what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 177 RSS Feed

Worm Files

html-trap.procmail.gz
Posted Dec 25, 2002
Authored by John Hardin

Email Security through Procmail 1.137 - Email Security through Procmail attempts to address the trend towards "enhancing" email clients with support for active content, which exposes end-users to many and varied threats, by "sanitizing" email: removing obvious exploit attempts and disabling the channels through which exploits are delivered. Facilities for detecting and blocking Trojan Horse exploits and worms are also provided.

Changes: A bug in filename shortening that broke older Perl versions has been fixed. MIME mangling has been changed away from TEXT/PLAIN, as some mailers perform text-related operations on that MIME type, corrupting the attachments.
tags | worm, trojan
systems | unix
SHA-256 | 5835b37fa391d7f8b9c86f8d02e7ae80e677ffe9aa99a75bb00380be8f5fb085
nb_worm.c
Posted Dec 6, 2002
Authored by r-22 | Site manshadow.org

Netbios Worm v1.0 is a simple program which shows how a worm can spread across netbios shares.

tags | worm
SHA-256 | 5537a2f48a21330e64b052695d14ffa0b6b83bfeb27f1a5920b8dbc6e6617e57
CS-2002-04
Posted Nov 30, 2002
Site cert.org

CERT Quarterly Summary CS-2002-04 - Popular vulnerabilities being exploited by attackers these days include an Apache/mod_ssl worm, OpenSSL bugs, Trojan horse sendmail, libpcap, and tcpdump, multiple BIND bugs, and a heap overflow in Microsoft MDAC.

tags | worm, overflow, trojan, vulnerability
SHA-256 | 9533ea880a378b11d111894d5f2c202e138383a35bb1203499c902284363b2ee
wc.tar.gz
Posted Oct 25, 2002
Authored by Aion

Two modified versions of the slapper worm exploit made more user-friendly with simple interaction to define what host and port will be hit with the exploit.

tags | exploit, worm
SHA-256 | 33f0ab9cc7a39a816dbc6dddc8b1952feeb6871f5ad68e60decab4626431eb7c
soffic-0.2p2-2.4.19-patch.bz2
Posted Oct 18, 2002
Authored by Grupo de Seguranca | Site inf.ufrgs.br

SOFFIC is a Linux kernel patch for kernel 2.4.18 that provides file integrity control integrated into the normal system operation, on-the-fly. It checks a file's integrity each time a monitored file is opened for reading or execution, and issues a warning if it is found to be invalid. It protects against rootkits, backdoors, worms, viruses, Web defacement, unauthorized installation and use of new software, and much more.

Changes: Bug in v0.2p1 with floppy access operations fixed in v0.2p2.
tags | worm, web, kernel, patch
systems | linux, unix
SHA-256 | e082f3f9067f915031f89bfada0020dfaee0f295ebeb36bbe6ab687a39530944
soffic-0.2p1-2.4.19-patch.bz2
Posted Oct 5, 2002
Authored by Grupo de Seguranca | Site inf.ufrgs.br

SOFFIC is a Linux kernel patch for kernel 2.4.18 that provides file integrity control integrated into the normal system operation, on-the-fly. It checks a file's integrity each time a monitored file is opened for reading or execution, and issues a warning if it is found to be invalid. It protects against rootkits, backdoors, worms, viruses, Web defacement, unauthorized installation and use of new software, and much more.

Changes: Updated for kernel 2.4.19 and includes EXECDENY enabled by default. A small MD5 and SHA1 test was added to the SOFFIC initialization process.
tags | worm, web, kernel, patch
systems | linux, unix
SHA-256 | 05c175a604896782e0fcbcd14dc4dd9717f3a58ec9ab6bcd61c01732daafaead
cinik.tgz
Posted Sep 28, 2002

This is a modified version of the Slapper worm and was recovered from a compromised machine. Modifications to the worm let it mail system information, such as the ip address and processor type, to a Yahoo! email address. No other changes where made.

tags | worm
systems | unix
SHA-256 | d871493127f042e44746b0d6678a391feb86eed4b2f5224af756399b4ec22188
apache-ssl-bug.c
Posted Sep 25, 2002
Authored by Andy

This exploit abuses the KEY_ARG buffer overflow that exists in SSL enabled Apache web servers that are compiled with OpenSSL versions prior to 0.9.6e. The apache-ssl-bug.c exploit is based on the Slapper worm (bugtraq.c), which is based on a early version of the apache-open-ssl exploit.

tags | exploit, worm, web, overflow
SHA-256 | 436090b56a7078c33d435bf10253452623305a3c47e6e5c7f13c05a10118fd8d
soffic-0.1-2.4.18.tar.bz2
Posted Sep 20, 2002
Authored by Grupo de Seguranca | Site inf.ufrgs.br

SOFFIC is a Linux kernel patch for kernel 2.4.18 that provides file integrity control integrated into the normal system operation, on-the-fly. It checks a file's integrity each time a monitored file is opened for reading or execution, and issues a warning if it is found to be invalid. It protects against rootkits, backdoors, worms, viruses, Web defacement, unauthorized installation and use of new software, and much more.

Changes: Includes a lot of code cleanups and a completely new syntax for the Hash List description.
tags | worm, web, kernel, patch
systems | linux, unix
SHA-256 | 2063dc3d456ab6d0c6bcea1d44e61d352a87fc81ffa3f80061768a5feeeb91a7
apache-linux.txt
Posted Sep 19, 2002
Authored by Nebunu

Apache OpenSSL handshake exploit for Linux/x86, from a circulating Apache worm. Spawns a nobody shell on tcp port 30464. Includes targets for most recent distributions.

tags | exploit, worm, shell, x86, tcp
systems | linux
SHA-256 | d556b921afa65987fbfce40ecaf730bfb6ad9fb761d32e4aaff71b95149502eb
free-apache.txt
Posted Sep 19, 2002
Authored by Nebunu

FreeBSD Apache exploit based on apache-worm.c. Affects FreeBSD 4.5 Apache 1.3.20-24. Sends a nobody shell to TCP port 30464. This is a fixed version - Prior versions were broken.

tags | exploit, worm, shell, tcp
systems | freebsd
SHA-256 | f406bf2bf696f6639b1cc39d57ebe81efe602557b5527375dfa26c0efe708046
bugtraqworm.tgz
Posted Sep 16, 2002

Linux Slapper Worm - This file contains the binaries and source code for the current Apache worm which affects multiple versions of Linux. It exploits an OpenSSL buffer overflow to run a shell on the remote system and also contains the ability to perform a DDoS attack. These files were found in the wild from machines that had been compromised.

tags | exploit, worm, remote, overflow, shell
systems | linux
SHA-256 | d3ec4e9ec583742751a572f26d177d723e381fbc16fa7071657472887becb4ab
CA-2002-27.sslworm
Posted Sep 16, 2002
Site cert.org

Cert Advisory CA-2002-27 - Linux systems running Apache with mod_ssl accessing SSLv2-enabled OpenSSL 0.9.6d or earlier on Intel x86 architectures are being automatically exploited by a worm which takes advantage of VU#102795 in OpenSSL. The worm scans for vulnerable systems on port 80, then sends exploit code over port 443. The worm also functions as a ddos network which communicates over TCP port 2002. Infected systems can be identified by the presence of /tmp/.bugtraq.c. Fix available here.

tags | worm, x86, tcp
systems | linux
SHA-256 | eab54007a6d2d6de6fd9dbc5ac0556c2d08bc495727db543468bf1eeac50eabb
worm.zip
Posted Aug 26, 2002

C source for the Internet Worm.

tags | worm, bbs
SHA-256 | 5f04b972289d78bce39a89422a166dc5510aac2fac47f8d450267c05590c6f4e
wpaper.zip
Posted Aug 26, 2002

A report on the internet worm dated November 7,

tags | worm, bbs
SHA-256 | e178dc8d5c92892e372d34202c18c471a4aac8204dd43d6586655b35345704e6
wormtour.zip
Posted Aug 26, 2002

A text on the famous internet worm and the guy

tags | worm, bbs
SHA-256 | afa39a9760405916c858cb5d59fb655636e8a1996d513a5e5b09ef0572337ead
bigeye-0.3.tar.gz
Posted Jul 8, 2002
Authored by Victor Lima | Site violating.us

Bigeye is a network utility dump that can be run in multiple modes - sniffer, logging connections, and even emulating protocols such as HTTP or FTP. The main focus of this program is to create an emulative service that would fool hackers/worms into thinking that they're exploiting a real service, but in fact, they're trying to exploit a fake service. The services currently available are ftp or http. Useful for honeypots.

tags | worm, web, system logging, protocol
systems | unix
SHA-256 | 539835fe1b31923f09bb295a5f862a421092758644cc95c5c8832c043cfe9635
apache-worm.c
Posted Jul 3, 2002

Apache-worm.c is an Internet worm based on the GOBBLES exploit for the Apache chunked encoding vulnerability. Affects FreeBSD 4.5 Apache 1.3.20-24.

tags | worm
systems | freebsd
SHA-256 | 7e8cfc693a27e75dad94cb2914b20571a773e114f787a941165fde8b56adc689
worms.pl
Posted Mar 31, 2002
Authored by Tyler Longren | Site longren.no-ip.org

Worms.pl is a script which checks apache log files for nimda and code red attempts.

tags | worm
SHA-256 | 27b82000f96e554f583c9807319cbd35af6c79b1a88f62f13b25cc0fe8e76f53
200201p.txt
Posted Mar 6, 2002
Authored by One Semicolon | Site onesemicolon.cjb.net

"Techniques a worm might use to be harder to locate" is a look at how worms may evolve to be harder to locate on a infected computer. It begins very simple to build up to some ideas that are quite complex. Includes example source code written in Perl.

tags | paper, worm, perl, virus
SHA-256 | 007cc93f8790a53659368914af4edfb50070e6df7bd9611be2379803052a050f
die_rst.tgz
Posted Sep 11, 2001

Remotely detects and cleans binaries infected with the RST worm.

tags | worm
SHA-256 | f572b0c5d049cab7ad21b761b97da40f1a2a16317df8dc03d078394a7337014d
rootscanner.pl
Posted Aug 15, 2001
Authored by Idawson

Rootscanner.pl is a scanner to find root.exe, the backdoor left by the code red II worm. Takes a starting and ending IP as input.

tags | tool, worm, root, scanner
systems | unix
SHA-256 | 21cbf680c0db7d3768a2e3451a2b47859affe8f26026c6864f0328fa8b512f66
microsoft.codered.txt
Posted Jul 30, 2001

The Code Red worm is likely to start spreading again on July 31, 2001 at 8:00 EDT. All IIS 4 and 5 users MUST upgrade immediately! Fix for NT 4.0 available here.

tags | worm
SHA-256 | 6c9c02a04bec8e369b5d9d6a559029473f1a46e95779d6c1759e5299505cb94c
CS-2001-02
Posted May 30, 2001
Site cert.org

CERT Quarterly Summary for May, 2001. Since the last regularly scheduled CERT summary, issued in February 2001 (CS-2001-01), we have seen a significant increase in reconnaissance activity, a number of self-propagating worms, and active exploitation of vulnerabilities in snmpxdmid, BIND and IIS by intruders.

tags | worm, vulnerability
SHA-256 | 4a4c69c74f9f9dfbf99e62d106c6b336a191d5792a093ca4b01aa1079a25f3c2
CA-2001-11.iisworm
Posted May 8, 2001
Site cert.org

Cert Advisory CA-2001-11 - A worm which uses the sadmind overflow and the IIS unicode bug is propagating on the internet. Solaris systems compromised by this worm are being used to scan and compromise other Solaris and IIS systems. IIS systems compromised by this worm can suffer modified web content.

tags | worm, web, overflow
systems | solaris
SHA-256 | b7fd1b3c4d68118378d002763085fde45537233ded7492d3360c662fb0f27415
Page 5 of 8
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close