what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 298 RSS Feed

Files

congestant.c
Posted Aug 17, 1999
Authored by horizon, from Phrack 54

congestant.c - demonstration of sniffer/ID defeating techniques.

tags | exploit
SHA-256 | 6a933cde69a750a571dd4dd56d43f6e750fc27a1571f382f35ea9954c50909ce
cookiemonster.zip
Posted Aug 17, 1999

Security Flaw in Cookies Implementation by Netscape and MSIE browsers. There are several privacy, security, and efficiency implications resulting from this bug. Read the enclosed document and exploit code for details.

tags | exploit
SHA-256 | 2e5cc6e698f7717183fdcb7332cba4aa4541f4784a67bed0b71ea1d571a5dccc
dcc-hijack.c
Posted Aug 17, 1999

IRC DCC CHAT/SEND/RECEIVE sessions can be hijacked in popular IRC clients, leaving open connections without any IP control; many exploit possibilities.

tags | exploit
SHA-256 | b4a22b9ed7b5ff2cfcb99a560403283fd482f37b7ab8c9433202fabf4b8b4c4c
embedded-controllers.txt
Posted Aug 17, 1999

One or more operating systems, popular for use in intelligent embedded controllers or PLCs (Programmed Logic Controllers), may have network protocol stacks which are vulnerable to certain classes of ICMP Redirect attacks. Vulnerable controllers are prone to hang or shutdown shortly after receiving the attacking packets. The failure can extend even to their non-network functionality and can cause the controlled equipment to fail. In other words, you can hack HVAC equipment, medical equipment, etc.... anything but your toaster, unless your entire house runs on NT of course, and everything is connected to a general-purpose TCP/IP network.

tags | exploit, tcp, protocol
SHA-256 | aaa2ae0319017d447599c1e7ee63aa0ed61ab901a93eb2c294e7bf74f21dac42
excite-web.txt
Posted Aug 17, 1999

Remote exploit for Excite for Web Servers v1.1.

tags | exploit, remote, web
SHA-256 | fdbb228cb81319489f7c93f381359ee91761d618b948b4f15aed17a050b1fefa
freebsd-mbuf-crash.c
Posted Aug 17, 1999

Exploit code that occasionally crashes FreeBSD; exploits tcp/ip flaw with bof.

tags | exploit, tcp
systems | freebsd
SHA-256 | 33476ecadd045d9953d5f7696cf9a509e56d2656b074b6bcb399c00cf3c9b48b
gammaprog.zip
Posted Aug 17, 1999

This is a brute force hacker for Hotmail (written in Java).

tags | exploit, java
SHA-256 | 6cf9c676e7add047fa92a6def7076af96a6134e192afd3121b4c54b212871098
grandson-cuartango-msie.txt
Posted Aug 17, 1999

The Gran-Son of Cuartango Hole - Another MSIE exploit in which your files can be grabbed by malicious remote web site/code.

tags | exploit, remote, web
SHA-256 | 2d9d04461a4f028835b9cdb7c019df3df205685c002bcda22e195fd19135d592
hp-jetdirect-DoS.txt
Posted Aug 17, 1999

HP JetDirect TCP/IP problems result in security flaws in which older TCP/IP implementations on HP JetDirect cards and servers are vulnerable to a wide variety of Denial of Service (DoS) attacks. Newer JetDirect interfaces also have serious weaknesses.

tags | exploit, denial of service, tcp
SHA-256 | 8ccb6b28cf71539727b87ee8292783825d3d577614d43a26ee80d78d1e9a4475
icmpmask.c
Posted Aug 17, 1999

code used for OS fingerprinting via icmp mask.

tags | exploit
SHA-256 | a46e3da2995476d48c15721c537ef35d28e2fec0948f776da5132111b96c0db6
icmptime.c
Posted Aug 17, 1999

code used for OS fingerprinting via icmp time.

tags | exploit
SHA-256 | ffc8be17e46b8ec95a05eed2d533e97b820148f6da021b6efdeea3bf7d227622
iis-GET-DoS.txt
Posted Aug 17, 1999

Denial of Service attack against MS IIS 3.0 and 4.0 can be executed by simply sending specially-malformed GET requests to IIS web server.

tags | exploit, web, denial of service
SHA-256 | 2d40e60aa557c1ae3fd2cec7e9b1a1a76c883be4daf53081a4f0ba4cb639299b
iParty-DoS.txt
Posted Aug 17, 1999

Simple remote DoS attack on iParty chat servers.

tags | exploit, remote, denial of service
SHA-256 | 675014e7791e0c677160cabc39b4978fee51b1150f0e0d717bdd2d9ff0ae5084
irix-fcagent-DoS.txt
Posted Aug 17, 1999

IRIX's (versions 6.4, 6.5 and 6.5.2) fcagent daemon is vulnerable to a Denial of Service attack, which involves sending a specific RPC packet to the fcagent daemon.

tags | exploit, denial of service
systems | irix
SHA-256 | 4b7cd0ae9439fbb26e8e8cd428eecf4bb11b41bcf64331d0d8dc7533366cd1ef
kcmsex.c
Posted Aug 17, 1999

i386 Solaris root exploit for /usr/openwin/bin/kcms_configure

tags | exploit, root
systems | solaris
SHA-256 | aeb73f09520ad57d1d506f238cf820a0e5d02c6bea2589c7d4b4bff6d79aad12
kkill.c
Posted Aug 17, 1999
Authored by KByte

inetd-based exploit tool that opens hundreds of connections to a remote host in a matter of seconds, killing the service(s) of your choice.

tags | exploit, remote
SHA-256 | b0c3b72270898e956ac7fafff44917bfbbbf9c8744b08e47a571feb35beba93e
licq-DoS.txt
Posted Aug 17, 1999

Simple Denial of Service attack against LICQ (Linux ICQ clone). Thanks for the heads-up, Spikey.

tags | exploit, denial of service
systems | linux
SHA-256 | 1733336690972f19a944e21884cb4123796daeba3a78f482c29ca4e323833576
lportfuck.c
Posted Aug 17, 1999
Authored by konker

LPortFuck v1 - Denial of Service attack similar to octopus.c; as crude as the title of the program, but effective.

tags | exploit, denial of service
SHA-256 | 7a0c0a706d5db7f404b02d5d4aae5b992e584b853fe62b3eadd7f2e3dd9ac3ff
mac-webshare-DoS.txt
Posted Aug 17, 1999

DoS attack, and maybe worse, present in Apple MacOS 8.5.1 "Web Sharing".

tags | exploit, web
systems | apple
SHA-256 | aed7c32d95b5b5b2c61dcb1e6515a3f62876f67545fb30ede8c69fd9d587e019
mdmrst.c
Posted Aug 17, 1999
Authored by Scrippie

+++ATH0 Attack - This program simply implements a spoofable version of the +++ATH0 modem bug attack. Contains modem patch string too.

tags | exploit, spoof
SHA-256 | d502e71877d0f112231a5674b7cb5d0f144488ae19389137feedf8055d583e8b
mk2.00.tar.gz
Posted Aug 17, 1999
Authored by Atomi

Murderkill Deluxe V2.0 - Latest release of a nice packaged suite of modern DoS tools with perl and shell scripts that automate the process of launching multiple attacks at once. Great tool for testing entire subnets for vulnerabilities.

tags | exploit, shell, perl, vulnerability
SHA-256 | 0b1dc291575c6b11e95d3fc45524d919dca59edaef5342508ccaa15d7f145bde
ms-excel-macros-dll.txt
Posted Aug 17, 1999

Microsoft Vulnerability - Excel macros can execute DLL functions without user intervention or knowledge.

tags | exploit
SHA-256 | 13aa4fff7da602615fab342aa7b5bdc0043cee2e5ebe3143a70418cd041ace16
ms-frame-spoof.txt
Posted Aug 17, 1999

MSIE "Frame Spoof" Vulnerability that could allow a malicious web site operator to impersonate a window on a legitimate web site. The threat posed by this vulnerability is that the bogus window could collect information from the user and send it back to the malicious site.

tags | exploit, web, spoof
SHA-256 | f70de6b60c34ca6f849cb8854732524b6819b80a8fe1d596ac44e693129d22d1
ms-netmon-sms-DoS.txt
Posted Aug 17, 1999

Microsoft's Network Monitor susceptible to Denial of Service attack, executed by sending a NetBIOS session request from a machine whose NetBIOS Scope ID is 190 or more characters.

tags | exploit, denial of service
SHA-256 | d4eda89bb6ead451500e62e14abb9f1c1bedf527ffc43790de1492a5a6e7df55
ms-proxy2.0-attack.txt
Posted Aug 17, 1999

MSProxy 2.0 can be used to attack hosts on internal network - Microsoft's Proxy server 2.0 can be used as a "gateway" to attack local networks from the outside, bypassing the proxy, even if IP forwarding is not enabled.

tags | exploit, local
SHA-256 | 5d2caf438ec00d663b749bf7c9840558a524af2ab53c80e82f40c39d6562b497
Page 2 of 12
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close