exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2002-11-02

shroud-1.30.tgz
Posted Nov 2, 2002
Authored by phish

Shroud is a log wiper that wipes and edits utmp, wtmp, lastlog and plaintext logs. It ensures that it keeps proper permissions and access, creation, and modify file times on the log files. It also makes use of Van Hauser's srm to delete old log files.

tags | tool, rootkit
systems | unix
SHA-256 | 80ca2636b174e0841277e9bfeea1edf0077ad7f6d1065ed534d63b87ccc206ee
sneaky-sneaky-1.12.tar.gz
Posted Nov 2, 2002
Authored by phish

Sneaky-sneaky is a bidirectional spoofed ICMP tunnel backdoor that has built-in encryption and logging capabilities. It communicates via echo replies keeping the true source IP address encrypted inside of the payload.

tags | tool, spoof, rootkit
systems | unix
SHA-256 | 7995080d8ef82352cec03420727e8d2eb5a74d0dc5ada7ad5b48d89fcf6aa397
lagsa-com21.txt
Posted Nov 2, 2002
Authored by David | Site lag.securinet.qc.ca

Lag Security Advisory - Com21 cable modem configuration file feeding vulnerability. All Com21 DOXport 1110 cable modems with software version 2.1.1.106 are vulnerable to being fed a configuration file that will allow a user to have access to features that are not paid for by spoofing an ISP-side TFTP server to feed the data.

tags | advisory, spoof
SHA-256 | 21174a7ece399423e3136d1c78ecc11cf864756b62fe48d179e2436176fa3641
anti-anti-dbg.c
Posted Nov 2, 2002
Authored by Slacko

anti-anti-debug is a Linux kernel module that is used to stop the technique currently implemented into closed source Linux binaries that disallow or restrict debugging and tracing with tools like gdb and strace.

tags | kernel
systems | linux
SHA-256 | aeca12c39a86982dc39a6c75f1547017d9e4b6274450bd8692153ad954b3dabd
idefense.abuse.txt
Posted Nov 2, 2002
Authored by David Endler | Site idefense.com

iDEFENSE Security Advisory 11.01.02 - Abuse is a popular side-scrolling video game that has a locally exploitable parsing error in the -net command line option allowing an attackers to gain root privileges.

tags | advisory, root
SHA-256 | b221fec3e71a23d7a3b9bd708f91010df4c7db23390ea1a2908cf7f76dfeb888
netscreen25.txt
Posted Nov 2, 2002
Authored by H D Moore

Netscreen VPN solutions ship with an SSH daemon that is vulnerable to the SSH1 CRC32 bug. In the default configuration, SSH is not enabled on their devices and when enabled, it is expected that any CRC32 exploits used to attack said device will cause a crash and require a reboot. Original bug discovered by Michal Zalewski.

tags | advisory
SHA-256 | c9b6c7dfaef3625ad4d061880ee7f533627566f9c4dd4145fd54b9341ca31096
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close