags | exploit, worm
SHA-256 | 33f0ab9cc7a39a816dbc6dddc8b1952feeb6871f5ad68e60decab4626431eb7c
soffic-0.2p2-2.4.19-patch.bz2
Posted Oct 18, 2002
Authored by Grupo de Seguranca | Site inf.ufrgs.br

SOFFIC is a Linux kernel patch for kernel 2.4.18 that provides file integrity control integrated into the normal system operation, on-the-fly. It checks a file's integrity each time a monitored file is opened for reading or execution, and issues a warning if it is found to be invalid. It protects against rootkits, backdoors, worms, viruses, Web defacement, unauthorized installation and use of new software, and much more.

Changes: Bug in v0.2p1 with floppy access operations fixed in v0.2p2.
tags | worm, web, kernel, patch
systems | linux, unix
SHA-256 | e082f3f9067f915031f89bfada0020dfaee0f295ebeb36bbe6ab687a39530944
soffic-0.2p1-2.4.19-patch.bz2
Posted Oct 5, 2002
Authored by Grupo de Seguranca | Site inf.ufrgs.br

SOFFIC is a Linux kernel patch for kernel 2.4.18 that provides file integrity control integrated into the normal system operation, on-the-fly. It checks a file's integrity each time a monitored file is opened for reading or execution, and issues a warning if it is found to be invalid. It protects against rootkits, backdoors, worms, viruses, Web defacement, unauthorized installation and use of new software, and much more.

Changes: Updated for kernel 2.4.19 and includes EXECDENY enabled by default. A small MD5 and SHA1 test was added to the SOFFIC initialization process.
tags | worm, web, kernel, patch
systems | linux, unix
SHA-256 | 05c175a604896782e0fcbcd14dc4dd9717f3a58ec9ab6bcd61c01732daafaead
cinik.tgz
Posted Sep 28, 2002

This is a modified version of the Slapper worm and was recovered from a compromised machine. Modifications to the worm let it mail system information, such as the ip address and processor type, to a Yahoo! email address. No other changes where made.

tags | worm
systems | unix
SHA-256 | d871493127f042e44746b0d6678a391feb86eed4b2f5224af756399b4ec22188
apache-ssl-bug.c
Posted Sep 25, 2002
Authored by Andy

This exploit abuses the KEY_ARG buffer overflow that exists in SSL enabled Apache web servers that are compiled with OpenSSL versions prior to 0.9.6e. The apache-ssl-bug.c exploit is based on the Slapper worm (bugtraq.c), which is based on a early version of the apache-open-ssl exploit.

tags | exploit, worm, web, overflow
SHA-256 | 436090b56a7078c33d435bf10253452623305a3c47e6e5c7f13c05a10118fd8d
soffic-0.1-2.4.18.tar.bz2
Posted Sep 20, 2002
Authored by Grupo de Seguranca | Site inf.ufrgs.br

SOFFIC is a Linux kernel patch for kernel 2.4.18 that provides file integrity control integrated into the normal system operation, on-the-fly. It checks a file's integrity each time a monitored file is opened for reading or execution, and issues a warning if it is found to be invalid. It protects against rootkits, backdoors, worms, viruses, Web defacement, unauthorized installation and use of new software, and much more.

Changes: Includes a lot of code cleanups and a completely new syntax for the Hash List description.
tags | worm, web, kernel, patch
systems | linux, unix
SHA-256 | 2063dc3d456ab6d0c6bcea1d44e61d352a87fc81ffa3f80061768a5feeeb91a7
apache-linux.txt
Posted Sep 19, 2002
Authored by Nebunu

Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.

tags | exploit, worm, shell, x86, tcp
systems | linux
SHA-256 | d556b921afa65987fbfce40ecaf730bfb6ad9fb761d32e4aaff71b95149502eb
free-apache.txt
Posted Sep 19, 2002
Authored by Nebunu

FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.

tags | exploit, worm, shell, tcp
systems | freebsd
SHA-256 | f406bf2bf696f6639b1cc39d57ebe81efe602557b5527375dfa26c0efe708046
bugtraqworm.tgz
Posted Sep 16, 2002

Linux Slapper Worm - This file contains the binaries and source code for the current Apache worm which affects multiple versions of Linux. It exploits an OpenSSL buffer overflow to run a shell on the remote system and also contains the ability to perform a DDoS attack. These files were found in the wild from machines that had been compromised.

tags | exploit, worm, remote, overflow, shell
systems | linux
SHA-256 | d3ec4e9ec583742751a572f26d177d723e381fbc16fa7071657472887becb4ab
CA-2002-27.sslworm
Posted Sep 16, 2002
Site cert.org

Cert Advisory CA-2002-27 - Linux systems running Apache with mod_ssl accessing SSLv2-enabled OpenSSL 0.9.6d or earlier on Intel x86 architectures are being automatically exploited by a worm which takes advantage of VU#102795 in OpenSSL. The worm scans for vulnerable systems on port 80, then sends exploit code over port 443. The worm also functions as a ddos network which communicates over TCP port 2002. Infected systems can be identified by the presence of /tmp/.bugtraq.c. Fix available here.

tags | worm, x86, tcp
systems | linux
SHA-256 | eab54007a6d2d6de6fd9dbc5ac0556c2d08bc495727db543468bf1eeac50eabb
worm.zip
Posted Aug 26, 2002

C source for the Internet Worm.

tags | worm, bbs
SHA-256 | 5f04b972289d78bce39a89422a166dc5510aac2fac47f8d450267c05590c6f4e
wpaper.zip
Posted Aug 26, 2002

A report on the internet worm dated November 7,

tags | worm, bbs
SHA-256 | e178dc8d5c92892e372d34202c18c471a4aac8204dd43d6586655b35345704e6
wormtour.zip
Posted Aug 26, 2002

A text on the famous internet worm and the guy

tags | worm, bbs
SHA-256 | afa39a9760405916c858cb5d59fb655636e8a1996d513a5e5b09ef0572337ead
bigeye-0.3.tar.gz
Posted Jul 8, 2002
Authored by Victor Lima | Site violating.us

Bigeye is a network utility dump that can be run in multiple modes - sniffer, logging connections, and even emulating protocols such as HTTP or FTP. The main focus of this program is to create an emulative service that would fool hackers/worms into thinking that they're exploiting a real service, but in fact, they're trying to exploit a fake service. The services currently available are ftp or http. Useful for honeypots.

tags | worm, web, system logging, protocol
systems | unix
SHA-256 | 539835fe1b31923f09bb295a5f862a421092758644cc95c5c8832c043cfe9635
apache-worm.c
Posted Jul 3, 2002

Apache-worm.c is an Internet worm based on the GOBBLES exploit for the Apache chunked encoding vulnerability. Affects FreeBSD 4.5 Apache 1.3.20-24.

tags | worm
systems | freebsd
SHA-256 | 7e8cfc693a27e75dad94cb2914b20571a773e114f787a941165fde8b56adc689
worms.pl
Posted Mar 31, 2002
Authored by Tyler Longren | Site longren.no-ip.org

Worms.pl is a script which checks apache log files for nimda and code red attempts.

tags | worm
SHA-256 | 27b82000f96e554f583c9807319cbd35af6c79b1a88f62f13b25cc0fe8e76f53
200201p.txt
Posted Mar 6, 2002
Authored by One Semicolon | Site onesemicolon.cjb.net

"Techniques a worm might use to be harder to locate" is a look at how worms may evolve to be harder to locate on a infected computer. It begins very simple to build up to some ideas that are quite complex. Includes example source code written in Perl.

tags | paper, worm, perl, virus
SHA-256 | 007cc93f8790a53659368914af4edfb50070e6df7bd9611be2379803052a050f
die_rst.tgz
Posted Sep 11, 2001

Remotely detects and cleans binaries infected with the RST worm.

tags | worm
SHA-256 | f572b0c5d049cab7ad21b761b97da40f1a2a16317df8dc03d078394a7337014d
rootscanner.pl
Posted Aug 15, 2001
Authored by Idawson

Rootscanner.pl is a scanner to find root.exe, the backdoor left by the code red II worm. Takes a starting and ending IP as input.

tags | tool, worm, root, scanner
systems | unix
SHA-256 | 21cbf680c0db7d3768a2e3451a2b47859affe8f26026c6864f0328fa8b512f66
microsoft.codered.txt
Posted Jul 30, 2001

The Code Red worm is likely to start spreading again on July 31, 2001 at 8:00 EDT. All IIS 4 and 5 users MUST upgrade immediately! Fix for NT 4.0 available here.

tags | worm
SHA-256 | 6c9c02a04bec8e369b5d9d6a559029473f1a46e95779d6c1759e5299505cb94c
CS-2001-02
Posted May 30, 2001
Site cert.org

CERT Quarterly Summary for May, 2001. Since the last regularly scheduled CERT summary, issued in February 2001 (CS-2001-01), we have seen a significant increase in reconnaissance activity, a number of self-propagating worms, and active exploitation of vulnerabilities in snmpxdmid, BIND and IIS by intruders.

tags | worm, vulnerability
SHA-256 | 4a4c69c74f9f9dfbf99e62d106c6b336a191d5792a093ca4b01aa1079a25f3c2
CA-2001-11.iisworm
Posted May 8, 2001
Site cert.org

Cert Advisory CA-2001-11 - A worm which uses the sadmind overflow and the IIS unicode bug is propagating on the internet. Solaris systems compromised by this worm are being used to scan and compromise other Solaris and IIS systems. IIS systems compromised by this worm can suffer modified web content.

tags | worm, web, overflow
systems | solaris
SHA-256 | b7fd1b3c4d68118378d002763085fde45537233ded7492d3360c662fb0f27415
Page 5 of 8
Back34567Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    467 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close