exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 83 RSS Feed

Files Date: 2005-08-05

kojoney-0.0.2.tar.gz
Posted Aug 5, 2005
Authored by Joxean Koret | Site kojoney.sourceforge.net

Kojoney is an easy of use, secure, robust, and powerful Honeypot for the SSH service. It includes other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log files.

Changes: Various corrections and additions.
tags | tool, intrusion detection
systems | unix
SHA-256 | 61e278bee046efeb6f01069affa61dbb3a1cf5a31e8b6652a1c32e48e36aaef2
TOR Virtual Network Tunneling Tool 0.1.0.13
Posted Aug 5, 2005
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Various bug fixes.
tags | tool, remote, local, peer2peer
SHA-256 | 5d0b6ce3960d5f7099e5a43c743b3930d024d26a4fad0771a1de642583676c0d
Bastille-3.0.7-1.0.noarch.rpm
Posted Aug 5, 2005
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..

systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
SHA-256 | 537fdf3fd3c6a695a889ad0ca835e99623a9d9fc16609067d679c7e183bc1c05
devsec-3.0.4.tar.gz
Posted Aug 5, 2005
Authored by p3r | Site devsec.sourceforge.net

Devolution Security is a video surveillance system for Linux based systems. It supports up to 16 cameras and features unicast and multicast broadcasting, a Web interface, an X11 interface, themes, motion detection, record on motion, eight different camera layouts, camera cycling, fullscreen mode, and more. Devolution Security uses its own toolkit (dtk).

Changes: Fix major foobar with respect to undefined reference to ReadConfig in web_interface.
tags | web
systems | linux
SHA-256 | aa3448bac1654ba555194af3533d91ca4d5b8e66aaf9dd5164a18302e2a8e9b5
aircrack-2.2.tgz
Posted Aug 5, 2005
Authored by Christophe Devine

Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.

Changes: Multiple bug fixes.
tags | tool, wireless
SHA-256 | eabc64f30ca22c9320e146bbdef2f319794855a77c55748c3f4968813b168027
nuface-0.9.tar.gz
Posted Aug 5, 2005
Authored by Vincent Deffontaines | Site inl.fr

Nuface is a Web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.

tags | tool, web, firewall, protocol
systems | unix
SHA-256 | 3daf72d6dcf577fb3010625d00f29072ba0ee017261d2ebae48454935c1a4f46
vr-9.3f.tar.gz
Posted Aug 5, 2005
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: See the changelog.
systems | unix
SHA-256 | 0ffdcf647e685c3c695704b311bc39652f1ac645a754254653099bb1380e33a2
Ubuntu Security Notice 160-1
Posted Aug 5, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-160-1 - Multiple vulnerabilities exist in Apache 2.x. Marc Stern discovered a buffer overflow in the SSL module's certificate revocation list (CRL) handler. Watchfire discovered that Apache insufficiently verified the Transfer-Encoding and Content-Length headers when acting as an HTTP proxy.

tags | advisory, web, overflow, vulnerability
systems | linux, ubuntu
advisories | CVE-2005-1268, CVE-2005-2088
SHA-256 | 610b03eb7c16047b642cbaee4904e8cd04c4a4a3db1da1f42f420be9fd66160c
PortailPHP.txt
Posted Aug 5, 2005
Authored by Abducter

PortailPHP 2.4 allows for SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 5ca963e85e2437f90ca560d0fda172bec5690cd1c6519079b2d297a549a33e1f
SSRT4682.txt
Posted Aug 5, 2005
Site hp.com

HP Security Bulletin - Oracle(R) has issued a Critical Patch Update which contains solutions for a number of potential security issues which may affect Oracle for Openview (OfO).

tags | advisory
SHA-256 | 8f7655e5e9bc9fd690990079a16ea22ec89379a9d7c90d5e4d97ee4bd7882bf8
silvernews203.txt
Posted Aug 5, 2005
Authored by rgod | Site retrogod.altervista.org

Silvernews versions 2.0.3 and below suffer from SQL injection, login bypass, remote command execution, and cross site scripting flaws.

tags | exploit, remote, xss, sql injection
SHA-256 | 85f61b5793c2cb50c002c4877892598f7a5b0936632f5a391639a9ceb94201eb
linsql2.c
Posted Aug 5, 2005
Authored by Herbless, solid

linsql2 is an updated version of the command line client for MS-SQL that can execute arbitrary SQL queries and OS commands, when the username/password of the MS-SQL server is known. This version supports the API of the latest freetds library.

tags | exploit, arbitrary
SHA-256 | 4a7f09b14553a97a9a8574a315ad5054939fcc9f829e00560c83fedc1daeea48
fuseXSS.txt
Posted Aug 5, 2005
Authored by N.N.P

Fuse version 4.1.0 and possibly earlier versions appear susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 8f5d67d23186a9cd6e844fed0fb3cf73c4aee466929859b10d0071d6071bd284
Debian Linux Security Advisory 772-1
Posted Aug 5, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 772-1 - Eduard Bloch discovered a bug in apt-cacher, a caching system for Debian package and source files, that could allow remote attackers to execute arbitrary commands on the caching host as user www-data.

tags | advisory, remote, arbitrary
systems | linux, debian
advisories | CVE-2005-1854
SHA-256 | 5b557a93df5652634a6208c38d0db0edd30ecabd35ed3d38253098fb58161011
iDEFENSE Security Advisory 2005-08-02.t
Posted Aug 5, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 08.02.05 - Remote exploitation of a buffer overflow in the Backup Agent for Microsoft SQL Server within Computer Associates' BrightStor ARCserve Backup Agent for SQL allows an attacker to execute arbitrary code with SYSTEM privileges.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2005-1272
SHA-256 | 64855f8105983a64b559d89c272c83045cbb3711cf0e0b1e55b30d4a2af87ba2
yersinia-0.5.5.tar.gz
Posted Aug 5, 2005
Authored by David Barroso, Alfredo Andres Omella | Site yersinia.sf.net

Yersinia implements several attacks for the following protocols: Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking (DTP), 802.1q and VLAN Trunking (VTP), helping a pen-tester with different tasks.

Changes: Multiple bug fixes.
tags | tool, protocol
systems | cisco, unix
SHA-256 | 06d9ecc76e0f005ac5b1bdecab48e55b998bc5a4d09f4ae2e914f47120d338a9
phrack63.tar.gz
Posted Aug 5, 2005
Authored by phrack | Site phrack.org

Phrack Magazine Issue 63 - The last issue of Phrack! In this issue: Phrack Prophile on Tiago, OSX heap exploitation techniques, Hacking Windows CE, Games with kernel Memory...FreeBSD Style, Raising The Bar For Windows Rootkit Detection, Embedded ELF Debugging, Hacking Grub for Fun and Profit, Advanced antiforensics : SELF, Process Dump and Binary Reconstruction, Next-Gen. Runtime Binary Encryption, Shifting the Stack Pointer, NT Shellcode Prevention Demystified, PowerPC Cracking on OSX with GDB, Hacking with Embedded Systems, Process Hiding and The Linux Scheduler, Breaking Through a Firewall, Phrack World News.

tags | kernel, shellcode, magazine
systems | linux, windows, freebsd, apple
SHA-256 | 32a3427c4ddef4cf274110f6abb0c9cb95a92ce308265aa82eab4f6a3ec53f13
CA Security Advisory 33239
Posted Aug 5, 2005
Authored by Ken Williams, Computer Associates | Site ca.com

Computer Associates BrightStor ARCserve Backup and BrightStor Enterprise Backup Agents for Windows contain a stack-based buffer overflow vulnerability. The vulnerability may allow remote attackers to execute arbitrary code with SYSTEM privileges, or cause a denial of service condition. The buffer overflow is the result of improper bounds checking performed on data sent to port 6070.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | windows
SHA-256 | d0b86151caf4b31b313680362872830cbd81e6f29d1e165ddf1aea180174a2ed
naxtorShop.txt
Posted Aug 5, 2005
Authored by John Cobb | Site NoBytes.com

Naxtor Shopping Cart 1.0 is susceptible to cross site scripting, SQL injection, and information disclosure vulnerabilities.

tags | exploit, vulnerability, xss, sql injection, info disclosure
SHA-256 | 261cae7535d437a324bbc188354942c054e6e0dc3304587397d3dc08116fcabf
active371.txt
Posted Aug 5, 2005
Authored by Seth Fogie | Site airscanner.com

Microsoft ActiveSync 3.7.1 allows for remote password compromise.

tags | advisory, remote
SHA-256 | af71edab85eff38524ce8cc13bb88722b7a761f02675dcf83e6cf1b388810201
activePassword.txt
Posted Aug 5, 2005
Authored by Natalia Melnikova | Site securitylab.ru

Microsoft ActiveSync has an information leak vulnerability where a password is passed in the clear.

tags | advisory
SHA-256 | a5597b1871a6a93634aea76d7bf6ba629dd8d36f3d103e073c43e82c87e656c9
quickDoS.txt
Posted Aug 5, 2005
Authored by matiteman

Quick'n'Easy FTP server 3.0 pro and lite suffer from a remote buffer overflow vulnerability that can result in a denial of service.

tags | exploit, remote, denial of service, overflow
SHA-256 | 9a64dafde7563903ef2ed2c64e250221bbb96477a2c523f5eb5c27068a9064d2
Gentoo Linux Security Advisory 200508-3
Posted Aug 5, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-03 - nbSMTP is vulnerable to a format string vulnerability which may result in remote execution of arbitrary code. Versions less than 1.00 are affected.

tags | advisory, remote, arbitrary
systems | linux, gentoo
SHA-256 | 188736265d7f7780fc865f67a6ed19d2a948cc5b5d2b453565fd694ed69dff2d
unzip552.txt
Posted Aug 5, 2005
Authored by Imran Ghory

If a malicious local user extracts a file using unzip 5.52 in a directory that they have write access to, a TOCTOU bug can be exploited to change the permission of any file belonging to that user.

tags | advisory, local
SHA-256 | 55b2c4f64e7c54f23df8ac2775729729ccfb5e0dccfe171b11c2faff2adf5173
Gentoo Linux Security Advisory 200508-2
Posted Aug 5, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-02 - infamous42md reported that ProFTPD is vulnerable to format string vulnerabilities when displaying a shutdown message containing the name of the current directory, and when displaying response messages to the client using information retrieved from a database using mod_sql. Versions less than 1.2.10-r7 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2005-2390
SHA-256 | 92e2e5ba42acd726b76870aec005d5d27b342c3b2d5a94e2daa39a52c0da932d
Page 1 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close