exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2004-07-13

psad-1.3.2.tar.gz
Posted Jul 13, 2004
Site cipherdyne.org

Port Scan Attack Detector (psad) is a collection of four lightweight daemons written in Perl and C that are designed to work with Linux firewalling code (iptables and ipchains) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options, email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP, UDP, and ICMP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap. Psad also uses packet TTL, IP id, TOS, and TCP window sizes to passively fingerprint the remote operating system from which scans originate. Changelog available here.

Changes: Bug fixes and other improvements.
tags | remote, kernel, udp, perl, tcp
systems | linux
SHA-256 | e6447d4842b6e3c1dad9bc8268edb9d3c08ff57486dc37dcdd5f2c4f90eae031
fedora_im-switch_tempfile_race.txt
Posted Jul 13, 2004
Site bugzilla.redhat.com

Tatsuo Sekine has reported a vulnerability in Fedora, which can be exploited locally to increase privileges via a file race condition.

tags | advisory
systems | linux, fedora
SHA-256 | b37540bb077cfdff9b2923cb16f524415a038f569af71f7ffcf0548e53efad9c
twoMoz.txt
Posted Jul 13, 2004
Authored by Mindwarper | Site mlsecurity.com

Mozilla and Firefox are susceptible to a couple of flaws that allow for remote code execution under the guise of the local zone.

tags | advisory, remote, local, code execution
SHA-256 | 91aed3631daa564efb231ee3fd4a66218ac72fd75cfc8bcf98ec0c7ca75996bb
0x00_vs_ASP_File_Uploads.pdf
Posted Jul 13, 2004
Authored by Brett Moore SA | Site security-assessment.com

White paper covering the topic of upload systems written in ASP. Many upload systems written in ASP suffer from a common problem whereby a NULL byte can be inserted into the filename parameter leading to any extension, after the null byte, being ignored when writing the file. This means that in some cases it is possible to bypass checks for valid extensions, even if one is appended by the application.

tags | paper, asp
SHA-256 | e3b3b4f30a2a0648c126c82e8737baf56f8691cabd9319b9cf8a4dd23890ba6f
phrack62.tar.gz
Posted Jul 13, 2004
Authored by phrack | Site phrack.org

Phrack Magazine Issue 62 - In this issue: Bypassing Win BO Protection, Kernel Mode Backdoor for NT, Advances in Windows Shellcode, UTF8 Shellcode, Attacking Apache Modules, Radio Hacking, Win32 Portable Userland Rootkit, Bypassing Windows Personal Firewalls, A DynamicPolyalphabeticSubstitutionCipher, and more.

tags | kernel, shellcode, magazine
systems | windows
SHA-256 | ce5a1cdbcd88fe8e1bdaebec9d5a15714f8d4c25d94312740b9f0e86ad2f877c
iDEFENSE Security Advisory 2004-07-12.t
Posted Jul 13, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 07.08.04: Exploitation of a buffer overflow vulnerability in Adobe Reader 6.0 could allow remote attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
SHA-256 | 383f49d320c1476f969425a1c81ec1d0967ef361ec302931087af4274d7646eb
iDEFENSE Security Advisory 2004-07-09.t
Posted Jul 13, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 07.09.04: The wv library has been found to contain a buffer overflow condition that can be exploited through a specially crafted document.

tags | advisory, overflow
advisories | CVE-2004-0645
SHA-256 | 8e6f42ccaddef8a6b4007bf499d26f516872c7ced4979868d2e3839a3fa4ce4d
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close