exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2000-02-11

snowdisk-1.0.tar.gz
Posted Feb 11, 2000
Authored by Scott G. Miller

SnowDisk takes an input file, then uses GPG and the random device to write the file in encrypted form to a unix device (a floppy for example), followed by random data from /dev/urandom. The result is a floppy filled with apparently random data, with no partition information that can leak the size or structure of the encrypted information.

tags | encryption, steganography
systems | unix
SHA-256 | 7926c086bb0894d99ae7343d55b7d56665cb59c8f73d51c7829a831ce394ce54
hisecure-SurfProtector-3.0.855_english_linux.tgz
Posted Feb 11, 2000
Authored by HiSolutions Software GmbH

HiSecure provides secure encrypted communication betwenn hosts over an insecure network. You can redirect any TCP/IP ports over this secure encrypted channel. It works with Citrix and SAP R/3, and only the powerful web SSL-proxy is included. Solaris and NT versions available on the homepage, here.

tags | web, encryption, tcp
systems | solaris
SHA-256 | b628069f4705c76db0a6bf4308de62e0a60c087bd5caf29b85d2b731d34defa9
recycle-logs.tar.gz
Posted Feb 11, 2000
Authored by Rocky Bernstein | Site netwinder.org

Recycle-logs is a logfile manager written in Perl that attempts to overcome the limitations of other system log utilities. File rotation and other customization is based on control information specified in one or several configuration files.

tags | perl
systems | unix
SHA-256 | cd94875514ca874dd5eb2b0842385cf91e4f2fccbe1f0b7ffeac263070fe39be
TFN2k_Analysis.htm
Posted Feb 11, 2000
Authored by Woody Thrower, Jason Barlow | Site www2.axent.com

This document is a technical analysis of the Tribe Flood Network 2000 (TFN2K) distributed denial-of-service (DDoS) attack tool, the successor to the original TFN Trojan by Mixter.

tags | denial of service, trojan
SHA-256 | cfd9ab39b27fdf49f0cb4d3d8c500997b796dad7ca44d25f3176e7b85dabcb83
sendm-8.9.3trojan.tar.gz
Posted Feb 11, 2000
Authored by Axess

Backdoored Sendmail 8.9.3 - Enter a special SMTP command and it opens a root shell.

tags | tool, shell, root, rootkit
systems | unix
SHA-256 | 89cbf9568042d8e2c5da41f5baf9aef42ed00a1209495954e4de99ccad6eff5c
mailbrute.c
Posted Feb 11, 2000
Authored by Axess

Sendmail bruteforcer to look for valid accounts. Uses the RCPT command.

tags | tool, scanner
systems | unix
SHA-256 | 15f70acbf9f93a3e8b2d5dd1526e48ec7ac1f5f62831204e0b5400972bc42b46
winsd.021100.txt
Posted Feb 11, 2000
Authored by winsd | Site ntsecurity.net

Windows Security Digest update - Four new risks were discovered: A DoS condition within BTT Software's SNMP Trap Watcher, two DoS conditions within True North Software's Internet Anywhere mail server, a means to open unauthorized TCP ports on Checkpoint's Firewall-1, and a means to bypass complete password authentication on MySQL.

tags | tcp, magazine
systems | windows
SHA-256 | bcb4143ae284ce2188d3038dd05e44ef427558d1f9c0b020e168c5c0e4d5e49a
proftp_ppc.c
Posted Feb 11, 2000
Authored by Lamagra

Proftpd (<= pre6) linux ppc remote exploit.

tags | exploit, remote, ppc
systems | linux
SHA-256 | 6794b66bd9b67beb831092c9ee6bb6d6a88f66d33536244eea1007cad32cadba
pro.tar.gz
Posted Feb 11, 2000
Authored by teso

proftpd exploit for 1.2.0pre3 linux x86

tags | x86
systems | linux
SHA-256 | 6edee0d79957dc29f1b881883812df5000054566a9ed218b5d2bd52d14c2619a
linux-2.2.14-stealth4.diff
Posted Feb 11, 2000
Authored by Sean Trifero | Site innu.org

Patch for linux kernel 2.2.14 to discard packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets.

Changes: Version 4 is handled by sysctl. Note that the kernel config options are now under networking.
tags | kernel, tcp
systems | linux
SHA-256 | 9c0ecff20731cb815594f081b4d9b1b3f9c2d6985a5315b1fa95aec2c1ae3fcf
pcfs.c
Posted Feb 11, 2000
Authored by Mixter | Site mixter.void.ru

pcfs.c is a tool that creates a fake CFS (cryptographic file system) encrypted directory tree, which is reasonable indistinguishable from a real CFS directory. It proves that just having a CFS styled directory doesn't prove it actually contains real encrypted data.

SHA-256 | cb278ff823f8b81b672492dcb35960e85ed6420efa14288465dab6f4d48d20ae
firstaid.txt
Posted Feb 11, 2000
Authored by Mixter | Site mixter.void.ru

Mixters guide to defending against DDOS - 10 Proposed 'first-aid' security measures which should be implemented by anyone at risk.

tags | denial of service
SHA-256 | a45bc9efc6b77fa911f41e367dd8ef7a0a6a867f5d47435a7fe799d7074c2ae5
Project_ZombieZapper.zip
Posted Feb 11, 2000
Site razor.bindview.com

Zombie Zapper v1.0 Windows NT Source Code - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

tags | denial of service
systems | windows
SHA-256 | 64ecfba45eafc81f39e5ef7e52af912125ececd41f48648ccb5b2eaf216a790f
UW-CSE-00-02-01.tgz
Posted Feb 11, 2000
Authored by Stefan Savage | Site cs.washington.edu

This paper describes a technique for tracing anonymous attacks in the Internet back to their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed", source addresses. In this paper we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by an attacker without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed "post-mortem" -- after an attack has completed. We present one implementation of this technology that is incrementally deployable, (mostly) backwards compatible and can be efficiently implemented using conventional technology. In pdf and postscript format.

tags | denial of service, spoof
SHA-256 | bb7e781a8fbc104cfd9119ecf7c8caf54c5aab786c654c2d11dd9b87b1c48922
rcpt-analisys.tgz
Posted Feb 11, 2000
Authored by Lucas Fontes

Many sendmail daemons can be abused to get information about what accounts exist. By following basic RFC standart procedues - without VRFY and EXPN - we can still list the valid users using by another command as suggested in [RFC821]. Includes demonstration code smtp-cracker.c.

systems | unix
SHA-256 | 00c30ede0fb5ebfcf638254f37ed014b5e677f6f2b1df90bcc7baae443b0559e
utcl.c
Posted Feb 11, 2000
Authored by teso

cloak users utmp host entry

SHA-256 | c0c9242b12e010e91bd24cd3baa34312c62ad75a6009c50c5b81b94971b8d773
grabbb-0.1.0.tar.gz
Posted Feb 11, 2000
Authored by teso

very fast, clean and mean, but functional banner scanner, with part of the functionality of netcat :-)

SHA-256 | 8140faf86d4dda36aae57f79ae2a8d27be823118b76e22cf890009a8f15509cc
ascend-foo.c
Posted Feb 11, 2000
Authored by teso

DoS ascend router with simple udp echo<->echo link

tags | udp
SHA-256 | 3e610f9dc41e66bc8418d2222d57f4c973771ed8591575ffdb3a1eb229546188
arptool-0.0.1.tar.gz
Posted Feb 11, 2000
Authored by teso

send arp packets useful for man-in-the-middle

SHA-256 | 2bcbf6fa27b752ae133601c819f5888407f0eb48006a7b7019b0fb3f0d7d7e7c
delefate.c
Posted Feb 11, 2000
Authored by teso

Delegate 5.9.x - 6.0.x remote exploit for Linux compilations

tags | remote
systems | linux
SHA-256 | 3ac439d6fef1daef6b26daf2115caeb6dfcdd0765feefc3734a19a6d5e9886a5
dirthy.c
Posted Feb 11, 2000
Authored by teso

linux tty hijacker

systems | linux
SHA-256 | 1a7d638efbe39f49605381b9cc11b12ec8770a89dae4e2f9abcf4464e3dcc29b
ifafoffuffoffaf.c
Posted Feb 11, 2000
Authored by teso

wuftpd 2.5.0 heap-based exploit

SHA-256 | c66bbfb8e83b185de65b90f0fbc1f1d1fc5a4716ed694916c9175686d5a745e2
libtermcapsploit.c
Posted Feb 11, 2000
Authored by teso

lame libtermcap sploit

SHA-256 | f015cdddacdb0e66de98f7c3c9494337480346b8db1aff3ac5d3b0ebd0a737f4
realown.c
Posted Feb 11, 2000
Authored by teso

unix-port of the RealSever exploit from dark spyrit

systems | unix
SHA-256 | 8777ef14ae1e7f0d00c28382575cff75282e02ece3177bcc2f414162b5042261
tesoiis.c
Posted Feb 11, 2000
Authored by teso

port of the eeye IIS4 exploit

SHA-256 | f227ce0cf8fa14ee3d614aa08127f35e77adeaae036e735393b18468ddc19589
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close