what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 2,403 RSS Feed

Files Date: 1999-09-01 to 1999-09-30

inet-2.txt
Posted Sep 25, 1999
Authored by InET

InET Issue #2. In spanish.

tags | magazine
SHA-256 | 8f20ab38433de199fb0607961011efa0942141d453dd24a8584961c4eeb4a771
inet-2.zip
Posted Sep 25, 1999
Authored by InET

InET Issue #2. In spanish.

tags | magazine
SHA-256 | 5ca7cea9cff5f6efb9cc36b39b722719cb188841445994ab1e4574d1f6c0faf5
inet-1.zip
Posted Sep 25, 1999
Authored by InET

InET Issue #1. In spanish.

tags | magazine
SHA-256 | d37bb96c0362b1844a524dfe2cb7b27f791e5cb3963d3326f257b551482b8920
ShadowNWCrack.zip
Posted Sep 25, 1999

Code for breakings Novell NetWare 4.x.

SHA-256 | cbd05859bbddf1c5d3c5acf3389bad1ff92379e7e211163ca83bddf8cd568205
ShadowLocalCenter.zip
Posted Sep 25, 1999

No information is available for this file.

SHA-256 | 8b2282a352aec94e12b51bfab050de785bdcfe7d55f0307bb5e062e7a20cf34a
kbd.c
Posted Sep 25, 1999

Linux loadable kernel module backdoor for 2.0.X. kbd is a nice little backdoor that allows root access by modifing the SYS_creat and SYS_getuid system calls. Usage after insmod is fairly strait forward: 1. login as a normal user 2. host:~$ touch foobar 3. login again under the *same* username 4. the second login session will be given root privileges 5. Remember to repeat this procedure everytime you plan on using the backdoor. To keep this covert, the special uid resets after root is given out, this prevents the legitimate owner of the account from receiving a suspicious root shell when he/she logs in.

tags | exploit, shell, kernel, root
systems | linux
SHA-256 | 8ae30ed612db9e4ee01490102ccbc464f01e2f47f0852958d1b8e0b2c215d1c7
superscan.zip
Posted Sep 24, 1999
Authored by Robin Keir

Super Scan 2.03. Finally, a windows based port scanner which deserves its name, multi-threaded, fast as lightning with NO Windows TCP/Stack memory problems.

tags | tcp
systems | windows
SHA-256 | 2d2808f6200ba66cc80fcb5626f8013ce0244986f42f3fa86fd52a516ddced35
wuftp25.tgz
Posted Sep 24, 1999

Would you believe another buffer overflow in wuftpd? Exploit for wu-2.5.0(1).

tags | exploit, overflow
SHA-256 | 6748c4c30e2293620d90597dffc8323dd09b5eb73cc4970bf1d6037744c4dde3
ftpd-aix
Posted Sep 24, 1999
Authored by synnergy, Dvorak | Site synnergy.net

Remote buffer overflow exploit for ftpd from AIX 4.3.2 running on an RS6000. (power).

tags | remote, overflow
systems | aix
SHA-256 | f0c984201d8083d24c2110284f243e70cb1da334d0f2090e3e7fbc36efda7ad6
lokkit-demo.tar.gz
Posted Sep 24, 1999

Demo of lokkit.

tags | tool, firewall
systems | unix
SHA-256 | 60912690f810c637f1ba3f03dd980c5675984a9427fad5e9aed491e9da3c7e66
lokkit-0.2.tar.gz
Posted Sep 24, 1999

Lokkit v0.2 - Lokkit is an attempt to provide firewalling for the average Linux end user. Instead of having to configure firewall rules the Lokkit program asks a small number of simple questions and writes a firewall rule set for you. Lokkit is not designed to configure arbitary firewalls. To make it simple to understand it is solely designed to handle typical dialup user and cable modem setups. It is not the answer to a complex firewall configuration, and it is not the equal of an expert firewall designer.

tags | tool, firewall
systems | linux, unix
SHA-256 | 3128cc0c8ba5d42be0bd3564ad564dacee06ecabd508f68e11327e56a1d6d4d8
lokkit-1.0pre1.tar.gz
Posted Sep 24, 1999

Lokkit is an attempt to provide firewalling for the average Linux end user. Instead of having to configure firewall rules the Lokkit program asks a small number of simple questions and writes a firewall rule set for you. Lokkit is not designed to configure arbitary firewalls. To make it simple to understand it is solely designed to handle typical dialup user and cable modem setups. It is not the answer to a complex firewall configuration, and it is not the equal of an expert firewall designer (Official Site).

tags | tool, firewall
systems | linux, unix
SHA-256 | da8a09b51310de77f47c78252c1c8e3c1dc97e3ded32306b68ac45d53fa7e78c
ngrep-1.34.tar.gz
Posted Sep 24, 1999
Authored by nocarrier

ngrep v1.34 is a program that mimics as much functionality in GNU grep as possible, applied at the network layer. ngrep stands for network grep, and is a pcap-aware tool that will allow you to specify extended regular expressions to match against the data payloads of packets, and currently recognizes TCP and UDP, and works on ethernet, ppp and slip interfaces. Excellent tool. Check it out!

tags | tool, udp, tcp
systems | unix
SHA-256 | 939652cf9f6d668430106174d30bf55b2ebcfca11a57e5555e63e483b590d841
advphreak.txt
Posted Sep 24, 1999

Squiler's tutorial on phreaking.

tags | paper
SHA-256 | 6bf08b081bdd59c097b250f719066f6e4c1afbf1f98515bc196d65bc58649a00
bug.txt
Posted Sep 24, 1999
Authored by hybrid, faith | Site hybrid.dtmf.org

Various means, methods, and implications of bugging the public switched phone network.

tags | magazine
SHA-256 | 74c9f070e2f39ba5563461ce57744725d8c61783cb5f59b0c0cdc0bbae236275
phreaking.txt
Posted Sep 24, 1999

Phreaking Tutorial (version 1.0) - this should get all those newbie phreakers out there started.

tags | paper
SHA-256 | c75a9ba042b347b7db9b1b90a81eb0445055f3bc94ad312e30b0da1099ebacc0
squiler2.txt
Posted Sep 24, 1999

Part II of Squiler's tutorial.

tags | paper
SHA-256 | 7b3e70949095ecdec4ee5486faf03db9eb275c4466ac2667165956096ad5e39a
adblock.txt
Posted Sep 24, 1999

Ad Blocking Tutorial (version 1.7) - are you tired of seeing stupid commercials and popups popping on your screen and chewing up your bandwidth? Then read this!

tags | paper
SHA-256 | d37aff61fad79e851756fa572f2612a4179cf9206f06d62d60d763d3fdc3ead4
anonymity.txt
Posted Sep 24, 1999

Anonymity Tutorial (version 1.2) - tired of people getting your IP over ICQ or IRC? Tired of website owners knowing everything about you? Tired of people tracing you by your Email address? Read this one and learn how to anonymize yourself!

tags | paper
SHA-256 | 084cde839bbfa6fbd8322567bb20b4011df934860d5d6aea088787c580c56d1d
info.txt
Posted Sep 24, 1999

Info Gathering Tutorial (version 1.3). Techniques that can be used to find information about people.

tags | paper
SHA-256 | 546743e1ca9d79e5ac6a5bcc5444dd1672874a8a33a7139545813d1b5605c568
proxy.txt
Posted Sep 24, 1999

Proxy/WinGate/SOCKS Tutorial (version 1.0) - don't know what a Proxy is? Don't know what a WinGate is? Don't know what a SOCKS firewall is? Want to learn how to increase your anonymity using them? Then read this one.

tags | paper
SHA-256 | b0efb5e99953ae9c9d7abbb4e4ab6e62fe3879ba52e04281e9d5786ff44327c4
registry.txt
Posted Sep 24, 1999

Windows Registry Tutorial (version 1.0) - learn more about the Windows registry. How does it work, what does it do and what happened to the old .ini files?

tags | paper, registry
systems | windows
SHA-256 | 2e0f0a87b3e8bcfc106423cd91b0e20512ce85468259b01d71a12639dd4a1156
irc.zip
Posted Sep 24, 1999

IRC Warfare Tutorial (version 1.0) - ever wanted to know how those lamers keep taking over your channel and/or kicking you off.

SHA-256 | 394b76c7518250a09463db6e565d7040c66cc26d3fefc0260040f718a3b6c226
ex_uum.c
Posted Sep 24, 1999
Authored by Unyun | Site shadowpenguin.backsection.net

I found the security vulnerability in uum Japanese Kana-Kanji FEP. This program is installed on many Japanese UNIX with default. /usr/bin/uum is a suid program, it overflows if the long argment is specified with -D option. I coded an exploit for the Linux, the local user can obtain a root privilege. I also confirmed this overflow on the following OSs. Solaris 2.6,2.7, IRIX 5.3,6.2,6.3,6.4,6.5.

tags | exploit, overflow, local, root
systems | linux, unix, solaris, irix
SHA-256 | 75d10efd76a82f9cc72dc1429601602647de0c1bcc53dae1aed671cf4c40f5ed
cfscan.zip
Posted Sep 24, 1999
Authored by wiltered_fire

A program to scan for Cold Fusion vulnerabilities. Simply feed it a list of domains and it will let you know if any are vulnerable.

tags | web, vulnerability
SHA-256 | 13c76d2e2b6d763f841a14abdcb1978f46b2397943ecb7ba2327bc96bb94d18b
Page 3 of 97
Back12345Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close