what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 1999-11-22

Q-0.9.tgz
Posted Nov 22, 1999
Authored by Mixter | Site members.tripod.com

First public release of Q - a client / server backdoor with strong (256 bit AES) encryption for remote shell access. Also supports encrypted tcp relay/bouncer server that supports normal clients (with a local encryption tunneling daemon). Includes stealth features like activation via raw packets, syslog spoofing, and single-session servers that prevent it from appearing in netstat.

tags | tool, remote, shell, local, spoof, tcp, rootkit
systems | unix
SHA-256 | d7265225af4406ffa7e288ab5319b6ec454cdc37a2b202d271b4a02a5c08f0de
suse.bind.txt
Posted Nov 22, 1999

SuSE Security Announcement: bind8 here.

systems | linux, suse
SHA-256 | e9ff1adacc050405b9af047443d0fbd7e678cadfffa955f09d04d0898099bba3
vftpd.txt
Posted Nov 22, 1999
Authored by Underground Security Systems Research

The Vermillion ftp daemon (VFTPD) version 1.23 has a remote DOS attack. Example included.

tags | exploit, remote
SHA-256 | 364eb73941cc98cd5a2bce052f4c3f604902f79f987368276c4c0288d9a0028c
hping2-beta53.tar.gz
Posted Nov 22, 1999
Authored by Antirez | Site kyuzz.org

Hping is a software to do TCP/IP stack auditing, to uncover firewall policy, to scan TCP port in a lot of different modes, to transfer files accross a firewall, test network performance, test of TOS is handled, etc.

Changes: Major bugs fixed and enhanced configure / Makefile.
tags | tool, scanner, tcp
systems | unix
SHA-256 | c19bda14665db021f54abe130046c9840e62b27b23c0ed336b2a606781558a42
metasearch
Posted Nov 22, 1999
Authored by slackee

CGI vulnerability found in meta.pl that allows a remote user.to view files on the system as the UID of the httpd server.

tags | exploit, remote, cgi
SHA-256 | b7f7521aa7e1a5c8863f05860d8a9ccf5f935deae7fdd07e63ddbf8b161b997c
Nmap Scanning Utility 2.3 BETA 8-1 i386 RPM
Posted Nov 22, 1999
Authored by Fyodor | Site insecure.org

nmap 2.3beta8 staticly linked Linux/x86 rpm for Linux users without GTK.

tags | tool, x86, nmap
systems | linux, unix
SHA-256 | b63cbf8a2897805023686f5d9da6af7ba9f43c9c5afec4ab449145b583cd204c
Nmap Scanning Utility 2.3 BETA 8
Posted Nov 22, 1999
Authored by Fyodor | Site insecure.org

nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces and capabilities. Thus I incorporated virtually every scanning technique I know into nmap.

Changes: Added "firewall mode" timing optimizations which can decrease the ammount of time neccessary to SYN or connect scan some heavily filtered hosts. Changed "TCP Ping" to use a random ACK value rather than 0 (an IDS called Snort was using this to detect Nmap TCP Pings). Better Alpha/Linux support and FDDI support. Made OS detection smart enough to first check scan results for a known closed port instead of immediately resorting to a random one. This improves OS detection against some machines behind packet filters. (suggested by van Hauser). Applied a shortcut suggestion by Thomas Reinke which can lead to a tremendous speedup against some firewalled hosts. Added some ports commonly used for RPC to nmap-services. Added a number of new ports to nmap-services.
tags | tool, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 85d5167197de6b013ef0cd1cd1723f790818bc78888095caa6414a6a04156c68
ipaudit-0.9.tgz
Posted Nov 22, 1999
Authored by Jon Rifkin | Site sp.uconn.edu

ipaudit listens to a network link using promiscuous mode and gathers statistics on network usage. For every combination of host pair, port pair and protocol, it counts bytes and packets in both directions. After a fixed interval (30 minutes for example) ipaudit can be signaled (via kill command) to output its results. The text output can be processed into reports but the raw data can also be useful identifying heavy bandwidth consumers, intrusive telnet sessions, denial of service attacks, etc. There is also an option (like tcpdump) to save raw packets to specific ports for detailed subsequent analysis with packages such as tcpdump or ethereal.

tags | tool, denial of service, sniffer, protocol
SHA-256 | 982b4d7197acb8b92706652d9b2b43d7fd82be03e5ac8e480a7d688834cf94a8
unixsec.txt
Posted Nov 22, 1999
Authored by Raven

A tutorial for a Unix newbie or semi-newbie who is interested in computer security and/or networking. Basic Local/Remote Unix Security: Change default configurations, basic packet filtering, how to secure your system's networking services (or completely remove them or some of them, in case you don't need them, in order to increate your computer's security), how to use, how to avoid trojans, what are sniffers, how to maintain local security between different users in your system (if you're not the only one using this system, whether it's locally or remotely), some stuff about SSH, how to protect yourself against computer viruses under the Unix system, what are security scanners and how to use them, why you should encrypt your important data and how etc'.

tags | paper, remote, local, trojan
systems | unix
SHA-256 | 752f8d456cd2997c648ad6a15e70646527e51406f91a4e955ca9031248eac546
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close