what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files Date: 2000-11-06

f8-103100-realsecure.txt
Posted Nov 6, 2000
Authored by Loki, f8labs | Site f8labs.com

RealSecure by ISS v5.0 fails to detect attacks using the year old IIS 5 RDS bug and the recent UNICODE hole.

SHA-256 | 453d10fa616c5ee68f11a6790756532a25384881a2177d18253ce60f36c2c773
mantrap-info.tgz
Posted Nov 6, 2000
Authored by Loki, f8labs | Site f8labs.com

ManTrap, a commercial honeypot, can easily be identified and subverted. The process hiding can be detected by sending a signal to each PID, there are /proc inconsistancies, the first 4 processes always get hidden, the inode number is off, and the chroot can be broken via raw device access. Includes mantrap.c, a exploit which checks for the first 3 issues.

SHA-256 | 54a333746c7dc4826ba17db0df51fcbfc4a52dc1ecfb81630351161e213ceac9
labs57.txt
Posted Nov 6, 2000
Site ussrback.com

USSR Advisory #57 - An buffer overflow vulnerability has been discovered in the Microsoft System Monitor ActiveX control which can be exploited in Internet Explorer, Outlook, or Outlook Express running on Windows 2000. Demonstration available ms00-085 addresses this issue.

tags | overflow, activex
systems | windows
SHA-256 | c71292dab678f51dff02c9fab692eea15a88b7bff9c00d978d2b4b25d8893ba2
netsec37.txt
Posted Nov 6, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: ActiveX Parameter Validation vullnerability in Wndows 2000, and much more.

tags | activex
SHA-256 | dde907123b07e3d74e0b1c341846b45e4bcd8609276ed0b212a872a1e87bbb2a
srm-1.2.1.tar.gz
Posted Nov 6, 2000
Authored by Matthew Gauthier | Site srm.sourceforge.net

secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Changes: srm will now try and chmod() files without write permission if the user answers yes at the "Remove write-protected file?" prompt or when -f is specified.
systems | unix
SHA-256 | d8e6bf6515ac5ddc552cad5ae55d0336241657703aac59dece5a670d59b5fd4b
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close