what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-11-19

oracle.security.txt
Posted Nov 19, 2000
Authored by Daemon Root

Lots of good information on Oracle Database security. From the packet storm forums.

tags | paper
SHA-256 | 9c21cda33e2fe82137f1e4b5cf476e37e568b8ae5be7497d8dae89cdc093a286
shellinabox.tar.gz
Posted Nov 19, 2000
Site shellinabox.com

Shell In A Box provides shell access to a server from within any Java-enabled Web browser. Requests are tunneled over HTTP using the same proxy settings that the browser uses. On the server, it installs as a CGI program, and there is no client-side installation necessary. It sports full VT102 emulation with Unicode support, international font files, ANSI colors, a scrollback buffer, mouse position reporting, clipboard support, and user-configurable emulation modes. All user preferences are stored as cookies in the client's browser.

tags | java, web, shell, cgi
SHA-256 | bab597954c3f02125d4b13bcb88954599602b33329b4ce52df6299fcffb5f9ea
sping-1.1.tar.gz
Posted Nov 19, 2000
Authored by Tim J Robbins | Site box3n.gumbynet.org

sping sends ICMP ECHO requests to network hosts to determine whether they are 'alive'. It is a small and hopefully secure implementation of the common ping utility that offers far less control over the packet options that may be specified (packet size, delay between packets, etc.) - this is a feature, for both security and bandwidth reasons. sping has been tested on Linux 2.4.0-test8 but should work on other operating systems.

Changes: Drops privileges, checks packet source, and adds improved docs.
tags | tool
systems | linux, unix
SHA-256 | 5d18db6fc500692b383fc05fbd67e5b833897c35d8f847c4b2f4fe0487aa229b
tetrinet-1.13.dos.txt
Posted Nov 19, 2000
Site m4dskill.org

Tetrinet v1.13 has a denial of service vulnerability which is caused by telnetting to the tetrinet port and pressing enter once, freezing the game.

tags | exploit, denial of service
SHA-256 | ed11e968ca11f1ec388ea80f84379db00319fe1bf75648088cf4b43c2f6bc74f
iis4_nt4sec.txt
Posted Nov 19, 2000
Site shebeen.com

IIS and NTS 4.0 Hardening Guide v1.1 - Detailed instructions on tightening down the security on an IIS 4.0 web server. Includes install and setup details, server configuration, hardening, registry edits, securing permissions, firewall ACL's, and SSHD. This hardening procedure should NOT be used on general-purpose NT servers on an internal LAN as it removes several of the services that NT uses for default functionality.

tags | paper, web, registry
SHA-256 | 6a460f07556c6f4e9eb5683f3c5badc17be689e406aa0c961ddd5f0fc7a47cc9
srm-1.2.2.tar.gz
Posted Nov 19, 2000
Authored by Matthew Gauthier | Site srm.sourceforge.net

secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Changes: Minor bug fixes, -f now really does ignore nonexistent files now.
systems | unix
SHA-256 | 08c177f1c5eba6e4857fb8a5a55d96687448658c9bafbac14c6c38b672e4428d
sbo_ethereal.c
Posted Nov 19, 2000
Authored by JW Oh | Site hacksware.com

Ethereal v0.8.13 advisory and remote exploit for Linux x86. A stack overflow in the AFS packet parsing routine allows a spoofed packet to start a root shell bound to TCP port 36864.

tags | exploit, remote, overflow, shell, x86, root, spoof, tcp
systems | linux
SHA-256 | 5849011e1fbedaeca9f6469317a94d0d5df77b160e51dc2cfaf731ba6fdbc8e5
debian.cron.txt
Posted Nov 19, 2000
Site debian.org

Debian Security Advisory - The version of Vixie Cron shipped with Debian GNU/Linux 2.2 is vulnerable to a local attack, discovered by Michal Zalewski. Several problems, including insecure permissions on temporary files and race conditions in their deletion, allowed attacks from a denial of service (preventing the editing of crontabs) to an escalation of privilege (when another user edited their crontab). As a temporary fix, "chmod go-rx /var/spool/cron/crontabs" prevents the only available exploit; however, it does not address the problem - upgrade is needed.

tags | denial of service, local
systems | linux, debian
SHA-256 | 45066b5be833b8794dd17760df1ec1d6a414c23ede771168906f53a3c837a917
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close