exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-08-11

sara-3.1.7.tar.gz
Posted Aug 11, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Fixed false positive on latest ColdFusion, Expanded services database to reflect new definitions, Added test for Answerbook2 vulnerability, and Cleaned up configuration management routines.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 92e13c0cd01c13af6c6fe0b3089d3b96bfa48a113d785dfbf12c2dc13f29dca3
ldistfp-0.1.1.tar.gz
Posted Aug 11, 2000
Authored by scut | Site team-teso.net

Ldistfp is an identd fingerprinting tool which works well with all Linux and most *BSD hosts that have their auth service running.

systems | linux, unix, bsd
SHA-256 | a0e02ae45f7bafdea7bf1bf796fdf701738fa98fb3b7144c5532341e9495418b
CA-2000-16.ie
Posted Aug 11, 2000
Site cert.org

CERT Advisory CA-2000-16 - Internet Explorer can open Microsoft Access database or project files containing malicious code and execute the code without giving a user prior warning. Access files that are referenced by OBJECT tags in HTML documents can allow attackers to execute arbitrary commands using Visual Basic for Applications (VBA) or macros. A remote intruder can send malicious HTML via an email message, newsgroup posting, or downloaded Web page and may be able to execute arbitrary code on a victim machine.

tags | remote, web, arbitrary
SHA-256 | 2ac36051a9e4bac06affdc8d3ca68aa41aa7d1985662ba3cee9f9797a1a045b6
igmpsyn.c
Posted Aug 11, 2000
Authored by Steve Christ

igmpsyn.c sends type 1 IGMP requests with random source addresses. Appears effective against Win95 / 98.

tags | denial of service
systems | windows
SHA-256 | e586aa75def79fe1a2fe497ed40a6021a61562703e88d08b591f4aa935e9df9d
jinro.c
Posted Aug 11, 2000
Authored by Nijen Rode

Jinro.c will transmit TCP packets which generate replies containing a modem hangup sequence. This is an improved version of the old hangup bug which may circumvent firewalls / init string patch.

tags | denial of service, tcp
SHA-256 | a177990f433cf1832b454c2c6fec29700b7b6431125b5bee6189dfb3538da8d8
x1.cpp
Posted Aug 11, 2000
Authored by Dolphin

x1.cpp is a utility for extracting lists of hostnames from northernlight search engine. Uses wget - tested on Linux.

systems | linux, unix
SHA-256 | 050e801933c4356b808efa3fc09830292199ef555a08e5ad9a3052c6a9048fc7
spampl-0.20.tar.gz
Posted Aug 11, 2000
Authored by Daniel Stenberg | Site spam.sourceforge.net

spam.pl is a perl script which automates the process of sending complaint letters to spammers ISP's. It strips out the proper address from the spams mail headers, taken via stdin.

Changes: Bug fixes and enhancments.
tags | tool, perl
systems | unix
SHA-256 | a022c06c7ca2333a298d4c79b1d1c60e0f09de2419df0304950c047ad24a393e
noob_3.01.zip
Posted Aug 11, 2000
Authored by shadow

Noob 3.01 is a trojan which uses an IRC connection to control it, therefore bypassing firewalls. Uses ActiveX. Victim must be running Internet Explorer 4.0 SP1 or 5.0. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Bug fixes.
tags | trojan, activex
SHA-256 | 36a99e6da5bf774b5854d9bec876f052537362e9377b2c406471972a34d19a87
ipaudit-0.93b3.tgz
Posted Aug 11, 2000
Authored by Jon Rifkin | Site sp.uconn.edu

Ipaudit records and displays network activity. It is useful for identifying high bandwith users, intrusive telnet sessions, denial of service attacks, and scans. Ipaudit stores counts of bytes and packets for every combination of host/port pairs and protocol. It also includes scripts which automatically generate webified reports, CGI scripts which organize web presentation, and the utilities "total" and "ipstrings" which can be used to investigate network traffic records from the command line.

Changes: New scripts to generate Web based reports.
tags | tool, web, denial of service, cgi, sniffer, protocol
SHA-256 | fe18df67ab2bb5fa31f18739afbd34589b66b00f5d5c8283ecb1468b15416363
StJude_LKM-0.03.tar.gz
Posted Aug 11, 2000
Authored by Tim Lawless

Saint Jude LKM is a Linux Kernel Module for 2.2.11 and greater kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occuring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.

Changes: Support for SMP kernels, module-sealing is enabled, and a memory leak fix.
tags | remote, kernel, local, root
systems | linux
SHA-256 | 7a4167f795924aff6fa44181378b1bca05d209648a56ee122e5379cb791f53d9
netsec25.txt
Posted Aug 11, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 25 - 07.08.2000 - Covers weekly roundups of security related events. In this issue: PAM updates, kon2 vulnerability, Cvsweb-1.90 remote vulnerability, Windows 2000 Pipe Impersonation Vulnerability, Cisco Gigabit Advisory, Serv-U 2.5E dos vulnerability, Interview with Lance Brown, Mobile Phone Viruses, Smart Download is Spyware, and more.

tags | remote, denial of service
systems | cisco, windows
SHA-256 | e02e697e8d5ad77f842079081f882f6120e6f6b87aa136d717da6774c1a5db2c
ms00-056
Posted Aug 11, 2000

Microsoft Security Bulletin (MS00-056) - Microsoft has released a patch for the "Microsoft Office HTML Object Tag" vulnerability in certain Microsoft Office 2000 products. The vulnerability allows a user to construct a HTML file that, when read, would crash a Microsoft Office 2000 application or run arbitrary code. Affected software includes Microsoft Word 2000, Microsoft Excel 2000, and Microsoft PowerPoint 2000. Microsoft FAQ on this issue available here.

tags | arbitrary
SHA-256 | 39030c4684ecc1e3c972696630c9604a68d7b6ac3ce152dbf6de2893300f1c82
CA-2000-15.netscape
Posted Aug 11, 2000
Site cert.org

CERT Advisory CA-2000-15 - Systems running Netscape Communicator version 4.04 through 4.74 with Java enabled ship with Java classes that allow an unsigned Java applet to access local and remote resources in violation of the security policies for applets.

tags | java, remote, local
SHA-256 | c0502d385df3d99932fdbd39395f7a2f955cc453b3afcb3aa05087faaa5b0da1
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close