what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2002-07-31 to 2002-07-31

wgdecode.c
Posted Jul 31, 2002
Authored by Robert Molnar

wgdecode extracts WinGate administrator passwords from Windows 9x/NT machine registries and decodes them.

tags | cracker
systems | windows
SHA-256 | 908bb0f468a55441c09dc6cea4fc99ddcb9917e24f388a006adfafae37b75bcd
countertrace-1.0.tar.gz
Posted Jul 31, 2002
Site michael.toren.net

Countertrace is a userland iptables QUEUE target handler for Linux 2.4 kernels running Netfilter which attempts to give the illusion that there are multiple, imaginary IP hops between itself and the rest of the world. The imaginary hops that countertrace projects also have the ability to introduce accumulative, imaginary latency.

tags | kernel
systems | linux, unix
SHA-256 | 734617249e43f4c7bb9acecb2dc784d92d6b0c00aca3f8c6786f94e2e9c17a4c
nessus-1.2.3.tar.gz
Posted Jul 31, 2002
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 910 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available here.

Changes: New html output layout and a fix in nmap_wrapper. More CVE cross references, added more vulnerability checks, and fixed bugs.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 17348a524fbbce0e7b5a5bac9cde1c5de4f63bb00f7a0cd93013200287f7280a
sendform.cgi.txt
Posted Jul 31, 2002
Authored by Brian Caswell, Steven M. Christey

Sendform.cgi v1.4.4 and below has a directory traversal vulnerability which allows remote attackers to read any file with the privileges of the web server. Fix available here. Bugtraq ID 5286.

tags | remote, web, cgi
advisories | CVE-2002-0710
SHA-256 | 694cdf39c7befd0a99c544d8c6c02d17f57020d35701886d6ec90789a6b1f585
honeyd-0.3.tar.gz
Posted Jul 31, 2002
Site citi.umich.edu

Honeyd is a small daemon that creates virtual honey pot hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.

Changes: Included UDP support (including proxying), and many bugfixes.
tags | tool, arbitrary, tcp, intrusion detection
systems | unix
SHA-256 | 71953be88fe40dd10108080de26dbd1c1ec9589f541747989be8d856255bcd05
khideee.c
Posted Jul 31, 2002
Authored by Michele Dallachiesa aka xenion | Site acidlife.com

This Linux LKM allows you to hide tasks to KSTAT, a tool used to find attackers in your system by a direct analysis of the kernel through /dev/kmem. StMichael_LKM 0.10 (default installation) will not detect this. Tested on Linux 2.4.x kernels.

tags | kernel
systems | linux
SHA-256 | dc49efaef89afbc43c5d83140237d54e06f4f046160e60f98d081ee41e55de3e
opensslrv.txt
Posted Jul 31, 2002
Authored by Haxors Lab, Bastard Slacker

OpenSSL v0.9.6d and below remote exploit. In Spanish and HTML.

tags | exploit, remote
SHA-256 | c34b8fba056f5bcd3a787b5a7169313629bd6aefd0786a4f6dd8dcd59e681114
openssl-0.9.6e.tar.gz
Posted Jul 31, 2002
Site openssl.org

openSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Fixes 4 remotely exploitable buffer overflows.
tags | encryption, protocol
SHA-256 | 331be02e2bd7d7c7f0c991b8d04e0fb9c83d4dc9b94f9e3e75d5c4853518d122
tcptraceroute-1.4.tar.gz
Posted Jul 31, 2002
Site michael.toren.net

Tcptraceroute is an implementation of traceroute which uses TCP SYN packets, instead of the more traditional UDP or ICMP ECHO packets. In doing so, it is able to trace through many common firewall filters.

Changes: Now functions properly on Linux PPP interfaces. Improved command line handling, properly aligning packet data for architectures that don't allow non-aligned memory access, the ability to traceroute to a local IP address, the ability to probe with TCP ACK packets, making it possible to traceroute through stateless firewalls that permit hosts sitting behind the firewall to establish outbound connections, and the ability to track probes by source port numbers instead of IP IDs.
tags | udp, tcp
systems | unix
SHA-256 | 1ef6c4736b55f47d3a2bb26b999cbb409953a112f637bcbec4106da2a0937bde
xss-faq.txt
Posted Jul 31, 2002
Authored by Zeno | Site Cgisecurity.com

The Cross Site Scripting FAQ - Includes threat analysis, examples of cross site scripting attacks, cookie theft, how to protect yourself, and how to fix the holes.

tags | paper, web, xss
SHA-256 | 661e74609dc323f6e78804ba0e5ebb3534a09bcb6cea0f0f0bbc0773b2ba234a
xploit.phps
Posted Jul 31, 2002
Authored by dodo | Site darkshells.ath.cx

PHP exploit lab v1.0 - Attempts to browse, read, execute, and mysqlread.

tags | exploit, php
SHA-256 | 1246fe064866a0ec61ae145cf847039bbc1ff2f2a60977d2c4104bfae6cf3569
CA-2002-23.openssl
Posted Jul 31, 2002

CERT Advisory CA-2002-23 - OpenSSL prior to 0.9.6e, up to and including pre-release 0.9.7-beta2 contains four remotely exploitable buffer overflows. Overflows exist during the SSLv2 handshake process, SSLv3 handshake process, kerberos SSLv3 handshakes, and holding of ASCII representations of integers. Denial of service vulnerabilities exist in the handing of ASN.1 encoding. Version 0.9.6e of OpenSSL is recommended.

tags | denial of service, overflow, vulnerability
SHA-256 | ef774b602053003d0d658ca5f315acab980139edbb7d5815b8b082e757868945
paralyze32.exe
Posted Jul 31, 2002

Windows port of RFParalize.c, which crashes Windows 95/98 remotely with a corrupt popup message. Ported by Cys

tags | denial of service
systems | windows
SHA-256 | 33ee27e58de8411db3d31bbdaf2063b3946217a0356bdfb82bce67321b3c9214
twgen.c
Posted Jul 31, 2002
Authored by tracewar

Class a/b/c ip list generator.

tags | tool, scanner
systems | unix
SHA-256 | cab6ef757f8875a2ca483e53e574b580bfad6bc37676c6d0f66b6c4194a221b6
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close