what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2001-04-17

fancylogin.c
Posted Apr 17, 2001
Authored by Ghost

Fancylogin 0.99.7 buffer overflow exploit. Fancylogin is usually not +s so this exploit isn't that dangerous. Tested on debian potato and kernel 2.2.18 and 2.2.19.

tags | exploit, overflow, kernel
systems | linux, debian
SHA-256 | 29d03dc71d859bbe4e1a2875ecdcaa1d77c2adb10f17069da1e18b83a08771c0
lcrzosrc-3.09.tgz
Posted Apr 17, 2001
Site laurentconstantin.com

Lcrzoex, created with the network library lcrzo, allows to test an Ethernet/IP network. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris.

Changes: Rewrite of most of the file/IPC/socket functions dealing with reading and writing data. Creation of functions lcrzo_fd_write_msg and lcrzo_stream_write_msg. These functions write their data in one step only.
tags | udp, spoof, tcp, protocol, library
systems | linux, solaris, freebsd
SHA-256 | dbfa70d9b6ce8ac4a17c12b0f95c81a072c7ebbcaf4406851176e70f4bcf9089
lids-1.0.7-2.4.3.tar.gz
Posted Apr 17, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection. LIDS FAQ available here.

Changes: Now works with kernel 2.4.3! Also includes an update for the lidsadm package, cleaner code, and better makefiles.
tags | kernel, root
systems | linux
SHA-256 | 4115335725a45f4603641308018122c98866dbd7787e7f9647379a7e21f766f6
01-2001.txt
Posted Apr 17, 2001
Authored by Cristiano Lincoln Mattos

Security flaw in Linux 2.4 IPTables using FTP PORT - If an attacker can establish an FTP connection passing through a Linux 2.4.x IPTables firewall with the state options allowing "related" connections (almost 100% do), he can insert entries into the firewall's RELATED ruleset table allowing the FTP Server to connect to any host and port protected by the firewalls rules, including the firewall itself. Advisory available here.

tags | exploit
systems | linux
SHA-256 | ae3602a2f75b24ef995eb290537dc514837d292b96235e884dbb43f17d8b9bcc
spapem.tar.gz
Posted Apr 17, 2001
Authored by s0ftpj, vecna | Site s0ftpj.org

The Spapem project aims to how how to elude securelevel under *BSD systems by hiding the fact that the system has been rebooted. Includes code to restore the PID, a LKM to change the uptime, a generic rootkit example, a module to remove startup messages, and instructions for patching init(8).

systems | bsd
SHA-256 | 82b43738fe9aaba0129a0e6210d475fb733357a302d34ecc0480bd867274d1d5
carbonite.tar.gz
Posted Apr 17, 2001
Site foundstone.com

Carbonite v1.0 is a LKM which is designed to investigate and detect rootkits, even LKM rootkits which patch calls to /proc. It works like lsof and ps at the kernel level, querying every process in Linux's task_struct, which is the kernel structure that maintains information on every running process in Linux. It gives administrators a more reliable method to identify all running processes on the system.

tags | kernel
systems | linux
SHA-256 | 9ea8e381203f46223874eea4e92810c3094d00eeda03ad7b927236f98a7cbb78
globulka.pl
Posted Apr 17, 2001
Authored by Venglin

FreeBSD-4.2-Stable ftpd GLOB remote root exploit in perl. This version requires user access and writeable home dir without chroot.

tags | exploit, remote, root, perl
systems | freebsd
SHA-256 | d9d003dd6fbf397662aaadea0cda37b79f4f487bbe81f0f4dca4c6995f5cb632
ISA.dos.txt
Posted Apr 17, 2001
Site securexpert.com

Denial of Service in Microsoft ISA server v1.0 - Microsoft ISA Server 1.0 on Windows 2000 Server SP1 is vulnerable to a simple network-based attack which stops all incoming and outgoing web traffic from passing through the firewall until the firewall is rebooted or the affected service is restarted. Exploit URL's included.

tags | exploit, web, denial of service
systems | windows
SHA-256 | 9d02d2508ec99a83764ebc8949250bbaa3f6a7f94d64565ec9d94e4721d64d5d
openbsd.glob.c
Posted Apr 17, 2001
Authored by Tomas Kindahl | Site codefactory.se

OpenBSD 2.x remote root GLOB exploit w/ chroot break. It is possible to exploit an anonymous ftp without write permission under certain circumstances. This is most likely to succeed if there is a single directory somewhere with more than 16 characters in its name. With write permissions, one could easily create such a directory.

tags | exploit, remote, root
systems | openbsd
SHA-256 | 5e2903fcb27602a8d106b23765838518455a5fb29fed0495120e4cdf16853274
clsidext.txt
Posted Apr 17, 2001
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #42, 2001 - By double clicking from Window Explorer or Internet Explorer on filenames with innocent extensions the user may be tricked to execute arbitrary programs. If the file extension has a certain CLSID, then Windows explorer and IE do not show the CLSID and only the harmless looking extension. Demonstration available here.

tags | exploit, arbitrary
systems | windows
SHA-256 | 4343d6e471cf14bde5baebc0d0bf30f0bf01a8f1220ae414f85aef130a942a42
1i0n.tar.gz
Posted Apr 17, 2001

1i0n.tar.gz is an executable package for the 1ion worm by the ramen crew. Includes several shell scripts and helper binaries.

tags | worm, shell
SHA-256 | c809a95720b0fc977cdf4bf07033e74055cbae62236d58c20fd20b1352efb33d
RHSA-2001:047-03.kernel
Posted Apr 17, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:047-03 - All Linux kernels prior to version 2.2.19 include possibilities for local denial of service or root exploits by exercising race conditions between the ptrace, exec, and/or suid system calls. Additionally, the sysctl system call included programming errors allowing a user to write to kernel memory. The 2.2.19 kernel fixes these problems.

tags | denial of service, kernel, local, root
systems | linux, redhat
SHA-256 | 7372e4cee1b52dc79e7f75bec31df9e9dced09ae503395416bd50c1899f96fc9
ms01-021
Posted Apr 17, 2001

Microsoft Security Advisory MS01-021 - The ISA Server Web Proxy service is vulnerable to a remote denial of service attack if the Web Publishing feature is enabled. Microsoft FAQ on this issue available here.

tags | remote, web, denial of service
SHA-256 | 659d1ff434647b93422ef7fd88bfa6838a2c32f67e29c72d3bc0c32808bda089
fbsdftp-ex.c
Posted Apr 17, 2001
Authored by Noah | Site ns2.crw.se

FreeBSD v4.2 ftpd remote root exploit. Uses a GLOB vulnerability. Requires an account on the machine. Compiles on FreeBSD, Linux, and Solaris. Includes information on finding offsets.

tags | exploit, remote, root
systems | linux, solaris, freebsd
SHA-256 | 540b154821aa64ba0fdf0fbba86a254d332881eacb9247606a8b7fde62483b1e
swb001.zip
Posted Apr 17, 2001
Authored by Temeran | Site securityfriday.com

SWB enables the SMB(CIFS) session setup in any Windows settings. Tested on Windows NT/2000/98SE/ME.

systems | windows
SHA-256 | 71517cee9a9e636d740bffaa9cb997d3692f984468422b3a9f89e4b0d630e0e4
beatlm002.zip
Posted Apr 17, 2001
Authored by Urity | Site securityfriday.com

BeatLm searches out the password from LM/NTLM authentication information (LanManager and Windows NT challenge/response). Tested on Windows NT and 2000.

Changes: This is version 2!
systems | windows
SHA-256 | 4c535bd8c432c5bb6d185fb0bbf6605c72ba3347e9ad5c80023369270e750c90
scooplm002.zip
Posted Apr 17, 2001
Authored by Urity | Site securityfriday.com

ScoopLM searches out the password from LM/NTLM authentication information (LanManager and Windows NT challenge/response). Tested on Windows 2000.

Changes: This is version 2.
systems | windows
SHA-256 | f2e9ef843e853126ff77c898f18f670108c195457bb18820c30fca54ab8370c7
debian.kernel.txt
Posted Apr 17, 2001
Site debian.org

Debian Security Advisory DSA-047-1 - The kernels used in Debian GNU/Linux 2.2 have been found to have a dozen security problems. Upgrade to 2.2.19!

tags | kernel
systems | linux, debian
SHA-256 | 4cb8dd320857282d9391d0b8d746664e7731e2e0d7cf46e248a7589d153f459a
shijack.tgz
Posted Apr 17, 2001
Authored by Spwny

Shijack is a TCP connection hijacking tool for Linux, FreeBSD, and Solaris. Uses Libnet.

tags | tool, sniffer, tcp
systems | linux, solaris, freebsd
SHA-256 | 5c6dc0d3488506d6b2ee58d31394985fa820a4e43b656db460c86a956de1b810
go.pl
Posted Apr 17, 2001
Authored by Roelof Temmingh

Go.pl allows you to scan ports through a misconfigured squid proxy.

tags | tool, scanner
systems | unix
SHA-256 | 98310269175325ec91f9370570f050216e816e3c000853861869d1df74773777
linux-2.2.19-sf1.tar.gz
Posted Apr 17, 2001
Authored by Andi | Site segfault.net

Linux Kernel Patch from the segfault.net project - This patch for kernel v2.2.19 allows you to specify GID's which are allowed to bind to each interface. This patch could be very useful for shell providers or admins who wants to restrict the using of more interfaces.

tags | shell, kernel, patch
systems | linux, unix
SHA-256 | 0ab604f42e9c8656bf07b1286bd56f0d7f1d756a9d7ffda62764507085a0e115
man-exp.c
Posted Apr 17, 2001
Authored by Andi | Site segfault.net

Man -l format string local exploit for Linux.

tags | exploit, local
systems | linux
SHA-256 | ca335bd4cdac2c35254a550caf5b711395186ac1f91e69c92d32054d17d198fc
psad-0.8.6.tar.gz
Posted Apr 17, 2001
Site cipherdyne.com

Port Scan Attack Detector (psad) is a perl program that is designed to work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options (Linux 2.4.x kernels only), email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap.

tags | kernel, perl, tcp
systems | linux
SHA-256 | fa42e7f72f7a151f777bdf40c928b0682a240e7cd781606b44f66c16e65be446
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close