exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 752 RSS Feed

Files Date: 2000-01-01 to 2000-01-31

qpop-xploit.c
Posted Jan 27, 2000
Authored by Zhodiac | Site hispahack.ccc.de

Remote linux x86 exploit for Qpopper 3.0beta29 and below. (not 2.5.3) Overflows the LIST command and spawns a shell with the UID of the user who logged in (requires valid account), and GID mail.

tags | exploit, remote, overflow, shell, x86
systems | linux
SHA-256 | 6e03060d06070addc039c651e773cc7edd7dfdbf64902dcb1d4ab4b12b4e97df
vpopmail.txt
Posted Jan 27, 2000
Authored by Shane A. Macaulay | Site w00w00.org

w00w00 Security Advisory - qmail-pop3d may pass an overly long command argument to it's password authentication service. When vpopmail is used to authenticate user information a remote attacker may compromise the privilege level that vpopmail is running, naturally root.

tags | exploit, remote, root
SHA-256 | 3bd0074f38eb47b414a84c38444aed7fa25ca801a4f14f89d10b39ad7380dd2d
vmware.htm
Posted Jan 27, 2000
Authored by Harikiri | Site w00w00.org

w00w00 Security Advisory - Linux VMware 1.1.2 Symlink Vulnerability. VMware stores temporary log files within the /tmp directory. It does not check whether all of these files exist prior to creation, resulting in the potential for a symlink attack.

tags | exploit
systems | linux
SHA-256 | da520fa5a7804353f424ed408de54dc3b46708d2f49b82447d0645507cc3049e
skey.htm
Posted Jan 27, 2000
Authored by Harikiri | Site w00w00.org

w00w00 Security Advisory - S/Key & OPIE Database Vulnerability affecting most Unixes (not NetBSD) running skey-2.2. (possibly earlier versions too) allowing offline password cracking.

tags | exploit
systems | netbsd
SHA-256 | 3ae33764fe45486317d0735a5c5fbdb38edd2d5553c4c986a29216ee7e9b8124
qmail-pop3d-vchkpw.c
Posted Jan 27, 2000
Authored by Shane A. Macaulay | Site ktwo.ca

Remote exploit for the inter7 supported vchkpw/vpopmail package for (replacement for chkeckpasswd). Tested on Sol/x86,linux/x86,Fbsd/x86 against linux-2.2.1 and FreeBSD 3.[34]-RELEASE, running vpopmail-3.4.10a/vpopmail-3.4.11[b-e]. Unofficial patch here.

tags | exploit, remote, x86
systems | linux, freebsd
SHA-256 | 96783f06acb089b526184c758e946ec901db1b61ec472cbee7dc24a2094b6765
nt.security.update.012600.txt
Posted Jan 26, 2000
Authored by winsd

Windows NT Security Update - Information on Rdisk Race Condition, and the InetSrv 3.0 Buffer Overflow. Also contains articles on Internet Security with Windows NT, Email Encryption Plugin, and Change-Detection Software. NTsecurity homepage here.

tags | overflow, magazine
systems | windows
SHA-256 | d3fad445ac140dcb3f3f355fadd12b079518f12f7c8cea463e9a41c776190dc6
Fwctl-0.24.tar.gz
Posted Jan 26, 2000
Authored by Francis J. Lacoste | Site indev.insu.com

Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. It supports multiple interfaces, masquerading and packet accounting. Fwctl doesn't replace a good security engineer, but it can make the job of the security engineer simpler.

Changes: A fix for those who don't have Date::Manip installed, and other minor bug fixes and enhancements.
tags | tool, firewall
systems | linux
SHA-256 | 820a6ad0cf4c9e39f85d67258df7a1c8180f56a15d84e22c1d851d443047a031
falcon-0.1-1.tgz
Posted Jan 26, 2000
Authored by Falcon Open Group | Site falcon.naw.de

The Falcon Project (the Free Application-Level CONnection) is an open firewall project with the intention of developing a free, secure and OS-independent firewall system. Falcon consists of different modules: Falcons's own proxies (generic TCP proxy and application-specific proxies), Squid for Web access and caching (modified package for Linux), and qmail for mail communication.

tags | tool, web, tcp, firewall
systems | linux, unix
SHA-256 | 1628010f36f086dffea0ed511a1b62b4735021b6066f2991499be8fa5e334c4f
xinetd-2.1.8.8pre8.tar.gz
Posted Jan 26, 2000
Authored by Bob Braun | Site synack.net

xinetd is a replacement for inetd, the internet services daemon. Anybody can use it to start servers that don't require privileged ports because xinetd does not require that the services in its configuration file be listed in /etc/services. It can do access control on all services based on the address of the remote host and time of access. Access control works on all services, whether multi-threaded or single-threaded and for both the TCP and UDP protocols.

tags | tool, remote, udp, tcp, protocol
systems | unix
SHA-256 | ec03d2092346616e5d9a7aa457f94e6bc3444ca2d1fa84a789ab94fe963aef87
spf-2.0.3.tar.gz
Posted Jan 26, 2000
Authored by Brian J. Murrell

Stateful Packet Filter for Linux - constantly adjust an inbound packet filter to deal with allowing traffic in based on what was sent out. Now with RealAudio support.

tags | tool, firewall
systems | linux
SHA-256 | ba8ad226569cce45d302b564238eecdf435dc7eb01501c284dc07e14a81ba1d9
swatch-3.0b4.tar.gz
Posted Jan 26, 2000
Authored by Todd Atkins

Swatch ("Simple WATCHdog") is a program for UNIX system logging, originally written to actively monitor messages as they are written to a log file via the UNIX syslog utility. Swatch was designed to keep system administrators from being overwhelmed by large quantities of log data. It monitors log files and acts to filter out unwanted data and take one or more simple user specified actions based upon patterns in the log. Swatch can monitor information as it is being appended to the log file and alert system administrators immediately to serious system problems as they occur.

Changes: Fixed the examine switch, added continue and quit actions, Fixed parsing of "throttle" setting, bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | c4ff2006f2a9142b2de844df66a0a81cd02b462916db92ee088ec284570352c9
iis53.htm
Posted Jan 26, 2000
Site oliver.efri.hr

MS IIS 5.0 has problems handling a specific form of URL ending with "ida". The extension ida has been taken from the Bugtraq posting "IIS revealing webdirectories" The problem causes 2 kind of results. The one result is that the server responds with a message like "URL String too long"; "Cannot find the specified path" The other error causes the server to terminate with an Access Violation. When the server "Access violates" it displays as last message.

tags | exploit
SHA-256 | c6301bd7666cad9967d8dafc5ad77f1302a8469ac918b24e757bf1d26a8ed0d1
inetserv.htm
Posted Jan 26, 2000
Site oliver.efri.hr

InetServ 3.0 (Windows NT) advisory and remote exploit.

tags | exploit, remote
systems | windows
SHA-256 | cc2c208ea5bc9b1947f2e030b63f6be5825fda3e7e55165f78c314720c1ebd67
krnl110.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Stream.c summary - DoS attack due to bug in many unix kernels, including Linux, Solaris, and all of the BSDs.

tags | exploit, kernel
systems | linux, unix, solaris
SHA-256 | 7cff59a33278aed639fdb203cfa2c7908bff64e6c40976ab8b6cbef24bc3e0b9
nortel.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Nortel's new Contivity seris extranet switches give administrators the ability to enable a small HTTP server and use Nortel's web based administration utility to handle configuration and maitenance. The server runs atop the VxWorks operating system and is located in the directory /system/manage. A CGI application, /system/manage/cgi/cgiproc that is used to display the administration html pages does not properly authenticate users prior to processing requests. An intruder can view any file on the switch without logging in.

tags | exploit, web, cgi
SHA-256 | e6470da7422c75f82642fd4a9d29e044d0ee71eaad5f6c6e169743abe355b388
rdisk.htm
Posted Jan 26, 2000
Site oliver.efri.hr

There exists a vulnerability in rdisk (Windows NT) which causes the contents of the registry hives to be exposed to Everyone during updating of the repair info.

tags | exploit, registry
systems | windows
SHA-256 | d9d891c8304ca57c3de11b9e0bbc9cea3224a33302ce1296a8a19047a3d8f5e0
rtf.htm
Posted Jan 26, 2000
Site oliver.efri.hr

RTF files consist of text and control information. The control information is specified via directives called control words. The default RTF reader that ships as part of many Windows platforms has an unchecked buffer in the portion of the reader that parses control words. If an RTF file contains a specially-malformed control word, it could cause the application to crash.

tags | exploit
systems | windows
SHA-256 | 27ba30c0f7c1e053fdc20342b41f7fbf0815631ae08c4738c0819002d49a196f
smtp2.htm
Posted Jan 26, 2000
Site oliver.efri.hr

USSR Labs found following. A memory leak exists in the Super Mail Transfer Package that may cause an NT host to stop functioning and/or need to be rebooted. The memory leak may occur when you connect to the SMTP port, all information you send to the system will be stored in memory, and SMTP support multiples HELO/ MAIL FROM/ RCPT TO / DATA in the same connection. If you did multiple HELO/ MAIL FROM/ RCPT TO / DATA in the same connection the memory may not be deallocated. This condition may cause the computer to stop functioning the moment memory runs out.

tags | exploit, memory leak
SHA-256 | 098828bc67aee64abdd87dabcd122bf51262d7df84bd843eef9f319e6f289b2b
tb2.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Timbuktu Pro 32 (TB2) from Netopia sends user IDs and passwords in clear text. When TB2 is used to remote control a machine that is not logged in or is locked, any user ID and password that is typed in is sent in clear text. A malicious user on the network can "sniff" the packets and gain the NT User IDs and passwords of any one using TB2 to remotely control a NT machine.

tags | exploit, remote
SHA-256 | 7409f6db13593aa2d56a2998e62d44ee0c31c668b0139f93213cebc734a8677c
website.htm
Posted Jan 26, 2000
Site oliver.efri.hr

WebSite Pro is also revealing the webdirectory of each Website by a simple command line. This bug is similar to the "IIS revealing webdirectories" bug reported. On WebSitePro the diference ist the way you retrieve the path.

tags | exploit
SHA-256 | 70b108388a2f189b10b9a7b6a8056ebcc7c966497f269b5fed0b43153d271e8d
yahoo2.htm
Posted Jan 26, 2000
Site oliver.efri.hr

Jaynus Jaynus found following. He read over the ICQ overflow that had been found so he was curious if this existed in any other clients. Upon testing the below URL, yahoo pager/messenger crashed in the same was as ICQ.

tags | exploit, overflow
SHA-256 | afc1794d389c2f332846bb6da3abde5c120db7e53c76005bc13d3854a685e7bb
ethereal-0.8.2.tar.gz
Posted Jan 26, 2000
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: A tty-mode interface, "tethereal", was added; CLNP, NFS, L2TP, CDP, RTSP, LLC, Vines, IPv4/DiffServ, and BGP were updated; a decoder for Cisco ISL was added; HP-UX nettl support was updated; GTK+ bugs and Linux libpcap bugs were worked around; a hexdump view was added to the TCP Stream window; and the Win32 support was brought up to date.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | cc50df3e888a195319ddf17efec98d57edc7ac670114160578930c52fa1fde29
lids-0.8pre4-psk-2.2.14.tar.gz
Posted Jan 26, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Bugfixes.
tags | kernel, root
systems | linux
SHA-256 | 4f4a235bffc7caa4775be7a1c492ba194a08b9210ad00a8cf3113b80803278be
sniffing-faq.htm
Posted Jan 26, 2000
Authored by Robert Graham

Excellet FAQ on packet sniffing version 0.3.0, updated Jan 15, 2000.

tags | tool, sniffer
SHA-256 | 18096601ca786516ad5ca59eb160faffe8b4ec716cdeac439c6ef92f54a41b5a
tcpdump-3.5.alpha.tar.gz
Posted Jan 26, 2000

Tcpdump allows you to dump the traffic on a network. It can be used to print out the headers of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect "ping attacks" or to monitor the network activities.

Changes: -X option added, telnet command sequence decoder, many bug fixes, SMB printing, NFS parsing, AFS3 packet parsing, etc. New Tcpdump homepage here.
tags | tool, sniffer
SHA-256 | 9d85ce6e1878df84d0d23e170c7adb1012880f0414abec5da02e735537cb5937
Page 2 of 31
Back12345Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close