what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2001-12-26

nb-isakmp.pl
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.pl is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. Perl version.

tags | exploit, remote, denial of service, perl, proof of concept
systems | windows
SHA-256 | 6ef25b8d1ba114841a8d4ccc55e140f50dd17a4700763333202bc66f1293b338
nb-isakmp.c
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.c is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. C version.

tags | exploit, remote, denial of service, proof of concept
systems | windows
SHA-256 | f5486daacf1b331ad898ccb4e9629d84abc8a606c7e8d3b2b80234edda1df027
adstreamer.txt
Posted Dec 26, 2001
Authored by Gobbles Security | Site bugtraq.org

AdStreamer is a cgi package with several remote vulnerabilities, one of which allows remote command execution. Buggy open calls were found in addbanner.cgi, banner.cgi, bannereditor.cgi, and report2.cgi.

tags | exploit, remote, cgi, vulnerability
SHA-256 | b45aa093198822646a56eced2418259c61c1cd33a6793264a56045e50d87c79a
aesop-0.3.tar.gz
Posted Dec 26, 2001
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

Changes: Added IPV6 support, more portable, fixed makefiles, added debugging, and fixed bugs.
tags | tcp
systems | unix
SHA-256 | d5ad647ce2d30f7b5f15fb6162d4d7bb8a79761c151ac939a4267d4d7952d017
ethereal-0.9.0.tar.gz
Posted Dec 26, 2001
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: New dissectors include EAPOL, M2TP, MS RPC, MTP2, PCNFSD, PPP/EAPOL, QLLC, SMPP, and SUA. Support for DBS Etherwatch, Visual Networks Visual UpTime, and VMS TCPIPtrace capture files was added. Ascend/Lucent debug Etherpeek, iptrace and MS Netmon capture file support was enhanced.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 25fa62a5d1ba6dce074e67e25601464c57e75a1ecb506bdcfac4d533d9dc70c5
ie.cert.attack.txt
Posted Dec 26, 2001
Authored by Stefan Esser | Site e-matters.de

A flaw in Microsoft Internet Explorer allows an attacker to perform a SSL Man-In-The-Middle attack without the majority of users recognizing it. In fact the only way to detect the attack is to manually compare the server name with the name stored in the certificate due to a flaw in the way IE checks HTTPS objects that are embedded into normal HTTP pages.

tags | exploit, web
SHA-256 | be656d7d8e024e7317da02518924572f3527b139ee72d711816b35515804709c
twlc-adv-plesk211201.txt
Posted Dec 26, 2001
Authored by twlc, Supergate | Site twlc.net

Plesk, a popular server administration tool used by many web hosting companies, has a bug which allows remote users to view the source of .php hosted files. All versions prior to v2.0 are affected.

tags | exploit, remote, web, php
SHA-256 | 086915112cab9f9dc4dd1793e8217e3b54220f795ea7084a433c309e15fa6430
Bastille-1.2.0.tar.bz2
Posted Dec 26, 2001
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here.. RPM's available.

systems | linux, redhat, unix, suse, debian, hpux, mandrake
SHA-256 | c68b2bc856ef76b4934210205be2188b0e1e4ecb37ebf40e5fa829daa0f2f3f2
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close