what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2003-01-04

widzv1-0.zip
Posted Jan 4, 2003
Authored by Mark Osborne

WIDZ version 1 is a proof of concept IDS system for 802.11 that guards an AP(s) and Monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus/Rogue AP's. It can easily be integrated with SNORT or RealSecure.

tags | tool, local, proof of concept, wireless
SHA-256 | 8f8488eea9838a824c0a830e09fb3cac0fd6fbd51a0708fb1eaebae8e6f21294
GNU Privacy Guard
Posted Jan 4, 2003
Site gnupg.org

The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440.

Changes: New stable release - Compile fixed for OpenLDAP, minor changes, and bug fixes.
tags | encryption
SHA-256 | 7095ed29a6c8a81a3fca314c6b294d6ebb1c02d908420a63418cb5720eac98be
sigcups.c
Posted Jan 4, 2003
Authored by Sigdom

Cups v1.1.17 and below remote exploit which spawns a shell as lp. Tested against Gentoo Linux with cups-1.1.17_pre20021025 installed.

tags | exploit, remote, shell
systems | linux, gentoo
SHA-256 | fd6664e13f9fdddcf6bf6c5f5bab39ed00c719fa6c0d965f76c0958998152656
2002-exploits.tgz
Posted Jan 4, 2003
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm exploits added in the year 2002.

tags | exploit
SHA-256 | 0617e2f7ff24aef4e0c4e755eeb45ef4355b511518c82177d4b919df913c02b4
0212-exploits.tgz
Posted Jan 4, 2003
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for December, 2002.

tags | exploit
SHA-256 | 1555cfd70d17661ea949de42f155f2a9ca2fa215c4751d4829806a8dbb83647d
mysqlsuite.tgz
Posted Jan 4, 2003
Authored by dreyer

Mysqlsuite includes three tools which take advantage of the vulnerability in check_scramble() function of mysql described in mysql.4.0.5a.txt. Mysqlhack allows remote command execution with a valid mysql user and pass. Mysqlgetusers allows you do a dictionary login-only attack to find other users. Mysqlexploit spawns a shell on port 10000 on vulnerable linux mysql servers with a valid mysql login and pass and writable database. Fixed in Mysql v3.23.54.

tags | exploit, remote, shell
systems | linux
SHA-256 | 5c2113bbb28fb3db28e5790a86c03b3c83871154d3a6e756b9d3bbcc18b27f48
swap.pw.pl
Posted Jan 4, 2003
Authored by Spai

This perl script recovers passwords out of unix swap files. UID or GID 0 required to read swap files. May be useful for finding passwords that were entered into the wrong machine. Tested on Red Hat 6.2 - 8.0.

tags | tool, perl, rootkit
systems | linux, redhat, unix
SHA-256 | 315c8a7d3c4ad00dd5237ad5680f7641193fef637e8a4c7cae7904511b9cc7f9
mdexp.pl
Posted Jan 4, 2003
Authored by Knight420

Mdaemon v6.0.7 and below remote denial of service exploit in perl. Exploits the bug described in mdaemon-dos.txt.

tags | exploit, remote, denial of service, perl
SHA-256 | d722a6f6a11389b08c0202d154193b25214a7fbaa77ae7cb01d58958651165b3
sphere.pl
Posted Jan 4, 2003
Authored by Knight420

IBM Websphere 4.0.3 for Windows 2000 Server remote denial of service exploit in perl. Exploits the bug described in websphere.crash.txt.

tags | exploit, remote, denial of service, perl
systems | windows
SHA-256 | bf898618c3bd0a71812b1c20d114644090c17ebea06aeb8f02933b56c120c1cf
smartass.pl
Posted Jan 4, 2003
Authored by Knight420

Smart Search CGI remote exploit in perl which attempts to spawn netcat listening with a shell.

tags | exploit, remote, shell, cgi, perl
SHA-256 | 041548a5386dcb8a831010770b868c0816b690100bcfde2bdb33e64959bd23d6
mount.c
Posted Jan 4, 2003
Authored by Knight420

/usr/sbin/rpc.mountd Local Exploit tested on Slackware 8.1. Test only - not setuid.

tags | exploit, local
systems | linux, slackware
SHA-256 | 35bdc9b60002a0fd0830a0017a3e2e788a9a39daacef3f7529779e71f7589149
lostlink.pl
Posted Jan 4, 2003
Authored by Knight420

Linksys BEFSR41 EtherFast Cable/DSL Router remote denial of service exploit in perl.

tags | exploit, remote, denial of service, perl
SHA-256 | 5e8f1bd72dc612280a567fcb9e559a448281a2f3f131c700d421541ee404ca46
emptypockets.pl
Posted Jan 4, 2003
Authored by Knight420

IBM Web Traffic Express Caching Proxy Server v3.6 and 4.x (bundled with IBM WebSphere Edge Server v2.0) remote denial of service exploit in perl. Exploits the bug described in R7-0007.txt.

tags | exploit, remote, web, denial of service, perl
SHA-256 | 0145ba05224abe8cd39e2bbb4563f50912ca30a674d9149f9da950d0e59bd439
crashMs-ds.rc2.tar.gz
Posted Jan 4, 2003
Authored by Chown, Iplogd

Crashms exploits the microsoft-ds bug and crashes windows machines via tcp port 445. Sends many 10k blocks of NULLs, causing blue screens on unpatched Windows 2000 boxes with microsoft-ds running on port 445.

tags | exploit, tcp
systems | windows
SHA-256 | 76d264a71d11fe7e7cc4f6e42545ed890402ae980da59da4b8a1a8cce3ad3211
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close