exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 24 of 24 RSS Feed

Files Date: 2000-03-29

Bastille-1.0.4.pre7.tar.gz
Posted Mar 29, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Fixed bugs in Question database, changed TUI: put question at beginning of explanation window, and fixed logrotate.d problem.
systems | linux, redhat
SHA-256 | 4c9fbb2334a07c3f4875d6885490f092c1595bfca237e4d182bb36a4fe0c0806
sysid.html
Posted Mar 29, 2000

CellCo system ID listing.

tags | telephony
SHA-256 | 16b4e59f54dab4d17a90b240a231f53ccf261eabc2934acedb7f28d4f67c583a
SUN MICROSYSTEMS SECURITY BULLETIN: #00194
Posted Mar 29, 2000
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, vulnerability
systems | solaris
SHA-256 | 8e0668fc3bf5747a94d3bd4afc60bb516b50f53b20be3b612c14ee869e6115e7
faoftel.txt
Posted Mar 29, 2000

The Fine Art of Telephony

tags | telephony
SHA-256 | bf96c262439bb898f26175f14dca720d78e75f04121362ede2d6025ebebe1a93
anideliv.txt
Posted Mar 29, 2000

Automatic Number Identification delivery docs

tags | telephony
SHA-256 | 25c03d23068ed9de44cb2540c4f509394f3c58252cc93ede03088c17bb926a8c
eric1331.zip
Posted Mar 29, 2000

Ericsson 1331 NAM and Options programming

tags | telephony
SHA-256 | 5565d783a21994ff252552a35c5a41df4a358c2f1d8e4b03a587d9b5c7e49880
eric1341.zip
Posted Mar 29, 2000

Ericsson 1341 NAM and Options programming

tags | telephony
SHA-256 | 5581726504b3518e85d293a9d7644f231d5424da0a2cba812fe198abaf730f88
backdoor.rules
Posted Mar 29, 2000
Site snort.rapidnet.com

300 snort rules to detect windows backdoors.

tags | tool, sniffer
systems | windows
SHA-256 | 390b848257ce83d0de5c84bb6fc465d825466ab811e188f5d09cb91488a97520
etherape-0.4.0.tgz
Posted Mar 29, 2000
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.

Changes: Red Hat fixes, node size now depends on outbound traffic, separate links for each direction, a history for the Filter entry, segfault / memory leak fixes.
tags | tool, sniffer
SHA-256 | d6701f6f8f1b66aa5f6374d7e86848a42847261625965d6493abb89045b7fbff
frontpage.pl
Posted Mar 29, 2000
Authored by r00tabega, Bansh33 | Site r00tabega.com

Everybody knows about the _vti_pvt password files, but what about those misconfigured Frontpage servers that allow remote login and authoring without a login and password? This script will check for both vulnerabilties.

tags | tool, remote, scanner
systems | unix
SHA-256 | 9040980cfe8b96a201e33ee28fbdd4f0ee1d4f87da6b7f725166cb677e745d00
fts.c
Posted Mar 29, 2000
Site b0f.freebsd.lublin.pl

Bug in fts_print function allows to overwrite any file in system, when running /etc/security script (executed from 'daily' scripts). FreeBSD 3.3 and earlier, openbsd, and netbsd are vulnerable.

systems | netbsd, freebsd, openbsd
SHA-256 | 650425b65c816d3f751be1bb04c52839d2e6e89a854c6241cfa71bf8c5dba913
get_name.pl
Posted Mar 29, 2000
Authored by Richard Wash

get_name.pl will parse the username / pw out of a linsniffer log.

tags | tool, sniffer
SHA-256 | 64868c84bc4fcb5deb9851bac24b7abfb20b018b8342dc0d9bb17b0b5b1a1305
libifconfig-0.1.tgz
Posted Mar 29, 2000
Authored by ASRiEL | Site pobox.com

libifconfig is a simple library that exports the basic capabilities of the ifconfig(8) administrative tool on Unix operating systems. It allows ifconfig's functions to be performed programatically without executing ifconfig, and provides easy access to the information typically returned from ifconfig. Moreover, libifconfig does this through an interface common to multiple platforms, improving portability.

systems | unix
SHA-256 | dc0e20d67000a3e17d381645a769ea49637767e23f14258de926fe2dc8cae8c1
snort-1.6-0.src.rpm
Posted Mar 29, 2000
Authored by Martin Roesch | Site clark.net

Snort 1.6.0 source rpm.

tags | tool, sniffer
SHA-256 | bfd61370b02c2e0e84ed89f1d4f4f5f56a681742046248be22223929da677639
telnet-putfile.sh
Posted Mar 29, 2000
Authored by Lez

telnet-putfile.sh is a shell script which helps you upload files to a remote server running telnetd using uuencode and nc.

tags | tool, remote, shell
systems | unix
SHA-256 | 0870769bd123cb873fd0923d27c9f0fa5c7db6313c788729506395e04653e8b2
tpgnrock.c
Posted Mar 29, 2000
Authored by Presto

Crash Exploit for AnalogX SimpleServer v1.03

tags | exploit
SHA-256 | cc9ee6eb889e4626230b81ac2c318ce7ff3dea4ca84840aff080e08d59e8c434
umount.c
Posted Mar 29, 2000
Authored by Venglin | Site b0f.freebsd.lublin.pl

FreeBSD 3.3 /sbin/umount exploit.

systems | freebsd
SHA-256 | c72ade93bd2e85828e67454faf5440e0cfe5b1c3a5790d0af0f11707b19a77e9
winmail305.txt
Posted Mar 29, 2000
Authored by Frankie Zie

Winmail 3.05 for Windows NT allows any file on the system to be read. Exploit code included.

tags | exploit
systems | windows
SHA-256 | 3c466966794ec9932d49f5ff0255e8dff719b5b35bee9762550d2f934821973f
nscache-0.3.tgz
Posted Mar 29, 2000
Authored by Stefan Ondrejicka | Site nscache.sourceforge.net

nscache is a simple program to browse the Netscape cache directory with a GTK UI. It shows the contents of the browser cache in a three level hierarchy of files: protocols, servers and documents or in sorted list. nscache permits you to view files from the cache, remove files, or gather various information about specific files.

tags | tool, protocol
systems | unix
SHA-256 | dda4fe76bd3ac7c959608befd9a8886e4e2e89c98c20e8b5188f623516d39f47
nomad-0.1.5.tar.gz
Posted Mar 29, 2000
Authored by Paul Coates | Site netmon.ncl.ac.uk

NU-Nomad is a network mapping program designed to automatically discover a local network, using SNMP to identify network devices and work out how they are physically connected together. The network is then presented as a topology diagram.

tags | tool, local
systems | unix
SHA-256 | 7c55fbaf0b8101b32e5429b8230d32d1e914d4035effa06e2059e606570f1f80
w00w00.tgz
Posted Mar 29, 2000
Authored by w00w00 | Site w00w00.org

w00w00.tgz updated March 1, 2000. This is the famous big tar file containing everything from w00w00 security development!

SHA-256 | e19f0b5b6945244c12d4cbdbe13bfa6b92dfad3fc61597e7675681581fca62e9
TBA_v1_prc.zip
Posted Mar 29, 2000
Authored by Kingpin | Site l0pht.com

TBA is the first wardialer for the PalmOS platform. Using a Palm device with a modem, you can wardial from anywhere a phone line is available - throw it in a phone can to retrieve later, toss it up in the ceiling during a security audit - the possibilities are endless.

systems | palmos
SHA-256 | 1801181a24d4d625d53dc3a84decaaa06032ff50a5c99d5974c4f30297e2b37f
kreatur.pl
Posted Mar 29, 2000
Site cs.uni-potsdam.de

kreatecd local root-exploit helper script - Halloween Linux 4.0 and SuSE 6.0 - 6.3.

tags | exploit, local, root
systems | linux, suse
SHA-256 | 23964fde1019bbfe985363c42c8ad5158d2951616665f872c8aa490b75e9e281
position.c
Posted Mar 29, 2000
Authored by Larry W. Cashdollar | Site team-teso.net

Overflows the -position arg buffer in wmcdplay due to a bad sprintf call.

tags | exploit, overflow
SHA-256 | 797e6bc48410b2afa3fb5a1600a36c4bbfb53243d9f45cd3ba84d269b068f7d0
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close