exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2000-09-27

tcpip_lib2.zip
Posted Sep 27, 2000
Authored by Barak Weichselbaum | Site komodia.com

Tcpip_lib V2 is a library for Windows 2000 which allows arbitrary packet creation. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.

Changes: now works also with NT (regular async sockets), supports regular sockets (async and blocked) and added ICMP. (samples like traceroute, ping, TCP server, simple attacker).
tags | arbitrary, spoof, protocol
systems | windows
SHA-256 | 50cb614842e4fcbd9f5a423290c0e712b640e2ac42a72ba7595215b13f28c4ed
Internet Security Systems Security Alert September 27th, 2000
Posted Sep 27, 2000
Site xforce.iss.net

On July 26th, Thomas Lopatic, John McDonald, and Dug Song released vulnerability information at the Black Hat 2000 briefings that exposed the following security holes in Check Point FireWall-1:

tags | vulnerability
SHA-256 | eeedaa029a78ab96887ffba13275188e14b08454b5f8db03caf6f28381fdf2b1
ENG-IISfilter.zip
Posted Sep 27, 2000
Authored by Dimitri

Batchfile for Windows NT with Internet Information Server. This script automates jobs. If there is an attack on your server, starting this script manually enables you to see if something has happened.

systems | windows
SHA-256 | f4e162bc9abb6263212ba4527e010ded527477b033e511a6fd7cd498ee5064cf
Sqlpoke.zip
Posted Sep 27, 2000
Authored by Xaphan

Sqlpoke is a NT based tool that locates MSSQL servers and tries to connect with the default sa account. A list of SQL commands is executed if the connection is successful. Win32 source included.

systems | windows
SHA-256 | 0e32d5348e71edf6b856f7663bf1789acfc15a29486062760aba27989754798c
labs53.txt
Posted Sep 27, 2000
Site ussrback.com

USSR Advisory #53 - Malformed Embedded Windows Media Player 7 "OCX Attachment" Vulnerability. The USSR Team has found a problem in the Windows Media Player 7 ActiveX control, which could be used in a denial of service attack against RTF-enabled e-mail clients such as Outlook 2000 and Outlook Express.

tags | denial of service, activex
systems | windows
SHA-256 | 6887a0efab15dca3948af2af037e0e47e29102b12b701b773f27ea873ae55235
ms00-068
Posted Sep 27, 2000
Site microsoft.com

Microsoft Security Bulletin (MS00-068) - Patch Available for "OCX Attachment" Vulnerability. Microsoft has released a patch for a security vulnerability in Microsoft Windows Media Player (WMP) 7 but primarily affects e-mail applications. This vulnerability would enable a malicious user to create an e-mail that, when closed after being read, would cause the e-mail application to fail. A FAQ regarding this vulnerability is available here.

systems | windows
SHA-256 | 2267d9828b2c026ecdf9f241a379d1a2a8f799b2fd1043179eb35d86fbac4d1d
brwgate-dos.c
Posted Sep 27, 2000
Authored by Incubus | Site securax.org

Denial of service for NetcPlus BrowseGate 2.80 for Windows NT and 2000 when you sned more than 8000 characters in a GET / http-request, causing the system to crash.

tags | exploit, web, denial of service
systems | windows
SHA-256 | d3ef954f1000d0d320d818df9bf2c1cb98834ce4871086275220da6bfdf2fb14
pine421.txt
Posted Sep 27, 2000
Authored by Arkane

Proof of Concept. There exists a vulnerability in Pine 4.21 involving the portion of code in charge of peroidically checking email when a pine client is open.

tags | exploit, proof of concept
SHA-256 | 4c381d3dd367cf74ed25122f66d5999b745e2e0d8ac761b2a7d1dd33c1d5f17c
alabanza.txt
Posted Sep 27, 2000
Authored by Weihan Leow

This hole is for the control panel of all Alabanza based resellers/hosts. There could be more bugs. This is serious enough since you can delete all resold domains for a particulr webhosting company. You can also change the default MX and CNAME records of all associated domains.

tags | exploit
SHA-256 | 53801f2b11521cbfb88f3a244efe6da453e8cf7c77bc1c4480c79b3231bb1fc6
PSBUX0009-121.txt
Posted Sep 27, 2000

A problem lies in that there is a Java SNMP MIB Browser Object ID parsing problem which can cause a Denial of Service. Platforms affected are: HP9000 Series 700/800 running HP-UX releases 10.XX and 11.XX, Sun Microsystems SOLARIS releases 2.X, plus under Microsoft Windows NT4.X/ Windows 2000 running NNM 6.1, NNM 5.01, and NNM 4.11.

tags | java, denial of service
systems | windows, solaris, hpux
SHA-256 | f03861bd000202508283bfa2dda6e995d3c9b8dc31e44a7a007686ff9f282852
klogd.exploit.txt
Posted Sep 27, 2000
Authored by Esa Etelavuori | Site iki.fi

Klogd Local Exploit. Envcheck is a Linux/x86 kernel module which strips dangerous environment variables before executing a new program, and which can be used to log these probably threatening events. However, a recent format string handling bug in klogd allows an attacker to overflow its buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary, x86, kernel, local
systems | linux
SHA-256 | 00657f3b775f48ad572550dfdff266b0e9640533df27a3bbd59dfc91f83192eb
CSSA-2000-033.0.txt
Posted Sep 27, 2000

Caldera Advisory - There is a format bug in the LPRng printer daemon that could possibly be exploited to obtain root privilege. This problem is particulary severe because it can be exercised remotely.

tags | root
SHA-256 | ce5a6fb6fa064fe5353a6cbce23cc3f20fc3c1a670d00d8478d93f4ce3f4b9ec
snorticus-1.0.tar.gz
Posted Sep 27, 2000
Authored by Paul Ritchey | Site snorticus.baysoft.net

Snorticus is a collection of shell scripts designed to allow easy managment of Snort sensors. It allows you to routinely collect Snort sensor data, analyze the data via SnortSnarf, and easily maintain rule files.

tags | tool, shell, sniffer
SHA-256 | f8d621dd59448d2e46229ef059992ce0cfe7c5db402e9a1ab1da4508c3cef260
smurftools.tar.gz
Posted Sep 27, 2000
Authored by satya

A simple ICMP Source Address spoofing utility. A smurfing utility that also comes with log parsers, etc.

tags | denial of service, spoof
SHA-256 | b4cd3707d8384f81947841c466f336ddc9c621a62110e789eee6623266d1b408
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close