exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2000-12-19

cgichk_2.50.tar.gz
Posted Dec 19, 2000
Authored by Toby Deshane | Site sourceforge.net

Cgichk is a web vulnerability scanner which automatically searches for a series of interesting directories and files on a given site. Instead of focusing on vulnerable CGI scripts, it looks for interesting and/or hidden directories such as logs, testing, secret, scripts, stats, restricted, code, robots.txt, etc.

Changes: This version is a somewhat major code rewrite. HTTP requests were fixed (most sites work correctly now). HTTP proxy support was added. User agent identification was added. URL parsing code was rewritten. A couple more targets were added.
tags | web, cgi
systems | unix
SHA-256 | 8a0ab0f66d6a55d9091a4daa12b32a1dbbc5aec652a3158bb0b5ffb0464af184
fwmon-1.0.3.tar.gz
Posted Dec 19, 2000
Site sourceforge.net

fwmon is a firewall monitor for Linux which integrates with ipchains to give you realtime notification of firewall events. It has fairly customizable output, allowing you to display a packet summary, hex, and ascii data dumps to stdout, a logfile, or tcpdump-style capture files. It also boasts some simple security features such as the ability to chroot itself, and does not need to run as root.

tags | tool, root, firewall
systems | linux
SHA-256 | ade062b651435cad1292f8c79ec185edca2ffedd627f4042a5c91ed1bb0f77e2
netsec42.txt
Posted Dec 19, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: A good year for the bad guys, and much more.

SHA-256 | 23b78fa26b43a92a1b64d9bea364ed236d79d46634eaeb1d9bbf14b2114ba066
rhsa.2000-123-01.ed
Posted Dec 19, 2000
Site redhat.com

Red Hat Security Advisory - The ed editor used files in /tmp in an insecure fashion. It was possible for local users to exploit this vulnerability to modify files that they normally could not and gain elevated privilege.

tags | local
systems | linux, redhat
SHA-256 | 603f90530a97c999b489e1a19cb700af30630f6caf6f02cf9dd87d401c6b6620
rpc-everythingform.txt
Posted Dec 19, 2000
Authored by RPC

everythingform.cgi uses a hidden field "config" to determine where to read configuration data from. Allows remote attackers to execute commands. Exploit URL's included.

tags | exploit, remote, cgi
SHA-256 | 01ce9f63078ea884e7545c04bce65a8e11c4e87b1fcbdb0508d60474d1357b4f
xitetris.c
Posted Dec 19, 2000
Authored by vade79, realhalo | Site realhalo.org

Itetris v1.6.2 local root exploit - Exploits a vulnerable system() call.

tags | exploit, local, root
SHA-256 | 13a0ac0bf7a88ce8832d4b779b8bebc6e5d04c2c956942c7b7664e4ff6f8a7ac
debian.slocate.txt
Posted Dec 19, 2000
Site debian.org

Debian Security Advisory - A bug in the database reading code of slocate makes possible to overwrite a internal structure with some input. This can be used to trick slocate into executing arbitrary code by pointing it to a carefully crafted database. This is fixed in slocate v2.4.

tags | arbitrary
systems | linux, debian
SHA-256 | 24e59b5dc48649f6a9258edf08a87a8b7537a1b2ddb866b04b56715dceb03bcb
debian.nano.txt
Posted Dec 19, 2000
Site debian.org

Debian Security Advisory - The problem that was previously reported for joe also occurs with other editors. When nano (a free pico clone) unexpectedly dies it tries a warning message to a new file with a predictable name. Unfortunately that file was not created safely which made nano vulnerable to a symlink attack. This has been fixed in version 0.9.23-1 (except for powerpc, which has version 0.9.23-1.1).

systems | linux, debian
SHA-256 | 6cf26c8a6c9303180c410ab4dc3cda34443b39eec2c11bf8bd3908081f04eff4
rhsa.2000-126-03.bitchx
Posted Dec 19, 2000
Site redhat.com

Red Hat Security Advisory - A problem exists where BitchX will process malformed DNS answers, allowing an attacker to crash the client, or possibly access the BitchX session remotely. This is fixed in v1.0c17-3.

systems | linux, redhat
SHA-256 | b63aa4217992472a30e4427aab9dce2b9401c5bb0e47d6b1a64b2995359b2286
7350nxt-v3.tar.gz
Posted Dec 19, 2000
Authored by teso | Site team-teso.net

Exploit for the Bind NXT remote root vulnerability, which affects Bind v8.2 - 8.2.1. Compiles on Linux, tested against Irix, BSD, and Linux. Includes Irix shellcode for breaking chroot.

tags | exploit, remote, root, shellcode
systems | linux, irix, bsd
SHA-256 | febfc0b34d825bb1fd2b1ea1e96374fa6816966c45c2f8ac101caef72cf4b91b
reverb-0.1.0.tar.gz
Posted Dec 19, 2000
Authored by teso | Site team-teso.net

Reverb is a tool to access firewalled, dynamic-dialin and otherwise protected hosts.

SHA-256 | 9548ad877de5a2911412ee36598b233d8e3896399e75768fa1aa5b678c016314
7350oftpd.tar.gz
Posted Dec 19, 2000
Authored by teso, Caddis | Site team-teso.net

OpenBSD ftpd v2.4_BASE through 2.8 remote root exploit. Includes offsets for v2.6 through v2.8 and instructions for finding offsets of other versions. Requires a writable directory.

tags | exploit, remote, root
systems | openbsd
SHA-256 | e60d36076da9b2566b60a358f1600945cb7392b7f05305acfc0f2dfa49415169
xckermit.c
Posted Dec 19, 2000
Authored by vade79, realhalo | Site realhalo.org

Ckermit v7.0 local buffer overflow exploit for Linux/x86. Not setuid by default, but often installed setuid.

tags | exploit, overflow, x86, local
systems | linux
SHA-256 | a764a6764b205afa2af181409160d382cd7900bb0e413755bae2fd0a686d98de
Elwiz_en.zip
Posted Dec 19, 2000
Site heysoft.de

This Shareware program is an user friendly alternative to the built in eventlog viewer of Windows NT. Besides it allows to conveniently watch the eventlogs of the machines of your network. As soon as an unfiltered event occurs on one of the watched machines, a popup window will inform you about it. You can even start programs of your choice in response to events of your choice. Last not least Elwiz shows some important information about the watched machines.

systems | windows
SHA-256 | 7ad33242268057a6ff10e53683b25c4b8a5f24fcd639c460c40699edeb1b7fdf
archpr.zip
Posted Dec 19, 2000
Site elcomsoft.com

Advanced Archive Password Recovery (or ARCHPR for short) can be used to recover lost or forgotten passwords to ZIP (PKZip, WinZip), ARJ/WinARJ, RAR/WinRAR and ACE/WinACE archives. At the moment, there is no known method to extract the password from such compressed files, so the only available methods are "brute force" and dictionary attacks (for ARJ and ZIP formats, known-plaintext attack is also available).

SHA-256 | 70f8aa78b7a0da27f290d5feade5857bfd0812119150cdd8cfc45bbd19470118
alpr.zip
Posted Dec 19, 2000
Site elcomsoft.com

Advanced Lotus Password Recovery v1.02 is a program to recover lost or forgotten passwords to the files/documents created in IBM/Lotus applications (all versions): Organizer, WordPro, 1-2-3 and Approach. The passwords are recovered instantly; multilingual passwords are supported.

SHA-256 | 0e8704380169052d315e597ecff7cd351e418e290db9c3baa4fdb06caeeba944
NDiff-0.04.tar.gz
Posted Dec 19, 2000
Authored by James Levine | Site vinecorp.com

NDiff compares two nmap scans and outputs the differences. It allows monitoring of your network(s) for interesting changes in port states and visible hosts. NDiff should be useful to network administrators, security analysts, and other interested parties who need to monitor large networks in an organized fashion.

Changes: This release has several bugfixes and output formatting improvements, including the addition of HTML output.
tags | tool, nmap
systems | unix
SHA-256 | f779f0dc5b5ec7204915096b9863b1b7c5c7fa078181c15dbceb4afb0fd0caff
xlockmore-5.00.tar.gz
Posted Dec 19, 2000
Site tux.org

xlockmore is an enhanced version of xlock. It incorporates several new commandline options , which allow you to run it in a window, in the root window, in a different size/location, change the size of the iconified window, to install a new colormap and delay locking for use with xautolock.

Changes: A large number of bugfixes, updates, and new features. Includes some new modes.
tags | root
systems | unix
SHA-256 | 9089db84a38d940c8efc42d7183198b9eb542928804e446207e6c28794a3261f
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close