exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files Date: 1999-12-02

ibm.websphere.txt
Posted Dec 2, 1999
Authored by Martin Peter

On solaris (maybe also AIX) the installation of WebSphere from IBM installs a deinstallation shell script in /usr/bin with mode 777. This gets run by root.

tags | exploit, shell, root
systems | solaris, aix
SHA-256 | ab14cab6e5574ea1cbe2c6ebaa65c3d72eab077850d8673140f0b2245ad67470
slackware7.login.txt
Posted Dec 2, 1999
Authored by Stewart Gebbie

This is regarding a logic but in the shadow suite that enables a brute force attack for finding and cracking login in accounts via telnet (and possibly some other nasty side affects). If the account is locked or does not exist, the telnet connection will drop immediately.

tags | exploit
SHA-256 | 361d517df27985b876da419da8f31aae37d0bb58446e06867cc90115923155ff
pandora_linux_v4.0_b2.1.tgz
Posted Dec 2, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2.1 Netware Attack tool for Linux - Offline password auditing and Online attack for the X Windows platform on Linux. The Online software requires an IPX-aware kernel and root.

Changes: Jitsu-Disk finished moving the Pandora Linux code so that Pandora Linux uses libpcap and libnet. A number of problems have been corrected from the beta release on November 19th, including several problems involving spoofing and sniffing. Libnet helped Jitsu fix all that. We've updated the documentation, included all the code we used to do the builds, pre-compiled binaries, and wrapped it up in a nice big tarball for your hacking needs.
tags | kernel, root
systems | linux, windows
SHA-256 | 04176a26ae4765b00ef4e4f75faf0e72600d8e13e260d89cfd33ce9a9697bc98
ms99-054
Posted Dec 2, 1999

The IE 5 Web Proxy Auto-Discovery (WPAD) feature enables web clients to automatically detect proxy settings without user intervention. The algorithm used by WPAD prepends the hostname "wpad" to the fully-qualified domain name and progressively removes subdomains until it either finds a WPAD server answering the hostname or reaches the third-level domain. A vulnerability arises because in international usage, the third-level domain may not be trusted. A malicious user could set up a WPAD server and serve proxy configuration commands of his or her choice. Microsoft FAQ here.

tags | web
SHA-256 | 29f73e3d19883fc29c12f6db9708c87545175d7ca226325e950747fadc18d8ad
caching.html
Posted Dec 2, 1999
Authored by Raven | Site blacksun.box.sk

Speeding Up Your Internet Connection using DNS Caching under Unix and Windows: everything you've always wanted to know about DNS caching but were afraid to ask.

tags | paper
systems | windows, unix
SHA-256 | 68e339cb0b62929ec6a1e6f0bca1896fd0fa6920a1475c05ac6a0430e116b8b7
Trojan_Ports_List.r_m
Posted Dec 2, 1999
Authored by Evil Dead

Trojan port list which covers 171 remote trojans. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
SHA-256 | e7568202d0d3c02b0044c7d4d54e3092aed55dab34dbbd571294a5ec231fbd30
gsal-19991128-pdf.tar.bz2
Posted Dec 2, 1999
Authored by Jose Antonio Revilla

Spanish translation, for the Kurt Seifried's Linux Administrator's Security Guide in pdf format.

systems | linux
SHA-256 | fe89bf833c3fbce4093062cabfc60183cc818333c2d1405d6bb45e39b7db6d25
gsal-19991128-ps.tar.bz2
Posted Dec 2, 1999
Authored by Jose Antonio Revilla

Spanish translation, for the Kurt Seifried 's Linux Administrator's Security Guide in postscript format.

systems | linux
SHA-256 | 12db919962cbe5f321fed5d1b2d3f6281ba9a3683c995a174ee5197b3d12055e
gsal-19991128-txt.tar.bz2
Posted Dec 2, 1999
Authored by Jose Antonio Revilla

Spanish translation, for the Kurt Seifried's Linux Administrator's Security Guide in text format.

systems | linux
SHA-256 | 97231323d7cabf3ddb93b90db4f8178a692c77857ea910ddfa67be40ff6832b1
gsal-19991128-htm.tar.bz2
Posted Dec 2, 1999
Authored by Jose Antonio Revilla

Spanish translation, for the Kurt Seifried's Linux Administrator's Security Guide in HTML format.

systems | linux
SHA-256 | 89820d58bc30853377078b5112bf63b242c99bfc1dcb91617712124607daf73f
ms99-053
Posted Dec 2, 1999

Microsoft has released a patch for a vulnerability in the SSL ISAPI filter that ships with IIS and other microsoft products which could allow plaintext to be sent back to the data's owner. A FAQ about this vulnerability is here.

SHA-256 | 87a0a7a5e8e96807db49642cd72ae20247b0809d7717d3d6245dfc2c75b1135f
debian.dump.txt
Posted Dec 2, 1999

The version of dump that was distributed with Debian GNU/Linux 2.1 suffers from a problem with restoring symbolic links. The new version uses lchown instead of chown, fixing a possible security problem when restoring symlinks (a malicious user could use this to deliberately corrupt the ownership of important system files). Debian security website here.

systems | linux, debian
SHA-256 | d6ca5c12e1090ef63a7880ef69eb09531e1db975d5bfe60b3bafad55afdc3887
nt.ie5.scheduler.txt
Posted Dec 2, 1999
Authored by Arne Vidstrom, Svante Sennmark

A vulnerability has been found that the installation of Internet Explorer 5 introduces in Windows NT through the Task Scheduler service. This vulnerability makes it possible for a User to become a member of the Administrators group if he/she can do an interactive logon. The Task Scheduler service is an "improved" version of the usual Schedule service - they are not the same thing. The Schedule service is replaced by the Task Scheduler when Internet Explorer 5 is installed on Windows NT. Microsoft security bulletin 51 addresses this issue and is available here.

tags | exploit
systems | windows
SHA-256 | e586b63470a7536dfa7b26cc02b77cf27aea8efa4fc13b852d5f0a78a50e98c8
unixware7.gethostbyname.txt
Posted Dec 2, 1999
Authored by Brock Tellier

A serious bug exists in UnixWare 7.1's libc. A buffer overflow in gethostbyname() will allow any user to obtain elevated privileges. My demonstration exploit happened to be "arp", but any program calling this function will do.

tags | exploit, overflow
systems | unixware
SHA-256 | 33ff95b3f628171302cc481f7d84bd468b39f1cbee5eefe342b2237ec3c91cdd
unixware7.uidadmin.txt
Posted Dec 2, 1999
Authored by Brock Tellier

SCO UnixWare 7.1's sgid-sys /usr/bin/uidadmin will allow any user to gain root privileges as a result of it's ability to write *ANY* file, not just those traditionally writable by gid-sys. Exploit for 7.1 included, 7.0 is vulnerable as well.

tags | exploit, root
systems | unixware
SHA-256 | e3601c95a78b23bc230de20b8d8323da8152ce4edc6999c9572c383340376a25
core-sdi.rsaref
Posted Dec 2, 1999
Site core-sdi.com

Core/SDI discovered a second buffer overflow in the implmementation of the RSA algorithm in RSAREF2 from RSA Data Security. This advisory addresses the details of the bug discovered, the details are somewhat focused on the ability to exploit the bug in SSH compiled with RSAREF2, but its extensible to any software product that uses RSAREF2.

tags | overflow
SHA-256 | 527168062ffc62dfc807ebe43c1e9bb63bab56ab4c45d4ed0623b4acd4bf4dcc
ISS Security Advisory December 1, 1999
Posted Dec 2, 1999

Netscape Enterprise Server and Netscape FastTrack Server are widely used Internet web servers. Internet Security Systems (ISS) X-Force has discovered a vulnerability in Netscape Enterprise Server and Netscape FastTrack Server, as well as in the Administration Server supplied with both. There is a buffer overflow in the HTTP Basic Authentication that can be used to execute code on the machine as SYSTEM in Windows NT or as root or nobody in Unix, without requiring authentication. The Administration Service runs as root in Unix, the Application Server runs as the user nobody by default.

tags | web, overflow, root
systems | windows, unix
SHA-256 | 8187b5e0d5711bc5d702c33784339ce21a06c2477828919f768b1d4d8b39cbf0
serv-u.2.5.txt
Posted Dec 2, 1999
Authored by Dark Spyrit, USSR

There is a Local/Remote DoS Attack in Serv-U FTP-Server v2.5a. Source / Binary available here.

tags | exploit, remote, local
SHA-256 | d83888fc7f71eee75b5beae3a3c7641437bf142bd15113b4fdd74e42c083547c
logcheck-1.1.1.tar.gz
Posted Dec 2, 1999
Authored by Craig Rowland | Site psionic.com

Logcheck helps spot problems and security violations in your logfiles automatically and will send the results to you in e-mail.

tags | tool, intrusion detection
systems | unix
SHA-256 | dfe4cb29305c619dc0a0aca5b11b2bd397baccf3076b48f03457f66f299ab42e
netpeek-0.0.4.tar.gz
Posted Dec 2, 1999
Authored by Rhys Weatherley | Site nyerk.com

NetPeek is a GUI-based network monitoring and diagnosis tool. It captures packets from the local network and displays them to the user in two forms: a short one-line description similar to that produced by tcpdump, and a long form that displays the contents of all fields within the packets in full. NetPeek also includes some useful network analysis tools similar to ping, hostname lookup, netstat, rpcinfo, and ifconfig.

Changes: A fix for a nasty DNS hang problem in the previous release, farming out of DNS lookups on IP addresses to a separate process so that they don't interfere with packet capture and display, display of ethernet card vendor names next to the ethernet address, a more extensive list of recognized ethernet types in the header, addition of simple text-based packet formatting rules for telnet, FTP (control connection only), SMTP, NNTP, POP, IMAP, Gopher, and finger, some basic IPv6 work, and a number of other small cosmetic changes.
tags | tool, local, sniffer
SHA-256 | c09c629cde249d7c09dd110b2ec1a63fcc17bb77cb6277f965e52c98e50fe6fd
logsurfer-1.41.tar.gz
Posted Dec 2, 1999
Authored by Wolfgang Ley | Site cert.dfn.de

logsurfer is a log checking/auditing tool similar to swatch and logcheck but with the capability of handling multi-line messages and dynamically adapting the ruleset. It is written in portable C, well documented, fast, and flexible. It works on any textfile or stdin, can be run at intervals or continuously, and has timeouts and resource limits.

tags | tool, intrusion detection
systems | unix
SHA-256 | 544d9a0a79ddca06aa9c17d04f98e8f51ea727e3420c9328c79cdd428d89689e
sendmail-tls-0.21.tar.gz
Posted Dec 2, 1999
Authored by Jeremy Beker | Site opensource.3gi.com

Sendmail-TLS is a wrapper for Sendmail which allows for clients to make a secure (SSL) connection to their mailserver as described in RFC 2487. The connection is internally forwarded to sendmail and does not require sendmail to be running on port 25. Clients which support this currently are Netscape Messenger, Microsoft Outlook, and Microsoft Outlook Express.

systems | unix
SHA-256 | 16feb4a9df58db47671f987a4b8d4916701fed719f503063c6e3ebedf68d6d2a
portfwd-0.1.tar.gz
Posted Dec 2, 1999
Authored by Everton da Silva Marques | Site nucleo.freeservers.com

Portfwd is a small C++ utility which forwards incoming TCP connections and/or UDP packets to remote hosts. Multiple forwarders can be specified in a flexible configuration file.

Changes: Automatic fixing of network addresses as suggested by netmasks, forwarders can now switch to an unprivileged user account after binding the local address, and a better configuration example has been added.
tags | remote, udp, tcp
systems | unix
SHA-256 | 0b34ee09d0cbd1db6fb166d906bec18b73d868fd203c6728baf0e90b8e107330
Bastille-0.90.tar
Posted Dec 2, 1999
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible and educational Security Hardening Program for Red Hat Linux. Virtually every task it performs is optional, providing immense flexibility. It also educates the user regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Verbose logging features and error correction, and a temporarily-removed taint mode while testers nail it down.
systems | linux, redhat
SHA-256 | 84bd4c8d84f91c54e1931a348fdbb0ade81ac8f75d3f5e5777b1655b8413d7a8
portsentry-1.0.tar.gz
Posted Dec 2, 1999
Authored by Craig Rowland | Site psionic.com

PortSentry is part of the Abacus Project suite of security tools. It is a program designed to detect and respond to port scans against a target host in real-time. It runs on TCP and UDP sockets and works on most UNIX systems. Advanced stealth detection modes are available under Linux only and detect SYN, FIN, NULL, XMAS, and Oddball packet scans. All modes support real-time blocking and reporting of violations.

Changes: Correct ignoring of hosts, and a Y2K fix for log file output, using a four-digit year. This doesn't affect PortSentry, but may affect programs that look at the log files it generates.
tags | tool, udp, tcp, intrusion detection
systems | linux, unix
SHA-256 | dcd261b2ed7cb1fc2b602b0b94fa7d47cfbbfaf03a0fb3d92ce243e2f647588d
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close