exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2001-05-25

nwkill.tar.gz
Posted May 25, 2001
Authored by Dart

Nwkill is a simple shell script which kills Netware 5.0 by using netcat to send /dev/random to tcp port 40193.

tags | denial of service, shell, tcp
SHA-256 | 97eb772389ccf50550b76c384134e7cdefed0c78d4a4144f1301a4cd0cdff19b
ra1d.bas.txt
Posted May 25, 2001
Authored by Digital Vampire

A beginners introductory model into Cross platform open source trojans. Currently only Win32 code implemented. Written in rapid-q. No longer supported by author. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows
SHA-256 | ccca3e9dcbafbb3711307eb74d6ff5b086cbdad325e055d3d9632411d0293de5
xchat.c
Posted May 25, 2001
Authored by Sector X | Site crosswinds.net

X-Chat v1.2.x format string bug exploit. Tested against x-chat v1.2.1 on Slackware 7.1.

tags | exploit
systems | linux, slackware
SHA-256 | b469eda18d6e1805cd4e8a0be2fbb3cb43284ad07087b99b32725d1ff02f9fc4
adorebsd-0.34.tar.gz
Posted May 25, 2001
Authored by teso, Bind | Site team-teso.net

AdoreBSD 0.34 - Based off Linux Adore by Stealth. Features hiding files and directories from view, makes processes invisible, hides promiscuous flag and syslog messages, execute as root, hides sysctl mib entries, netstat service hiding, authentication, and module hiding. Developed on FreeBSD 4.3-STABLE.

tags | root
systems | linux, freebsd
SHA-256 | cfeece4d9e9d8347a58eddaf64786360a9187ee3f9bc5af4ee4426bc941f9e3b
adore-0.38.tar.gz
Posted May 25, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Added 64bit FS support, now fools protection modules as StMichael, and minor fixes.
systems | linux
SHA-256 | 81a2723c4a646ea1c9d07a8b8689f5d9f2b498231624d3516bf9a5a8729ca172
ms00-079
Posted May 25, 2001

Microsoft Security Bulletin (MS00-079) - Microsoft has released a patch that eliminates the "HyperTerminal Buffer Overflow" which allows malicious users to execute arbitrary code on another users system by sending a long telnet:// URL in a HTML mail message. HyperTerminal is the default Telnet client on Windows 98, 98SE and ME, but not Windows 2000. Updated hyperterminal available here.

tags | overflow, arbitrary
systems | windows
SHA-256 | 80f7bc89cbf0b5dd6b119914307bb706cfbc08bcaefbecc2b83feaa064de2a0b
Decoding A Base64 String
Posted May 25, 2001

How to decode a base64 encoded string.

tags | paper
SHA-256 | cc8c9fba745a5b6451db1aa4ba0b428f270bdb49055875b80b67d0f3702617ce
ms01-029
Posted May 25, 2001

Microsoft Security Advisory MS01-029 - Two separate vulnerabilities have been found in Windows Media Player. The first is a buffer overflow in the parsing of Active Stream Redirector (.ASX) files which allows attackers to run arbitrary code on the users machine. The vulnerability can be exploited via a malicious website. The second vulnerability is a bug in the handling of shortcuts which allows attackers to read any file on the users system. Microsoft FAQ on this issue available here.

tags | overflow, arbitrary, vulnerability
systems | windows
SHA-256 | de8c057c169b4d064727062240aadae3926e0dd115c8e508d5de6a3574efe7fc
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close