exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2002-03-20 to 2002-03-21

DLA-18-03-2002.txt
Posted Mar 20, 2002
Authored by Gollum

Microsoft posted a security bulletin on this (ms99-040) way back in September 28, 1999; it is still exploitable if the html file is run from the users local disk and not from a webserver or file-share.

tags | exploit, local
SHA-256 | 8ffd9671f0b9be7cb6bdf03ca7f71dbd7b5e1f5919523c3959581dcf7e7832de
IIS Unicode Strings
Posted Mar 20, 2002
Authored by Daniel | Site bastardo.de

IIS unicode strings.

tags | exploit
SHA-256 | 9349adb2a527c9a62ec3abae3b5c92f0f8b520e4a61ff2ef6b00e79a53220782
onesixtyone-0.3.tar.gz
Posted Mar 20, 2002
Authored by Solar Eclipse | Site phreedom.org

onesixtyone 0.3 is an efficient SNMP scanner which utilizes a sweep technique to achieve good performance. It finds SNMP devices on your network and brute-forces the community strings using a dictionary. It is possible to scan a class B network (65536 ip addresses) in under 13 minutes with a high degree of accuracy. Tested on Linux, FreeBSD, OpenBSD and Solaris.

Changes: This release includes portability enhancements.
tags | tool, scanner
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 0baedfe247ea6e07cb88efdc67ca4e7a47bf6457a6de0a5cb0cc8f3851085203
Wellenreiter-v08.tar.gz
Posted Mar 20, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).

Changes: Added WEP enabled / disabled detection. WEP encrypted enabled access points now get a different icon coloring that non WEP enabled ones. Real access points got different icons than AD-Hoc stations that do the broadcasting. Added a battery monitor window. Enhanced the scanner window performance. Fixed the problem of adding of access point in the tree outside the channels.
tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | b40851db96e46b4817e4d858df01930ebfc9ab68ce7d8225f0429584dcf000e8
xscreensaver-4.02.tar.gz
Posted Mar 20, 2002
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Fixes for a few minor memory leaks, new hacks (cubenetic and fluidballs), new versions of pipes, glplanet, bsod, forest, and bumps, and better FPS computation in the GL hacks.
tags | root
systems | unix
SHA-256 | 02dd9db7b5e15b34e9d9cdadb26be5cdc30cc092d00da2035add0ea94b9189c5
mod_protection-0.0.2.tar.gz
Posted Mar 20, 2002
Authored by twlc, Yaroze | Site twlc.net

Mod_protection is an apache module that integrate basic function of an IDS (intrusion detection system) and of a firewall (just an emulation for now). Your apache administrator have only to install mod_protection and define rules. A normal NIDS can't check SSL protected traffic, where mod_protection can. When a malicious client sends a request that matches on your rules the administrator will be warned and the client gets a user defined page or a error or warning.

Changes: Three new directives - BlockTime, PairAlert, and PairAlertMatch. Blocktime does firewall emulation. Updated docs. Rules are now in an external file.
SHA-256 | e1ff421a590fe6e6835781223069f929d55a39f49c486e2db9671f201e81005e
ipsorc-1.4.4.tar.gz
Posted Mar 20, 2002
Site legions.org

IP Sorcery is a TCPIP packet generator which allows you to send TCP, UDP, and ICMP packets with a GTK+ interface.

Changes: Added the ability to the console version to specify number of packets to send. Many cool feature enhancements were added.
tags | udp, tcp
systems | unix
SHA-256 | b00cf5a126db1e3db6f69c581645a5df3895b0d757e4d32ef93ca286a31e8324
lcrzo-4.06-src.tgz
Posted Mar 20, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Added support for serial line modems, the ability to spoof without having to specify an IP option (tools 298-307), the ability to create UDP/TCP clients/servers without having to specify an IP option (tools 308-315), TCP/UDP/ICMP traceroute at the IP level (tools 316-18), ICMP/TCP ping at the IP level (tools 319-20), TCP/UDP/ICMP scans at the IP level (tools 322-4), and the ability to edit binary files (tools 325-6) were added. Files not being renamed when the input and output files were the same has been fixed (tools 149-50).
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | 05d1c24027df852d16c16f0fe79d4eb4e0bf7e5c62a8a00dd50059716a829429
fbsd.tgz
Posted Mar 20, 2002
Authored by Nyo, Jade

FreeBSD rootkit precompiled binaries for 4.2-RELEASE.

tags | tool, rootkit
systems | unix, freebsd
SHA-256 | 3af1773776a476c441374927e24c556a578e2d6ed99f92f5b4f875f62c395399
Samhain File Integrity Checker
Posted Mar 20, 2002
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Fixes a compile error with --enable-xml on non-Linux systems and a problem with the hiding kernel module on new Linux kernels has been fixed (files were hidden, but the samhain process was visible).
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | f153a0f8c56156a595ef745a1525915403f8cc4f7379bd5f7c24d166f5afd814
iisscan-1.0.tar.gz
Posted Mar 20, 2002
Authored by Daniel | Site bastardo.de

IISscan v1.0 scans networks for IIS servers vulnerable to the unicode bug.

tags | tool, scanner
systems | unix
SHA-256 | 3c3d59978a521e77e4cd36649b23cbb404e3411fe080d04a7542b236aa3459ad
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close