WIDZ version 1 is a proof of concept IDS system for 802.11 that guards an AP(s) and Monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus/Rogue AP's. It can easily be integrated with SNORT or RealSecure.
8f8488eea9838a824c0a830e09fb3cac0fd6fbd51a0708fb1eaebae8e6f21294
The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440.
7095ed29a6c8a81a3fca314c6b294d6ebb1c02d908420a63418cb5720eac98be
Cups v1.1.17 and below remote exploit which spawns a shell as lp. Tested against Gentoo Linux with cups-1.1.17_pre20021025 installed.
fd6664e13f9fdddcf6bf6c5f5bab39ed00c719fa6c0d965f76c0958998152656
Packet Storm exploits added in the year 2002.
0617e2f7ff24aef4e0c4e755eeb45ef4355b511518c82177d4b919df913c02b4
Packet Storm new exploits for December, 2002.
1555cfd70d17661ea949de42f155f2a9ca2fa215c4751d4829806a8dbb83647d
Mysqlsuite includes three tools which take advantage of the vulnerability in check_scramble() function of mysql described in mysql.4.0.5a.txt. Mysqlhack allows remote command execution with a valid mysql user and pass. Mysqlgetusers allows you do a dictionary login-only attack to find other users. Mysqlexploit spawns a shell on port 10000 on vulnerable linux mysql servers with a valid mysql login and pass and writable database. Fixed in Mysql v3.23.54.
5c2113bbb28fb3db28e5790a86c03b3c83871154d3a6e756b9d3bbcc18b27f48
This perl script recovers passwords out of unix swap files. UID or GID 0 required to read swap files. May be useful for finding passwords that were entered into the wrong machine. Tested on Red Hat 6.2 - 8.0.
315c8a7d3c4ad00dd5237ad5680f7641193fef637e8a4c7cae7904511b9cc7f9
Mdaemon v6.0.7 and below remote denial of service exploit in perl. Exploits the bug described in mdaemon-dos.txt.
d722a6f6a11389b08c0202d154193b25214a7fbaa77ae7cb01d58958651165b3
IBM Websphere 4.0.3 for Windows 2000 Server remote denial of service exploit in perl. Exploits the bug described in websphere.crash.txt.
bf898618c3bd0a71812b1c20d114644090c17ebea06aeb8f02933b56c120c1cf
Smart Search CGI remote exploit in perl which attempts to spawn netcat listening with a shell.
041548a5386dcb8a831010770b868c0816b690100bcfde2bdb33e64959bd23d6
/usr/sbin/rpc.mountd Local Exploit tested on Slackware 8.1. Test only - not setuid.
35bdc9b60002a0fd0830a0017a3e2e788a9a39daacef3f7529779e71f7589149
Linksys BEFSR41 EtherFast Cable/DSL Router remote denial of service exploit in perl.
5e8f1bd72dc612280a567fcb9e559a448281a2f3f131c700d421541ee404ca46
IBM Web Traffic Express Caching Proxy Server v3.6 and 4.x (bundled with IBM WebSphere Edge Server v2.0) remote denial of service exploit in perl. Exploits the bug described in R7-0007.txt.
0145ba05224abe8cd39e2bbb4563f50912ca30a674d9149f9da950d0e59bd439
Crashms exploits the microsoft-ds bug and crashes windows machines via tcp port 445. Sends many 10k blocks of NULLs, causing blue screens on unpatched Windows 2000 boxes with microsoft-ds running on port 445.
76d264a71d11fe7e7cc4f6e42545ed890402ae980da59da4b8a1a8cce3ad3211