what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 67 RSS Feed

Files Date: 2005-08-17

kismet-2005-08-R1.tar.gz
Posted Aug 17, 2005
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data. Full changelog here.

Changes: This fixes several potential security problems. ALL USERS SHOULD UPGRADE.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | 27e657212881186d356907a7c45b168e7431a2f83f3411d2a90366afccf03916
aircrack-2.22.tgz
Posted Aug 17, 2005
Authored by Christophe Devine

Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.

Changes: Now compatible with madwifi CVS 2005-08-14.
tags | tool, wireless
SHA-256 | a970a919188382c34c6a67a7d1e2431b41cf6560344105de889336c40a550544
plash-1.11.tar.gz
Posted Aug 17, 2005
Authored by Mark Seaborn | Site cs.jhu.edu

Plash (the Principle of Least Authority Shell) is a Unix shell that lets you run Unix programs with access only to the files and directories they need to run. In order to implement this, the filesystem is virtualized. Each process can have its own namespace, which can contain a subset of your files. Plash is implemented by modifying GNU libc and replacing the system calls that use filenames. For example, open() is changed so that it sends a message to a file server via a socket. If the request is successful, the server sends the client a file descriptor. Processes are run in a chroot jail under dynamically-allocated user IDs. No kernel modifications are required. Existing Linux binaries work unchanged.

Changes: The major new feature in this version is the plash-run-emacs program.
tags | tool, shell, kernel
systems | linux, unix
SHA-256 | 0e5a558e4d8f858cd9a53bf4dfe8abf1b4c0de4d86f5d95af9f14b7643102693
Nmap Scanning Utility 3.83 Defcon 13 Version
Posted Aug 17, 2005
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.

Changes: Defcon special release version. Added the ability for Nmap to send and properly route raw ethernet packets containing IP datagrams rather than always sending the packets via raw sockets. Added ARP ping. Applied a massive OS fingerprint update from Zhao Le (about 350 fingerprints). Integrated hundreds of nmap-service-probes signatures from Doug Hoyte. Check the changelog for the rest.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | cc0f200a332338fed35cc7ec373e115e55c78297311ea2e946f58a28dffacc8a
phpwebsite0101.txt
Posted Aug 17, 2005
Authored by matrix killer | Site h4cky0u.org

phpWebSite 0.10.1 Full is susceptible to a SQL injection attack.

tags | exploit, sql injection
SHA-256 | 3d922118eca405d9df288ffe8212cfc258f0554c45b5b5fcece3de23dcdf29ff
SSRT4874.txt
Posted Aug 17, 2005
Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Ignite-UX, where unsafe file permissions could be remotely exploited to allow an unauthorized user to access and alter Ignite-UX client data on the Ignite-UX server.

tags | advisory
systems | hpux
SHA-256 | 392b00c56ab0fd41d1e482f2d70734a301162f3368dfef4d939af6113290f4ab
Debian Linux Security Advisory 776-1
Posted Aug 17, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 776-1 - Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is vulnerable to integer overflows when handling the TNEF, CHM and FSG file formats.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2005-2450
SHA-256 | cf603d23cf404ec2c6a51552eaf463479edfb8b0ba1347be502c28949adc94a7
bypassing-win-heap-protections.pdf
Posted Aug 17, 2005
Authored by Nicolas Falliere

Whitepaper detailing a new way to bypass Microsoft Windows heap protection mechanisms. The methodology explained here is different from the method introduced by Alexander Anisimov.

tags | paper
systems | windows
SHA-256 | 9a61e882adb5edb01d3de81fa7a37d2cd965a7b01614922c1ceb92e45f8a1500
Corsaire Security Advisory 2004-11-23.2
Posted Aug 17, 2005
Authored by Martin O'Neal, Corsaire

Corsaire Security Advisory - The aim of this document is to clearly define a vulnerability in the HP Ignite-UX product, as supplied by HP Inc., that would allow unauthenticated write access to the host filesystem, both remotely and locally.

tags | advisory
advisories | CVE-2004-0952
SHA-256 | bd7fc27a50d40ede02ba72bc8f8469bd365c3aa828f2f6c856f3e5b6b6c4fa87
Corsaire Security Advisory 2004-11-23.1
Posted Aug 17, 2005
Authored by Martin O'Neal, Corsaire

Corsaire Security Advisory - The aim of this document is to clearly define a vulnerability in the HP Ignite-UX product, as supplied by HP Inc., that would allow unauthenticated access to a copy of the /etc/passwd file.

tags | advisory
advisories | CVE-2004-0951
SHA-256 | 795d1dc86a63b7e0c62cc4672e2505d6773a262bd53570e6651222f8b8c385cf
SUSE-SA-2005-046.txt
Posted Aug 17, 2005
Site suse.com

SUSE Security Announcement - A security flaw was found in the Apache and Apache2 web servers which allows remote attacker to smuggle requests past filters by providing handcrafted header entries.

tags | advisory, remote, web
systems | linux, suse
advisories | CVE-2005-2088, CVE-2005-1268
SHA-256 | f2c1e27393e00e608df20530f2d81d124ab334a14e72c5c06bcdaa4e99e13fad
persianblog.txt
Posted Aug 17, 2005
Authored by trueend5 | Site KAPDA.ir

PersianBlog.com, with 63,000 blogs, is susceptible to SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 427fdbc605b961df1ef493a25c194345f2bf87603811b47a1ee814b2ac562617
Exploit Labs Security Advisory 2005.10
Posted Aug 17, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Mac OS X Weblog Server version 10.4.0 is susceptible to cross site scripting attacks.

tags | exploit, xss
systems | apple, osx
advisories | CVE-2005-2523
SHA-256 | cd839b3975e97a7cc43a50f400458622d99c52a49dfd7c5d496467a705bb86ae
sakeru.txt
Posted Aug 17, 2005
Authored by sinhack research labs

Sakeru version 0.1 is a URL filtering bypass proof of concept tool that takes advantage of weaknesses in Websense, etc.

tags | exploit, proof of concept
SHA-256 | 616fd3f75317adc483dfec1522f146712ad5662dbb229e6dbf0bd27003fdd908
ECWshop.txt
Posted Aug 17, 2005
Authored by John Cobb | Site NoBytes.com

ECW Shop version 6.0.2 suffers from cross site scripting, various injection, and disclosure vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | fca43a907a2483129c05dcd4401eac9a0f25c8af69d97ee1413c3e49f97b5226
linkBypass.txt
Posted Aug 17, 2005
Authored by Steve Scherf

It appears that firmware version 4.50.6 for the Linksys WRT54GS (hardware version 1) wireless router allows wireless clients to connect and use the network without actually authenticating.

tags | advisory
SHA-256 | 96e8d0b366b9a6d9eb3a34c25b308ab8fed0342424a224e57d4430f08f3e689b
httpsplit.txt
Posted Aug 17, 2005
Authored by Amit Klein

This technical note describes a detection/prevention technique that works in many cases both with HTTP Response Splitting and with HTTP Request Smuggling.

tags | paper, web
SHA-256 | 5ea1e8c04c45276464698ca627370626105e043dcb550f659141545d10bf8160
browser_ident.pdf
Posted Aug 17, 2005
Authored by Shreeraj Shah | Site net-square.com

White paper discussing web browser identification and how proper identification can enable a remote site to know what attacks to use against a visitor.

tags | paper, remote, web
SHA-256 | af292d7644b45c3e998a980f23ff821b434d866040446022bb3ee6a5b46b07a2
Gentoo Linux Security Advisory 200508-8
Posted Aug 17, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-08 - Xpdf, Kpdf and GPdf do not handle a broken table of embedded TrueType fonts correctly. After detecting such a table, Xpdf, Kpdf and GPdf attempt to reconstruct the information in it by decoding the PDF file, which causes the generation of a huge temporary file. Versions less than 3.00-r10 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-2097
SHA-256 | 8c9adaf5bc503b7b7cc86f1fc25ed15c58ef4db9225447aa086a4e614d3f39bb
Gentoo Linux Security Advisory 200508-6
Posted Aug 17, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-06 - Brandon Perry discovered that Gaim is vulnerable to a heap-based buffer overflow when handling away messages (CVE-2005-2103). Furthermore, Daniel Atallah discovered a vulnerability in the handling of file transfers (CVE-2005-2102). Versions less than 1.5.0 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-2102, CVE-2005-2103
SHA-256 | a9e18b534ee44264fe5c4d56eae837665d441f2f58ec2128fc0139cfe4cfa46d
Gentoo Linux Security Advisory 200508-7
Posted Aug 17, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200508-07 - When using a URLPlugin, AWStats fails to sanitize Referrer URL data before using them in a Perl eval() routine. Versions less than 6.5 are affected.

tags | advisory, perl
systems | linux, gentoo
advisories | CVE-2005-1527
SHA-256 | 29e8f8b5a0e530a35adb5742adf73ee87b44d8633ea71413519119f2dadbf849
x_osh2.pl.txt
Posted Aug 17, 2005
Authored by Charles Stevenson

Operator Shell (osh) 1.7-12 local root exploit. New version of an old exploit.

tags | exploit, shell, local, root
SHA-256 | 4ddcb37c6addfe9669637e9768105bf89fb404c3737bcff22f8e1019069720c9
ajax.txt
Posted Aug 17, 2005
Site cpaint.sourceforge.net

The makers of CPAINT Ajax Toolkit have discovered code execution vulnerabilities in their software. All versions prior to version 1.3-SP are affected.

tags | advisory, vulnerability, code execution
SHA-256 | 6c1b4d723d050b0fa556f05f2f1f431ed1089bd3c77932893f93fcb340d72f97
Hardened-PHP Project Security Advisory 2005-15.67
Posted Aug 17, 2005
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

A vulnerability in the PHP XML-RPC libraries allows injection of arbitrary PHP code into eval() statements. Versions 1.1.1 and below are affected.

tags | advisory, arbitrary, php
advisories | CVE-2005-2498
SHA-256 | 19d40733455dcea434023fe40242a8416ebdce81f0b0db82c65eaaf8dc985605
Hardened-PHP Project Security Advisory 2005-14.66
Posted Aug 17, 2005
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

A vulnerability in the PEAR XML-RPC libraries allows injection of arbitrary PHP code into eval() statements. Versions 1.3.3 and below are affected.

tags | advisory, arbitrary, php
advisories | CVE-2005-2498
SHA-256 | 69e67d5d0d2809ee1dd8aab9cb442c8038040d14db81b9435a92088852571ec9
Page 1 of 3
Back123Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close