exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 39 of 39 RSS Feed

Files Date: 2005-11-09 to 2005-11-10

phzine01.zip
Posted Nov 9, 2005
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #01 - In this issue: The Art of Sniffing, The Art of Footprinting, SQL Injection Techniques, Wireless - Under the hood, Cross Site Scripting with examples, VX Coding - New ideas, Win Hack and Tweak, Samba Lin and Win Dance, Exploiting ShopAdmin, CGI Exploiting, and Mirc Scripting Basics. Note: All articles are in Serbian/Croatian.

tags | cgi, xss, sql injection
SHA-256 | 667c8c8ad2e789a3b6b7c451991dfb87400bbd7db568da9276d836ec71ab233e
ph.jpg
Posted Nov 9, 2005
Authored by phearless

Phearless Group Logo

SHA-256 | 687e4d09dcf869779d098b6768593aa39fa80f365840e6d1a92c87f8709c29d2
Scapy Packet Manipulation Tool 1.0.2
Posted Nov 9, 2005
Authored by Philippe Biondi | Site secdev.org

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

Changes: See changelog.
tags | tool, scanner, python
systems | unix
SHA-256 | e71c6917f00ed0269144680029ea3270650ee1a6200f32e1ffe1c8b958da0293
Linux IPTables Firewall
Posted Nov 9, 2005
Site iptables.org

iptables is the new packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.

Changes: See the changelog.
tags | tool, firewall
systems | linux
SHA-256 | 2067ed2134adde5f50716dd1d3752dfb023a634ff274af88eb635e5a1bba1bda
Technical Cyber Security Alert 2005-312A
Posted Nov 9, 2005
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA05-312A - Microsoft has released updates that address critical vulnerabilities in Windows graphics rendering services. A remote, unauthenticated attacker exploiting these vulnerabilities could execute arbitrary code or cause a denial of service on an affected system.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | windows
advisories | CVE-2005-2123, CVE-2005-2124, CVE-2005-0803
SHA-256 | e7447a542eaf53d621a44d2a16c5be621d1fde25bf9e9ac9ca0b932d7548fd5a
EEYEB-20050329.txt
Posted Nov 9, 2005
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a heap overflow vulnerability in the way the Windows Graphical Device Interface (GDI) processes Windows enhanced metafile images (file extensions EMF and WMF). An attacker could send a malicious metafile to a victim of his choice over any of a variety of media -- such as HTML e-mail, a link to a web page, a metafile-bearing Microsoft Office document, or a chat message -- in order to execute code on that user's system at the user's privilege level.

tags | advisory, web, overflow
systems | windows
advisories | CVE-2005-2124
SHA-256 | fbe0e7b4b08c26cdcbea6f41f6a2f4a4b4680d5b2050eb53b95436d4a2a12232
EEYEB-20050901.txt
Posted Nov 9, 2005
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in the way the Windows Graphical Device Interface (GDI) processes Windows Metafile (WMF) format image files that would allow arbitrary code execution as a user who attempts to view a malicious image. An attacker could send such a metafile to a victim of his choice over any of a variety of attack vectors, including an HTML e-mail, a link to a web page, a metafile-bearing Microsoft Office document, or a chat message.

tags | advisory, web, arbitrary, code execution
systems | windows
advisories | CVE-2005-2123
SHA-256 | fb070c689f7c1eb6298f3b908b6d3263adc6334948806fad6400732d941dbe93
SCOSA-2005.47.txt
Posted Nov 9, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - Ulf Harnhammar has reported a vulnerability in Lynx, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the HTrjis() function in the handling of article headers sent from NNTP (Network News Transfer Protocol) servers. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into visiting a malicious web site which redirects to a malicious NNTP server via the nntp: URI handler. Successful exploitation allows execution of arbitrary code.

tags | advisory, web, overflow, arbitrary, protocol
advisories | CVE-2005-3120
SHA-256 | 3a4f408a9e7a6a4943c8178a7eda2a2ee13c50995972d5fa0fc6e533172fbd78
NGS-oracle2.txt
Posted Nov 9, 2005
Site ngssoftware.com

Examining the Oracle October 2005 Critical Patch Update in depth, NGSResearchers discovered a number of problems which have all since been reported to Oracle. As well as new vulnerabilities and problems with the patches for old vulnerabilities, the October 2005 CPU fails to install the patched Oracle Text (CTXSYS) components on Oracle 8.1.7.4 on all operating systems.

tags | advisory, vulnerability
SHA-256 | dcb5911d8865a35e374c4408fe8e0d9825eb68d9a0f3aad29905098199a62c7c
FIRSTCFP.txt
Posted Nov 9, 2005
Site first.org

18th Annual FIRST Conference - Call For Papers - The Forum of Incident Response and Security Teams (FIRST) is a global organization dedicated to bringing together computer security incident response teams (CSIRTs). The annual FIRST conference not only provides a setting for participants to attend tutorials and hear presentations by leading experts in the CSIRT community, it also creates opportunities for networking, collaboration, and sharing of technical information. Equally important, this conference enables the attendees to meet with their peers and build trusted relationships.

tags | paper, conference
SHA-256 | 3af538673af42b25c9ec43c7b3d208c2167c4b2a88ec2bb36eeaa45cdecbe8d1
Hardened-PHP Project Security Advisory 2005-21.80
Posted Nov 9, 2005
Authored by Christopher Kunz, Hardened-PHP Project | Site hardened-php.net

PHPKIT versions 1.6.1 R2 and below suffer from cross site scripting, SQL injection, information disclosure, password hash disclosure, local file disclosure, and arbitrary code execution flaws. Various sample exploitation details provided.

tags | exploit, arbitrary, local, code execution, xss, sql injection, info disclosure
SHA-256 | a91e4d42b773ee597b5ea0162d7a64232a6a053f5d7b8e1af72709197633e2f8
Debian Linux Security Advisory 889-1
Posted Nov 9, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 889-1 - A bug has been discovered in enigmail, GPG support for Mozilla MailNews and Mozilla Thunderbird, that can lead to the encryption of mail with the wrong public key, hence, potential disclosure of confidential data to others.

tags | advisory
systems | linux, debian
advisories | CVE-2005-3256
SHA-256 | 4be675ece4a4d67f879b5d40f664546958c95aef39d098d00d59abee0a458ae7
Secunia Security Advisory 17498
Posted Nov 9, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | windows
SHA-256 | cf26ef2d1adb33dda06e1c49fa3c03feabdbc78f0182b78e588cf09286a66e7b
LayerOneCFP.txt
Posted Nov 9, 2005
Authored by LayerOne | Site layerone.info

LayerOne 2006 - Call for Papers - LayerOne is now officially accepting papers and presentations for consideration at our 2006 show. We are looking for people to speak on a broad range of topics, so all submissions will be considered. At the moment we're interested in hearing from potential speakers with the following interests: Data Forensics, Reverse Engineering, VoIP (security and development), Emerging Security Trends, Regulatory Issues (SOX, PCI, ISO 17799, etc), Firmware/Embedded Systems Hacking.

tags | paper, conference
SHA-256 | 38046b10e761b0737f9adaecc125068acd262730c34c2288dde55dce30615e6b
Page 2 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close