exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 330 RSS Feed

Files Date: 1999-11-01 to 1999-11-30

ethereal-0.7.9.tar.gz
Posted Nov 29, 1999
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: A fix for the SMB decoder segfault bug and other protocol decoder updates, support for iptrace 1.0 (AIX3) files, etter support for NetMon 2.0 and WAN NAI Sniffer traces, Some GUI updates, and color-coded transmitted/received data in the TCP Follow window.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 05c63c71e3f6ffd1f57bd602f09e0748166a5c36cd391e1714ff3d36ec28bec0
NSS_253.tar.gz
Posted Nov 29, 1999
Authored by Narrow

Narrow Security Scanner is a perl script which checks for 190 remote vulnerabilities. Tested on Slackware 4.0, Red Hat (4.2, 5.0, 6.0), SuSE 6.1, FreeBSD 3.0 & OpenBSD 2.5.

Changes: 13 new vulnerability checks added.
tags | tool, remote, scanner, perl, vulnerability
systems | linux, redhat, unix, freebsd, suse, slackware, openbsd
SHA-256 | 989a1e7d2ce2e359558585c2354c575e86de210466a48e25f799260cbf8fd649
RA-Portscan.zip
Posted Nov 29, 1999
Authored by Variable | Site rootaccess.tsx.org

Root Access Portscanner is a windows based portscanner that scans a remote computer and looks for open ports.

tags | remote, root
systems | windows
SHA-256 | e046eeb1edcf442b0634f51b85633aa5e7bab803ed327a17d09ac104fb60eab2
RA-Cache.zip
Posted Nov 29, 1999
Authored by Variable | Site rootaccess.tsx.org

Root Access Cached Password Explorer is a very handy tool that finds cached password on your computer.

tags | root
SHA-256 | 4cfd0d9a7a4f4498ab0a0dfb352532eb909d525d6476c5038b5b3f33cd1f778b
RA-AnonEmail.zip
Posted Nov 29, 1999
Authored by Cipher | Site rootaccess.tsx.org

Root Access Anonymous Emailer is an anonymous email program that can send email to anyone and you, the user can make it look like it came from ANY address.

tags | root
SHA-256 | dd32828ac2f21615142a16f27850b984a23f810a8e5ca021a4dce286a0282eaf
fwtable.pl
Posted Nov 29, 1999
Authored by Lance Spitzner | Site enteract.com

fwtable.pl (ver 1.0), used to convert your Checkpoint Firewall-1 connections table into human readable form. Documentation here.

tags | tool, firewall
systems | unix
SHA-256 | 93b2d75bb002c81f7bfb72a4deaa1af4ba6e4130e5a4b81bd73018ae34984d87
alert_1.3.tar
Posted Nov 29, 1999
Authored by Lance Spitzner | Site enteract.com

IDS Alert Script (ver 1.3) for Checkpoint Firewall-1 (Unix only). Build Intrustion Detection into your firewall. Features include: Automated alerting, logging, and archiving, Automated blocking of attacking source, Automated identification and email remote site, and Installation and test script. Ver 1.3 Optimized for performance, over 50% speed increase. Documentation here.

tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 10f4b8a670367efd29cc6f1e2b1080b57abab5342acc80ce9ffe06156a3179e0
exploit.txt
Posted Nov 29, 1999
Authored by Mixter | Site members.tripod.com

A tutorial on how to write shellcode and exploits, and how buffer overflows work in general. It aims to be detailed and suitable for novice exploit coders with some C understanding.

tags | paper, overflow, shellcode
systems | unix
SHA-256 | a589b984950281228fe3fb2d410cdf7e78ec852c53089f751095fb344aeea882
eng-1199.txt
Posted Nov 29, 1999
Authored by set

English Version - Several members of SET have discovered key flaws in the security of ciudad.com.ar, the incorrect configuration of EdgeMail system, used to offer mail services trough web, appears to be the cause. Ciudad.com.ar is an Argentinian portal offering free webmail accounts as well as chat and ICQ-style messaging, over 150.000 accounts could have been compromised. SET homepage here.

tags | web, magazine
SHA-256 | cfa0c4e9da0da0896be536a05c0db4d707d2497f221da6cd6335b602748cfa9a
set-1199.txt
Posted Nov 29, 1999
Authored by set

Several members of SET have discovered key flaws in the security of ciudad.com.ar, the incorrect configuration of EdgeMail system, used to offer mail services trough web, appears to be the cause. Ciudad.com.ar is an Argentinian portal offering free webmail accounts as well as chat and ICQ-style messaging, over 150.000 accounts could have been compromised. SET homepage here.

tags | web, magazine
SHA-256 | e55e2ce0dec976ae6378f5e13e1d2fbc28bf63420c38a60280843f3589652266
MDAC-scan.pl
Posted Nov 29, 1999
Authored by Xphere | Site casema.net

Msadc scanner written in perl.

tags | tool, scanner, perl
systems | unix
SHA-256 | 07ff1fe6f4a046c32243998708b03ef7de2be8e3106b99be9f907cf6ad6f1b38
mailgear-1.0.txt
Posted Nov 29, 1999
Authored by Underground Security Systems Research

Symantec Mail-Gear 1.0 Web interface Server Directory Traversal Vulnerability. Example included.

tags | exploit, web
SHA-256 | 166e3926f91c3a2e6ac734080f583044da08ab40996832679d1591724e4ac3d1
ipsend335.tgz
Posted Nov 27, 1999
Authored by Coombs Computing | Site coombs.anu.edu.au

IPSend v3.3.5 - TCP/IP packet-generator which uses a scripting language. Extracted from ipfilter 3.3.5.

tags | tool, tcp
systems | unix
SHA-256 | 5bc1d87f6346403c421ebb5fb47dd504a94d375b1f36d2e88fbcf1ec7b08377f
strace-4.1.tar.gz
Posted Nov 27, 1999
Authored by Rick Sladkey | Site wi.leidenuniv.nl

strace 4.1 is a useful diagnositic, instructional, and debugging tool. System adminstrators, diagnosticians and troubleshooters will find it invaluable for solving problems with programs for which the source is not readily available.

Changes: More support for Linux/MIPS, updates to the network-code and additional/improved Linux syscalls.
systems | unix
SHA-256 | 1badae30e2d715930f3fd42cd97276722f00ade2c2fc1187e3117693c7b65f5b
suse.newtools.txt
Posted Nov 27, 1999

SuSE Advisory: Announcement of new security tools from SuSE. Includes SuSE FTP Proxy, SuSE Firewall (The new firewall script from SuSE, rewritten from scratch), Harden SuSE script, SuSE Secumod (This loadable kernel module enhances the security of the system by adding a symlink/hardlink/pipe protection, procfs protection, trusted path execution and capabilities), SuSE Secchk cron scripts, Yast-1, SuSE auditdisk (This tool generates a bootdisk with checksum data and all binaries etc. needed to automaticaly verify file checksums upon booting. This way it can't be subverted by lkm's like a standard e.g. tripwire installation), plus tmpwatch, arpwatch, plug, sslwrap, the newest nmap and more. SuSE security website here.

tags | kernel
systems | linux, suse
SHA-256 | 79e2c81812f8dd6ef4480bef4faaff9c9f0718e66d5f0a8f52f7f692c58108df
vnc.html
Posted Nov 26, 1999
Authored by w00w00, Conde Vampiro

[w00giving '99 #4]: VNC is a software package that permits a user to view a remote desktop in real-time. To protect intruder to access the remote desktop, VNC has a password protection. This encryption is done using 3DES, but this encryption is very poor and can be attacked (through brute-force).

tags | remote
SHA-256 | 4fab2bb54a0a55a4b1e33e1ca86cb8fc49dfdae873e7efcd45c27a2f9d617c51
encryption.txt
Posted Nov 26, 1999
Authored by tHe mAniAc | Site users.ldproxy.com

The Basics of Cryptography: Learn the basic of cryptography and how to break it in this short, simple and easy-to-understand text.

tags | paper
SHA-256 | fff2de46b4df67eeb9c1cb05c58195d52ac5d84f72c6759cc86ade1fa67e5484
lids-0.4.1-2.2.13.tar.gz
Posted Nov 26, 1999
Authored by Xie Hua Gang

lids is an intrusion detection system patch for the Linux kernel; it can protect important files from being changed. When it's in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.

Changes: Now there is a password to turn lids on/off, Fixed bug in protecting MBR writing, Fixed bug in log file protection, and Fixed bugs in lidsadm for security reasons. lids homepage.
tags | kernel, root
systems | linux
SHA-256 | b38a4df3e05b43cf55bb5e9716bf5149a24df6b1633fb8006b9e1f42913f4260
unixware.su.txt
Posted Nov 26, 1999
Authored by Shane A. Macaulay

The su command on SCO's UnixWare 7 has improper bounds checking on the username passed (via argv[1]), which can cause a buffer overflow when a lengthy username is passed.

tags | exploit, overflow
systems | unixware
SHA-256 | 2f370cc88cadf6efc7b1f8a55d5ae2f5c3b8ce45ae76e772bf81e939d0b03feb
unixware.Xsco.txt
Posted Nov 26, 1999
Authored by Shane A. Macaulay

[w00giving '99 #6]: UnixWare 7's Xsco. Due to improper bounds checking, an overflow occurs when a lengthy argument (argv[1]) is passed. Because Xsco runs with superuser privileges, this can be exploited for elevated privileges.

tags | exploit, overflow
systems | unixware
SHA-256 | 0710e3286329f4ec82f0b43031b6894da9140f1c90cf3c7b571b5b51ad62ad0d
unixware.xlock.txt
Posted Nov 26, 1999

[w00giving '99 #7]: UnixWare 7's xlock. The xlock command on SCO's UnixWare 7 has improper bounds checking on the username passed (via argv[1]), which can cause a buffer overflow when a lengthy username is passed. Exploit by K2

tags | exploit, overflow
systems | unixware
SHA-256 | 42dca4082a24f106af872bb2a9c3e695482d75141ae5f77e6e01c1aec727dbff
grabbb-0.0.7.tar.gz
Posted Nov 26, 1999
Authored by scut | Site team-teso.net

Clean, functional, and fast banner scanner.

Changes: Portability fix: Now works on Linux, BSD and Solaris.
tags | tool, scanner
systems | unix
SHA-256 | 86258d4a2f264691c77ffa0a0993644a51c8e6e327f63358160b93a492155b7d
elza-1.3.1.zip
Posted Nov 26, 1999
Authored by Philip Stoev | Site phiphi.hypermart.net

The ELZA is a scripting language written in PERL aimed at automating HTTP requests, while maintaining fill browser-like behavoir, which enables it to go to places within web sites unaccessible to netcat, telnet, or similar tools. Features: Extraction of _dynamic_ URLs from from HTML;Handling of forms, passing custom form fields and field values, collecting hidden form fields; Following redirects and refreshes; Handling of cookies, honoring their Path and Domain attributes; HTTP Referer, User-Agent, and other HTTP headers for perfect mimicry; HTTP basic authorization including dictionary attacks; Looping for repeated requesting or dictionary attacks; Conditional execution; HTTPS communication via a SSL tunnel; Forms hijacking. Scripts written in ELZA can be executed remotely via POST or forked for load generation.

tags | web, perl
SHA-256 | e5627cc320ee5aaa12c0c74d92cec2b85f9afcb5d372b8b2b7375671bf325bbf
casl20.tgz
Posted Nov 25, 1999
Authored by Timothy Newsham, Thomas Ptacek

Custom Auditing Scripting Language (CASL) implements a packet shell environment for the Custom Auditing Scripting Language that is the basis for the Cybercop(tm) line of products by Network Associates. The CASL environment provides an extremely high performance environment for sending and receiving any normal and/or morbid packet stream to firewalls, networking stacks and network intrusion detection systems as well as being sufficiently rich of a language to write honeypots, virtual firewalls, surfer hotel, phantom networks and jails.

tags | tool, shell
systems | unix
SHA-256 | 3f66662c44322fa4381d84fc3d0189a19686130564e82d945f41f8ae24123b21
XaviorBeta4.exe
Posted Nov 25, 1999
Authored by Lithiumsoft | Site btinternet.com

A remote password auditing and recovery tool that allows dictionary or complex brute-force scans. Scripting support allows you to define any plaintext login procedure. Optimised WWW basic authentication scanning.

Changes: Scripting - Xavior now gives you the power to scan *anything* that uses simple plaintext password entry.
tags | remote
SHA-256 | 1cb761991dfedbc5e82318ae106090d7a86574a987a476641acabef5072f0ec8
Page 1 of 14
Back12345Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close