exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 1999-11-15

suse.nfs.txt
Posted Nov 15, 1999

The rpc.nfsd which is part of the nfs-server package was found to have two remote vulnerabilities. Patches available here.

tags | remote, vulnerability
systems | linux, suse
SHA-256 | 29d784915088dec312cde6439f632f6fc7c438e0c1e9e3c966d72df9b8cf1a42
sslcrack.zip
Posted Nov 15, 1999
Authored by Efrain Torres, lownoise

sslcrack is a basic VB5 win9x brute force PIN SSL cracker. Zip includes HomeBanking.txt, which explains a common weakness in Home Banking systems that allows brute forcing the PIN.

systems | windows
SHA-256 | 11b9ec1913a404f6702c653d2d48e9dafae7c4ae3d992e80bf89f454dba7654d
nemesis-v0.666a.tar.gz
Posted Nov 15, 1999
Authored by Obecian | Site celerity.bartoli.org

The Nemesis Project is designed to be a commandline-based, portable human IP stack for UNIX/Linux. The suite is broken down by protocol, and should allow for useful scripting of injected packet streams from simple shell scripts.

tags | tool, shell, protocol
systems | linux, unix
SHA-256 | e8bb31124354adc0124386bb24748c6f2267f8d8bbd9ab549cce53f5f453a8e1
dna-1999-001.htm
Posted Nov 15, 1999
Authored by Erik Iverson

Dragonmount Networks Advisory 1999-001 [DNA-1999-001] Intersoft's NetFTP daemon (included with NetTerm) has many insecure options enabled by default, including allowing access to the entire hard drive to everybody. There are also numerous buffer overflow problems, resulting in remote Denial of Service and possible remote execution of code.

tags | remote, denial of service, overflow
SHA-256 | 21e973724a97cfd33d343c72679ad892148ca46d585d7f456c876ae569d173c8
ss351exp.tgz
Posted Nov 15, 1999
Authored by Underground Security Systems Research

NetCPlus SmartServer3 POP 3.51.1 Exploit. Windows binary and source code included. Spawns a command prompt on port 666.

tags | exploit
systems | windows
SHA-256 | 3238b2a6cb153549cf675abd04b8822306e36d2bba966fb91a9d003d385162db
ssh-1.2.27.txt
Posted Nov 15, 1999

A remotely exploitable buffer overflow has been found in ssh-1.2.27. The problem is the length of the session key is not checked. Multiple platforms are vulnerable.

tags | exploit, overflow
SHA-256 | 0a85e8ff5334fd6c730fcbee204b3fcbd601aa00b5176eb6e14ee47c1a17e5db
EasyTcpIp-lib-0.4.tar.gz
Posted Nov 15, 1999
Authored by Marcelo Gornstein | Site members.xoom.com

Easy TcpIp Library adds basic TCP/UDP/ICMP/IP support to your applications by simply linking it in. You can write servers, clients, send/receive data and send/receive/dump/analyze packets.

Changes: Support for packet-forging, and a major code rewrite.
tags | paper, udp, tcp
SHA-256 | a429380d33f5e21aebe644edcccbe0c6b1660254f495910297cd42668be11ee6
bind-822p5.tgz
Posted Nov 15, 1999
Site isc.org

The Berkeley Internet Name Domain (BIND) implements an Internet name server for Unix operating systems. The BIND consists of a server (or 'daemon') called 'named' and a resolver library. A name server is a network service that enables clients to name resources or objects and share this information with other objects in the network.

Changes: Bugfix in named-xfer (from patchlevel 4), portability to IPv6 versions of FreeBSD and OpenBSD, improved portability to A/UX, AIX, IRIX, NetBSD, SCO, MPE/IX, and NT, IXFR improvements (though client-side is still disabled), an upgrade of contributed software (including TIS's "dns_signer"), fixes for several latent denial-of-service bugs, and a new "make noesw" top-level target for removing encumbered components.
systems | unix
SHA-256 | 13fdbd1378db0f6329d0a63091fff58dc8d2f597c8ebd836c272ebd400147b10
nbchk.pl
Posted Nov 15, 1999
Authored by h1kari

NBChk is a multi-threaded Perl banner-checking utility that is fully configurable and can scan a full/partial class-C network, hosts from a file, or a single host for configured vulnerabilities.

tags | tool, scanner, perl, vulnerability
systems | unix
SHA-256 | 7924abe99de504fc31ded5adae2e83612c2eb33100cf0380f7432211b6f5e2cd
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close