exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 36 RSS Feed

Files Date: 2000-04-15

warftpd.c
Posted Apr 15, 2000
Authored by eth0 | Site b0f.com

WarFtpd dos attack - The buffer overflow seems to occur because the bound check of the command of MKD/CWD is imperfect. War FTPd 1.70-1 does fix this problem, but it contains other vulnerabilities.

tags | overflow, vulnerability
SHA-256 | 75f5fa10bdcb027b11108ada9ad43286eb50f3575be3fbcb51715841603aff32
dsnhack.pl
Posted Apr 15, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

NewDSN.exe/CTGuestB.idc/Details.idc remote NT exploit.

tags | exploit, remote
SHA-256 | 5781b09b479321548029c27b1117422b84680901e7eaae1102c1cf80eb4de30e
ooo1.txt
Posted Apr 15, 2000
Authored by x00x00

Netscape PublishingXpert 2.* file-reading/dir-listing vuln in PSCOErrPage.htm - On SunOS 5.5.1 and 5.6 (possibly others), Netscape PublishingXpert 2.* can read any file on the system. Many large e-commerace sites are vulnerable to this. Exploit details included.

tags | exploit
systems | solaris
SHA-256 | f72d0de10aa960305471a7ffdf18974bf303879fb5b50370cc298b687d33dd75
phpfwgen-0.95.tar.gz
Posted Apr 15, 2000
Authored by Del | Site phpfwgen.sourceforge.net

The PHP firewall generator is a simple PHP script that generates a firewall script for ipchains-based firewalls. The aim is to support an easily configurable rule set similar to those supported by commercial firewall systems.

Changes: A new help system, many cosmetic changes, and a few script changes.
tags | tool, php, firewall
systems | linux
SHA-256 | 858d23efcbeeee8dddbb426cbaf8a8bb04752a84d9127f0020329df1fbdf991d
lids-0.9pre4-2.2.14.tar.gz
Posted Apr 15, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Fixes an ugly bug which prevented LIDS from protecting files under the root directory of a partition in some particular cases, and lidsadm switch check fixed.
tags | kernel, root
systems | linux
SHA-256 | 224d27687e30c04e3e40b5fdb3f15dcfb208f4175b2da5b22e47345337a591df
pgp4pine-3.7.tar.gz
Posted Apr 15, 2000
Authored by Marcin Marszalek | Site azzie.robotics.net

Pgp4pine is a script that automatically encrypts and decrypts mail under Pine using PGP. The user is not separated from things that PGP does. The program is compatible with PGP versions 2.6.3, 5.0, 6.5.1 and GNUPG 1.0, has support for an aliases file and signature-rotating programs, and can remember your passphrase for a session if you need.

Changes: Many important bug fixes & speedups, a german translation has been added.
tags | encryption
SHA-256 | ce9afacc1590b7df9c5696436c69ed150f6b084c58e23f3d7afd0dde18961796
ukphreak.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

an introductory guide to phreaking in the uk, one of hybrid's earlier files, for darkcyde and 9x, specifically aimed at uk dudes.

tags | telephony
SHA-256 | d0fe4706aaa5dd12e2bf945787f311ab29f1b44e20556423ececddb6395a9ec7
ss7.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to the SS7 telephony protocol - Signaling System 7 is a means by which elements of the telephone network exchange information. Information is conveyed in the form of messages.

tags | telephony, protocol
SHA-256 | 42a056c65c9a65c98a8ee7c1e0e60c7bd1063c7ea2f29dd4cb12cd1ca849d8c0
Shiva LanRover Guide
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

A guide to the Shiva LanRover networking platform, ppp connections, dialout modems etc, system configuration.

tags | paper
SHA-256 | 47814ac73410ffb0faa0055dba3300a21839a2bf6b863a2adf9b2a2873f9b1aa
satpstn.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

brief introduction to satelite communications and the intergration of the PSTN (public switched telephone network) - addition to a file written for faith magazine.

tags | telephony
SHA-256 | 09909cf86afcac4ff319e109e0f78ddd6392520a87c2993ff1e0cd86590d42f7
rboc-ixc.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a guide to different RBOCs - The US phone network is split into different areas that are controled by RBOCs (Regional Bell Operating Comapnies). For example, if you live in Texas, your RBOC will be SouthWestern Bell. These LECs (Local Excahnge Carriers) and IXCs (Inter eXchange Carriers divide America into different call handling sections.

tags | local, telephony
SHA-256 | bd80bce4df01dae94feca9e4cbc900882827c6b725df6071c315f536eacb89a7
mm1admin.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

advanced guide to meridian mail administration, call routing etc via meridian adminstation tool (MAT) aswell as ESN analysis, and MIRAD built in conference loops.

tags | telephony
SHA-256 | 2baad51dc964ac0856e14493d9de2b3b2d4d22472fd36b219d3b5d27df8b7064
dc_sysad.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

a very old file hybrid wrote for darkcyde when it first started in 97 - brief guide to some administration box in a voicemail system.

tags | telephony
SHA-256 | a6b102f043e4e34adfc77a8f4b2c85f9445f76a83df3d032af8121068d565d03
dc_line.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

introduction to line attenuation. - A transmission line can be considered as a conductor, or a group of conductors, with suitable insulating materials, whose function is to carry electronic information signals.

tags | telephony
SHA-256 | d8d65a9174430a73a042a12eb850b407a47b6fa7d67f9d6e483d12d3ead33813
dc_ionic.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to ionica class services such as *43#. (old).

tags | telephony
SHA-256 | c5bd48016784f65de74d39d1a50520dd7634b4b13541d65f2aff0d03f4a6b397
dc_btpag.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

old file on a vulnerabilty in BT easyreach pagers.

tags | telephony
SHA-256 | c700ac591d27aa9fb3383bcfcfe076d742d17cc06df85401de347382f920061b
bcss.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

basic guide to CCS (Common Channel Signalling) and the SS7 network.

tags | telephony
SHA-256 | f4fe807aa75419b1c1d8228c5cd3cabe9172e73be9089f927ec4716c7b2f0962
audix.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

very brief guide to using audix voicemail systems (old).

tags | telephony
SHA-256 | 835a363a0bad0b9392d21318e46762edb76ae50ba4198afd786b207cacf0219e
9x_tel.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

introduction to the digital phone network. - Analogue systems and techniques, Basic network structures, Basic exchange structures, centrex, FDM hierarchy, PCS services, signalling, SPC, trunking, ACD, ADSL, ATM, digital centrex, CCITT parts.

tags | telephony
SHA-256 | d2e0b0c4150823e03f2c18945456897d2a3ca52f6dc857b195f626c03fa11217
9x_swr8.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to the switched route of an 8oo number via the means of SS7 network protocols. also information on DSAC(dial service admin center).

tags | telephony, protocol
SHA-256 | 220b86d49b3fc6c96f1c7ea9d4b3dd63bec785bbccf620093c36e68705940e40
9x_scntp.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to uk prefix assignments, including uk toll-free prefixes. - usefull for scanning, spunged from oftel.

tags | telephony
SHA-256 | 770b3014436d291933bfc943457579e27a8951e5f57cf3c26718ca8926119475
9x_lmpt.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to latitude meetingplace teleconferencing. - Meeting Place is a powerful teleconferencing system designed to accommodate up to 120 ports in any combination of simultaneous conference calls.

tags | telephony
SHA-256 | 02413e0f5bd47a3d86f63f9296f758c0c0992c93e1855eaa708dffbaf3718507
9x_gets.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

GETS (Government Emergency Telecommunications System) - Since the begining of telecommunications, goverments around the world have always had their own secure voice and data networks. These secret networks have always served many purposes for government and military organistaions.

tags | telephony
SHA-256 | cc46de7475a686d85616d54b70db7ac998ccf2c8f48ee3d098804807fcd336c5
9x_dcom.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

guide to new digital telcoms - Switching Hierarchys, North American Digital Hierarchies, The Local Subscriber Loop and various other digitaly derived telcom info.

tags | local, telephony
SHA-256 | 7de56b697a52773d920f7a91309a1ec034564102e14dca0a72f5d620bf68b882
9x_cit.txt
Posted Apr 15, 2000
Authored by hybrid | Site hybrid.dtmf.org

CTI (Computer-Telephony-Integration) - CTI stands for Computer Telephony Integration, the term covers a vast range of different technologys, from single user modem integration pacages to vast three-tier architectures for call-centres.

tags | telephony
SHA-256 | 05ffbebe5244763192d49793b38a1b169d2c76f527235d3573c3547e4f077f78
Page 1 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close