exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 30 RSS Feed

Files Date: 1999-09-28

default1.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #1: Last weeks news on Help Net Security, Y2K: As the millenium approaches, A look into basic cryptography, The history of Zero Knowledge Systems, Telecommunications 101, Macintosh security: How to make your mac a babel tower!, Computing: A closer look at hard- and software, An approach to Linux System Security, Infection & Vacination, Spam: The problems with junk e-mail, Freedom of speech - related incidents, Meet the underground.

tags | magazine
systems | linux
SHA-256 | bba707d22f2ebf95680af99290e2f4fd516ba71b51f813951b3a22eeb268356f
default2.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #2: Y2K: As the millenium approaches, A look into basic cryptography, Internet privacy: What are the issues?, Telecommunications 101, Macintosh Security: How to set up a gateway and firewall, Computing: A closer look at hard- and software, Linux Firewalls, Infection and vaccination, More from the ACPO front, Freedom of speech - related incidents, Intrusion and detection.

tags | magazine
systems | linux
SHA-256 | f36b07ac2c4039e4a15ddc5e069c16261545cf3364fa4b563c5cabe3178c3184
default3.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #3: Y2K: As the millennium approaches, A look into basic cryptography, Internet privacy: Freedom Network, Macintosh Security: F33r my hybride M4c, I'm coding!, Computing: A closer look at hard- and software, Linux: IP Masquerading, Infection and vaccination, Freedom of speech - related incidents, Scams - Getting something by all means, Intrusion and detection part two.

tags | magazine
systems | linux
SHA-256 | a56b7023af5b02dad19a56f846a65e927683fa27d5239a1bbe46847ca442c147
default4.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #4: Description of the Millenium problem, A look into basic cryptography, Telecom 101: Receiving through the serial port, Macintosh security: Security audit with our Mac, Computing: Matrox G400 MAX Review, Understanding basic crypto techniques, Infection & Vaccination, New programs on Net-Security (NS Watch!), More news from the ACPO front, The Hotmail security hole, Meet the underground, Freedom of speech - related incidents, Microsoft Installs US Spy Agency with Windows.

tags | cryptography, magazine
systems | windows
SHA-256 | 135c1a3d2ad99b4219bb1b0c1cd135db1e677acc96aa882c3c5f5bc6c7612a10
default5.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #5: Defaced pages, Hit2000 report, Interview with v00d00, Want secure and encrypted e-mails? , Security audit with our Mac Part-2/2, More from the ACPO front, Infection and vaccination, Watch out for documents you publish on The Internet, Freedom of speech - related incidents, Y2K survey for 72 countries, Journalism.

tags | magazine
SHA-256 | 2b9073119a8837c4048e7e69b7d34298d9573c23892ddc3c08c6ed1784621d41
default6.txt
Posted Sep 28, 1999
Authored by default

Default Newsletter Issue #6: Defaced pages, Ech0 Security Scanner - What's that again ?, Y2K: hoaxes and scams, Infection & Vactination, Hi, my name is..., Virology 101: A primer to computer viruses, More from the ACPO front, Network Solutions Stumbles on WebMail Offering, Securing your Mac, Why NT isn't what it is claimed to be, Freedom of the speech related incidents, Meet the underground.

tags | magazine
SHA-256 | a8c7df1a687f8285f90ff9500c5fca7ae6f11b3b597aff3c294b82633707d43e
leapfrog_1_0a.tar.gz
Posted Sep 28, 1999

Leapfrog 1.0. Leapfrog will anonymize and redirect any port. It can be used to work around firewall configuration and other issues requiring a port redirect. For example, you have a firewall that does not allow telnet (23), but it does allow http (80). Set leapfrog up on the other side of the firewall to listen on port 80 and send to 23, then telnet to port 80 of the leapfrog machine and you will ricochet to the machine you wish to connect. You will have the Leapfrog machines' IP and MAC addresses. It supports unlimited users (well, limited by memory). Leapfrog can be chained, reconfigured on the fly, and customized to change ports/machine redirects without the need to log into the box. It can be configured (with little work) to remove all traces of itself from disk after being loaded, or it can be configured to log everything (default). It supports colors and some basic admin tools. It is very fast. Leapfrog compiles on Solaris 2.6, 2.7, x86 (2.6, 2.7), Linux with pthread libs, BSD with pthread libs. Possibly others, but it wasn't tested on others. (Official Site).

tags | tool, web, x86
systems | linux, unix, solaris, bsd
SHA-256 | bf04847a1339af71fba9081ff56a10ae386aa7898991dc6d61ec08ad310c9f2d
patch-netfilter-0.1.8-0.1.9.bz2
Posted Sep 28, 1999

Patch to upgrade from Netfilter 0.1.8.

tags | tool, firewall
systems | linux
SHA-256 | 6b9ffe80db6fc4b7f4bf6a9f9307fefd002e63f60fa89356be6cf2ee65992b70
netfilter-0.1.9.tar.bz2
Posted Sep 28, 1999

Netfilter 0.1.9 for Linux 2.3.18: Packet Mangling for Linux 2.3. New features: Should work with gcc 2.7.x (no more 'memset undefined'), local NFS and conntrack should work fine, speed should be fine for modems, 'Call rusty: need skb_realloc_tailroom!' for ftp cured, tcp and udp ports printed correctly in iptables, should compile on libc5 for SURE this time. (Official Site).

tags | tool, local, udp, tcp, firewall
systems | linux
SHA-256 | eadf483fa8256d69fa34e56f42ecd01ee2329ba9eaf195e4593bbadc58892088
udp-backdoor-v2.0.tgz
Posted Sep 28, 1999

UDP backdoor v2.0 for UNIX by {MANIAC}. Archive password is set to p4ssw0rd. Use at your own risk.

tags | udp, trojan
systems | unix
SHA-256 | 11892b19990bc077400e60528a6a411a
unsetenv.txt
Posted Sep 28, 1999

The unsetenv function in glibc 2.1.1 suffers from a problem whereby when running through the environment variables, if the name of the variable being unset is present twice consecutively, the second is not destroyed.

tags | exploit
SHA-256 | e95f036725c67eeb8bbbae8a91e4c1024e21dd154ce64c42d89d5f8972a412d8
suse6.2pbpg.txt
Posted Sep 28, 1999

On SuSE 6.2, /usr/bin/pb and /usr/bin/pg, suid root by default allow any user to read any file on the system.

tags | exploit, root
systems | linux, suse
SHA-256 | bee33e1b284d9c26735967f8e5656a85d2c39e8e862ab38ebecde0fa73eb1db0
unix_virus.c
Posted Sep 28, 1999

A fully functional unix virus that will infect your manpages when started

tags | exploit, virus
systems | unix
SHA-256 | 7a21d58433fa270c7e2dad8c566f8df79a0b4d09c4e1d0864c08a4f8b8dd1733
SuSE_overflow_exploit.txt
Posted Sep 28, 1999

/usr/bin/sccw contains a bug allowing a local root compromise through an overflow in handling $HOME. For Linux x86 tested on SuSE 6.2.

tags | exploit, overflow, x86, local, root
systems | linux, suse
SHA-256 | 1a4ba5966711dd2350d5c844fc2fd33fd80a54d53e53c1833f89d49d306a2a05
SuSE_root_exploit.txt
Posted Sep 28, 1999

nlservd/rnavc local root exploit for Linux x86 tested on SuSE 6.2. Exploits Arkiea's Knox backup package.

tags | exploit, x86, local, root
systems | linux, suse
SHA-256 | 20ae153167802687c55fbf998a0f2a1a04c7f30f5207c19ae0ed3a19f237ebeb
ssh_exploit.txt
Posted Sep 28, 1999

SSH 1.2.27 vulnerable to a denial of service attack

tags | exploit, denial of service
SHA-256 | 52db1d05b27b6f7d8b74feae305f307c509b18a2db01b105867f9738c709aa92
SSH.1.2.27.DOS.txt
Posted Sep 28, 1999

SSH has the option of setting up "authentication sockets", used to pass authentication keys securely. When this is used, a socket is created on both client and server machines; the socket created on the server uses an often easy to guess filename (based on the PID)...

tags | exploit
SHA-256 | 75491b9d176b71151fc9e9366f1486cb0fe9a8525c93ee0c5a2c52acb43f9ff4
solaris_root_exploit.txt
Posted Sep 28, 1999

Local root exploit for Solaris 2.6 through ps and way it handles $LD_PROFILE.

tags | exploit, local, root
systems | solaris
SHA-256 | f506a2474914c827ec7a0c0bf71a2c49ecf7efebc987a21b65784bbd6935e068
sco_local_exploit.txt
Posted Sep 28, 1999

SCO 5.0.x exploits for scosession and scoterm allowing bin/root respectively.

tags | exploit, root
SHA-256 | a61174f64ded7a55fac1aadd1f8c4b9fbd79b7bfc3f5f36cdf34cca15ae44bb3
SDI.exploit4.proftpd.txt
Posted Sep 28, 1999

root exploit for the ProFTPD log_xfer() buffer overflow.

tags | exploit, overflow, root
SHA-256 | db92d949feac85635925af2c68c4a2d9061dce0a00179e24c9161365329e6f94
lynx.2.8.2.extern.txt
Posted Sep 28, 1999

When lynx calls external programs for protocols (e.g. telnet), the location is passed unchecked. This can be used to activate commandline parameters.

tags | exploit, protocol
SHA-256 | 2efb9a7b590a7fdfbaaf65d327cae8fdd80728736bce172044d775dd8f2118a4
proftpd.1.2.0pre6.txt
Posted Sep 28, 1999

proftpd 1.2.0pre6 patch

tags | exploit
SHA-256 | 5bdc9aa9e1d57b44dbf88aab490454e6434e8ff5c0144e794f2d95918ae4b618
linux_GNOME_exploit.txt
Posted Sep 28, 1999

Virtually any program using the GNOME libraries is vulnerable to a buffer overflow attack!

tags | exploit, overflow
SHA-256 | 27f7d493a0ad77755b1b1284a650c04745451802d22a2093bee4bdecf5682a29
FreeBSD_DoS.txt
Posted Sep 28, 1999

FreeBSD vfs_cache.c in version 3.0 and later is vulnerable to a denial of service attack as there is no way to purge entries from the cache.

tags | exploit, denial of service
systems | freebsd
SHA-256 | bd076457f63ba433e668902ae2abeed4b04f14b8d13e7b4cff6f2455d620f582
FreeBSD-SA-99.05.fts.txt
Posted Sep 28, 1999

fts library routine vulnerability. Local users could gain root access.

tags | exploit, local, root
SHA-256 | ce67cec1e5bb2748fc8ef9819ef8460f79229b6f4d78e7caeef04af037340737
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close