exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files Date: 2001-03-16

mimedefang-1.0.tar.gz
Posted Mar 16, 2001
Authored by Dianne Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.10 / 8.11 and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Added logging, process limiting, and more.
systems | windows, unix
SHA-256 | 902417f6d9f0311f6e8a421151f443b23982df7a9d5d3b90bee15845d9b0654f
arping-0.96.tar.gz
Posted Mar 16, 2001
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: Minor fixes.
tags | tool
systems | unix
SHA-256 | 58bd9d2542327b065389a4c6bfb66092dc87a14ca2c399ae071af81fd5339411
inflex-1.0.0d.tar.gz
Posted Mar 16, 2001
Authored by Paul L Daniels | Site inflex.co.za

Inflex is an email scanner which encapsulates your existing sendmail server setup. It scans both incoming and outgoing email and it does not alter your current /etc/sendmail.cf file. It can scan for email viruses, unwanted file types (eg. EXE, BMP, MPEG) and file names (eg. prettypark.exe). It can also be used to scan for text snippets within emails.

systems | unix
SHA-256 | 66ad62d009299c969251f0b9d6d962b5f3a6ccc99be476963ea06f9f62983074
mindtermbin-v199.zip
Posted Mar 16, 2001
Authored by Mats Andersson | Site mindbright.se

MindTerm is a complete ssh-client in pure java which can be used either as a standalone java-application or as a java-applet. Includes a vt102/xterm-terminal with the ssh protocol and also "drop-in" socket replacements to use ssh tunnels transparently from a java application/applet.

Changes: Integrated SSH2 code into MindTerm, only works with auth types publickey and password. Fixed bugs.
tags | java, protocol
SHA-256 | 36b73f3dcb05c96281c1d2e354b7df64078559e80ebc22d9517b6d1729fe5f51
labs2001-01.txt
Posted Mar 16, 2001
Site ussrback.com

USSR Advisory USSR-2001001 - The Windows SSH server (sshd) v2.4 is vulnerable to a denial of service attack. It can not handle more than 64 simultaneous connections. Fixed in v2.5.

tags | denial of service
systems | windows
SHA-256 | 3bdcb948c7b107ba1452c0a142cd268be0238e2a66b1e53cfb568e358b5c21ed
stick.htm
Posted Mar 16, 2001
Site eurocompton.net

The Stick DDOS tool is a resource starvation attack against IDS systems. Many IDS systems are affected.

tags | denial of service
SHA-256 | fb3c089efbb1b77760eceff0d11ba3affad8b80eb75f0658ffc53976bb76031a
Internet Security Systems Security Alert
Posted Mar 16, 2001
Site xforce.iss.net

ISS X-Force has been researching a new attack tool that can be used to launch a stress test against many popular intrusion detection systems (IDS). The new tool, dubbed Stick by its creators, has been reported to reduce performance, and/or deny service to many commercial IDS products. Stick has been reported to direct thousands of overt attacks at IDS systems. The additional processing required by IDS systems to handle the new load causes a Denial of Service (DoS) to manifest.

SHA-256 | da1612bccb80ba244587e23c1bfb6b0a07c6e7e404ffbe49e615f9ba4a14b6a8
RHSA-2001:027-02.sgml-tools
Posted Mar 16, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:027-02 - The sgml-tools uses temp files in an insecure fashion. Upgrade to the newest version.

systems | linux, redhat
SHA-256 | 39eb11b23194fe2bfc8dddc989a9876eeb485ff682d70ccd2fa97242f8657279
RHSA-2001:029-02.mutt.imap
Posted Mar 16, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:029-02 - Format string vulnerabilities have been found in the IMAP code included with the mutt mail reader previous to v1.2.5, allowing a compromised or malicious IMAP server to execute code on the local machine.

tags | local, vulnerability, imap
systems | linux, redhat
SHA-256 | 651182840249b7d25c5e1384bd25fa4e5a19abf492e0af16ec9899b35d4b156a
RHSA-2001:028-02.slrn
Posted Mar 16, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:028-02 - An overflow exists in the slrn package as shipped in Red Hat Linux 7 and Red Hat Linux 6.x, which leads to remote users executing arbitrary code as the user running slrn.

tags | remote, overflow, arbitrary
systems | linux, redhat
SHA-256 | da1dfcdf5e3c474abd98091c906590120e6935b352dfa01345aa842c9d76f583
Synapsys-lkm.tar.gz
Posted Mar 16, 2001
Authored by Berserker | Site neural-collapse.org

Synapsis is a LKM rootkit for Linux which features file hiding, process hiding, user hiding, magic UID, and netstat hiding.

tags | tool, rootkit
systems | linux, unix
SHA-256 | 299a271382e7e36674ad25e835c29e4593253f9ee645b9906c074ec6c3d5e012
checkp.sh
Posted Mar 16, 2001
Authored by Deepin | Site nsfocus.com

Checkp.sh checks which sun recommended patches need to be installed. Useful for Solaris admins! Uses the 2.6 patch list, but you can change it for others.

systems | unix, solaris
SHA-256 | 48ff8452cb9d9a63feae607a0029586fb3506c2a22be48c86b204ed33c7de576
ms01-016
Posted Mar 16, 2001

Microsoft Security Advisory MS01-016 - A remote denial of service attack has been discovered in WebDAV, and extension to the HTTP protocol included in Windows 2000 IIS 5.0. Microsoft FAQ on this issue available here.

tags | remote, web, denial of service, protocol
systems | windows
SHA-256 | c80117b9bf7cc43251692b9718db26d94050802d79ad071dfb50f1e55501d4d4
RNmap 0.5 Beta
Posted Mar 16, 2001
Authored by Tuomo Makinen | Site sourceforge.net

Remote Nmap is a python client/server package which allows many authorized clients to connect to a centralized nmap server to do their port scanning. This could be useful for security companies who want to have all their scans come from a dedicated machine.

Changes: Now rnmap supports encrypted communications with optional modules. Protocol has changed to support plain/ciphertext communications.
tags | tool, remote, nmap, python
systems | unix
SHA-256 | 6e2d5296e6d2c16093f2ba394662e10723c9b919de3d5ea44c60358ad8fd3287
debian.mailx.txt
Posted Mar 16, 2001

Debian Security Advisory DSA-044-1 - The mail program (a simple tool to read and send email) as distributed with Debian GNU/Linux 2.2 has a buffer overflow in the input parsing code. Since mail is installed setgid mail by default this allowed local users to use it to gain access to mail group. Since the mail code was never written to be secure fixing it properly would mean a large rewrite. Instead of doing this we decided to no longer install it setgid. This means that it can no longer lock your mailbox properly on systems for which you need group mail to write to the mailspool, but it will still work for sending email. Debian security homepage: http://www.debian.org

tags | web, overflow, local
systems | linux, debian
SHA-256 | 65225d45fe97f937fa6791a4d502df39372d4b4b6ff6ce1d5471044798905136
suq_diq.zip
Posted Mar 16, 2001
Authored by Xor37h, Darkman

Suq Diq v1.00 is a remote exploit for IBM Net.Commerce, WebSphere and possibly other IBM and Lotus applications as well. These products use Tripple DES with a fixed key by default, allowing remote users to gain the usernames and plaintext passwords of all Net.Commerce accounts. Exploit URL's included.

tags | exploit, remote
SHA-256 | 456ddf7f21b031b28f2dde450649305feb794560bd860f5ff50870ac332465dc
chkrootkit-0.23.tar.gz
Posted Mar 16, 2001
Authored by Nelson Murilo | Site chkrootkit.org

chkrootkit locally checks for signs of a rootkit. Includes detection of LKM rootkits, ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux, FreeBSD, Solaris, and OpenBSD.

Changes: Lrk6 detection, rh[67]-shaper detection, RSHA detection, Romanian rootkit detection, test for shell history file anomalies, and a better bindshell test.
tags | tool, integrity, rootkit
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 4fb32cf69c099e1c1c8fb0a829f0cf20295af56a66ccb91b51642d0d8d5d2baf
FreeBSD Security Advisory 2001.29
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:29.rwhod - Malformed packets sent to the rwhod daemon via UDP port 513 could cause it to crash, thereby denying service to clients.

tags | udp
systems | freebsd
SHA-256 | d0e5626fc0a114aca4d206ed884b059d29eb84f5db39bad6f452ffdbbdb3ec07
FreeBSD Security Advisory 2001.28
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:28 - Malformed packets sent to the timed daemon on UDP port 525 could cause it to crash, thereby denying service to clients.

tags | udp
systems | freebsd
SHA-256 | 4b53ee36f6fd34c4b54d687a1dac18792fc95ea30d370ff8f2d80275bbbe55ff
FreeBSD Security Advisory 2001.27
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:27 - The cfengine port, versions prior to 1.6.1, contained several format string vulnerabilities which allow a remote attacker to execute arbitrary code on the local system as the user running cfengine, usually user root.

tags | remote, arbitrary, local, root, vulnerability
systems | freebsd
SHA-256 | a7f47cec624617cb484ffc0d9e3ccf954f580bd00348310894bd1aac303a4cd2
FreeBSD Security Advisory 2001.26
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:26 - The interbase port has a hard coded backdoor which has full read and write access to databases stored on the server, and also gives the ability to write to arbitrary files on the server as the user running the interbase server (usually user root). Remote attackers may connect to the database on TCP port 3050.

tags | remote, arbitrary, root, tcp
systems | freebsd
SHA-256 | a541aa5579236a77051e5dcbc2246ce72182fdea0f95eaace89c3acbd18ad1ef
FreeBSD Security Advisory 2001.23
Posted Mar 16, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:23 - The icecast port, versions prior to 1.3.7_1, contains multiple format string vulnerabilities, which allow a remote attacker to execute arbitrary code as the user running icecast, usually the root user.

tags | remote, arbitrary, root, vulnerability
systems | freebsd
SHA-256 | e32a64dc0b3ab0cbabbdccc9b1c5ab6d87888e20dac4061a5944907543de4e36
openssh-2.2.0-exp.tgz
Posted Mar 16, 2001
Authored by Nemes||y

OpenSSH-2.2.0 remote exploit - Includes a wrapper to brute force the offset.

tags | exploit, remote
SHA-256 | 69c2cf51173e0fc8e778c6301220d383a260b74f3973fc7a977063b57e64b674
npulse-0.50.tar.gz
Posted Mar 16, 2001
Authored by Dr. Steven Horsburgh | Site horsburgh.com

nPULSE is a web-based network monitoring package for Unix-like operating systems. It can quickly monitor tens, hundreds, even thousands of sites/device s at a time on multiple ports. nPULSE is written in Perl, uses nmap as its core scanning engine, and comes with its own mini web server for extra security.

Changes: Includes 20 new features!
tags | tool, web, perl, nmap
systems | unix
SHA-256 | a22ae4ce7edafd40a197aabf965a8be7f7cdcdd3b9d8cbef6d161551d9e846d8
disassembling.txt
Posted Mar 16, 2001
Authored by Angel Ramos

Disassembling programs on Debian Linux 2.2 using gdb.

tags | paper
systems | linux, unix, debian
SHA-256 | 56d9a1c2e8443b0f76c19af756ecdda7c41fa869fa870e362ec15110a4a21e2b
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close