what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-05-14 to 2000-05-15

msoua.txt
Posted May 14, 2000
Authored by Dildog | Site l0pht.com

L0pht Security Advisory - Microsoft Office 2000 UA Control Scripting is categorized as being "safe for scripting", allowing malicious active content to execute regardless of macro virus protection settings. Scripts can be executed without users consent from any HTML page viewed with active scripting enabled, including both Internet Explorer and Outlook e-mail in their default configurations. Online demonstration of this vulnerability in action here.

tags | virus
SHA-256 | 07e38831f23656433eb66a5e66acce7f1054bd81c2b6772ad482436a56ee2957
Freak88.zip
Posted May 14, 2000
Authored by Freak88@dalnet | Site freak88.net

Freak88's Distributed Attack Suite is a windows trojan similar to wintrin00. It can connect up to 3 infected machines and start 65000 byte ICMP floods. Auto starts from the registry and copies itself to c:\windows\system.

tags | denial of service, trojan, registry
systems | windows
SHA-256 | 4716af3cf6f3e44d7c95bfa6d56399b7703e912b08884c8eddff832691617583
Bastille-1.0.4p1.tar.gz
Posted May 14, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1/6.2. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Version 1.1.0 runs on non-virgin systems, can be uninstalled, can run multiple times, and includes an accept-and-log-only mode.
systems | linux, redhat
SHA-256 | 52c6cf294aa9ad2c4d4a44e2867b45036845337e99d455cac7c57f1f9a4b3c93
mstream.analysis.txt
Posted May 14, 2000
Authored by David Dittrich | Site washington.edu

Analysis of the "mstream" distributed denial of service attack tool, based on the source code of "stream2.c", a classic point-to-point DoS attack tool. mstream is more primitive than any of the other DDoS tools.

tags | denial of service
SHA-256 | 243feec66f24ccdbce5b93711153f7ee5460dd38368a1916c04ed718db01e1b5
mslinux.jpg
Posted May 14, 2000

Microsoft Linux box cover. Very chilling, frightening, and funny too.

systems | linux, unix
SHA-256 | 1bc986e436715e6db9328f01347cc8326f0de23ce9447218dc4e65884d6302b2
sendfile.pl
Posted May 14, 2000
Authored by vade79, realhalo | Site realhalo.org

sendfile.pl is a tool which uses echo to send files to any webserver which has an unchecked open() call in a cgi script.

tags | web, cgi
SHA-256 | 7c555f235208e9dcdbdb3351234decf73f56993d31d16ac5d34bf257b6e64390
allmanage.pl.txt
Posted May 14, 2000
Authored by BigHawk

Websites using Allmanage Website Administration Software 2.6 with the upload ability contain an easily exploited vulnerability wich gives you full add/del/change access in the user-account directories and you can change the files in the main directory of the CGI script.

tags | exploit, cgi
SHA-256 | 28da141276c6e2c819bc1648db253cc3e8c8bb66f3f25be3bda20c50b11dcfce
watcheador.zip
Posted May 14, 2000
Authored by Leon De Juda

Watcheador is a Windows application allows you to view ASP source code using the Index Server bug in IIS 4 & IIS 5. Written in Delphi 4.0. Comments in spanish.

tags | exploit, asp
systems | windows
SHA-256 | 0cb4c709460305fb3b8f99be10150eb2688fae9185521c51c6dbb18bf49e09da
tinc-1.0pre1.tar.gz
Posted May 14, 2000
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: A new protocol, better portability and stability, bug fixes.
tags | encryption
SHA-256 | eea1d6f10ccfda130055f99bad8dc649317b7641a417aac8ffab111e7f8da154
Linux IPTables Firewall
Posted May 14, 2000
Authored by Netfilter Core Team | Site iptables.org

Iptables is built on top of netfilter: the new packet alteration framework for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects.

Changes: Fixes for kernel version 2.3.99-pre8.
tags | tool, firewall
systems | linux
SHA-256 | 4de3dd21e105a1be9e7ad5715e9f1de7052e44c4ad7a2f4d3e0c755814431a85
silent.delivery.txt
Posted May 14, 2000

Silent delivery and installation of an executable on a target Windows computer is possible by combining some bugs. No client input other than opening an email or newsgroup post is neceassary, making the possibilities endless. The key component is from Georgi Guninski, the wordpad overflow. An ActiveX control does the rest. Exploit code included.

tags | exploit, overflow, activex
systems | windows
SHA-256 | 007f9308b3ece160e58c992cce562deeca8b829f5e860c221e1cc845b05f041a
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close