HWA-warpcrash - Systems Affected: OS/2 Warp 4.5 FTP server V4.0/4.2, OS/2 Warp 4.5 FTP server V4.3, Probably other versions of the software as well. Problem: The FTP server that comes with OS/2 Warp 4.5 TCP/IP can be brought down by a malicious connection attempt.
cf8fada37f8c1613e87c090555684cc0f5c51d3e63815104a2e3e47aeb5420ca
Advanced Socket Bouncer (ASB) is another kind of network tool. It supports IPv6 (detects automatically IPv6 hostnames/addresses), SQUID (connect method and SQUID with SSL support but no SSL proxy), SOCKS4, SOCKS5, and WINGATE.
6d8e284992b078fd77ad8910e57bfa57dc3b6d034d5c043f4f19e4b8a0ca1ec0
NT Blackhat paper is a beginner's document about NT-security. This document describes pretty well what malicious hackers exactly do when they attempt to hack your NT servers. Although it was meant for beginners, it is still suitable for novices, and maybe even experts who wants to read and maybe learn something that they didn't know.
9bc5d341b00d97d30115a560879c0f9fc3e6fb8f23278feb1eb19a1b0910fd73
This paper is the culmination of research that describes the DOCSIS standard and related information for the purpose of explaining exactly how cable networks (@home, RoadRunner, Mediaone) are implemented from the service provider to the home. This includes details on the cryptography used, the frequencies data is transmitted on, and hardware explanations. A recommended read for anyone interested in cable-modem networks.
a51266d77a22f525901cc0fb9b1e1e1f03cceb95d47d9b1cece1ab5b319bfd5d
CIMcheck.exe is an exploit for the Compaq Insight Manager root dot dot bug. The remote webserver must be running NT with port 2301 open. The exploit opens up the full vulnerable url and attempts to get the sam._ backup password file from the remote repa ir directory. You can specify which file you want to download, default is the /wi k nnt/repair/ directory and the sam._ backup password file. Perl2exe binary. Perl2exe binary available here here.
02f9d096afa81c2dcbbf3f8bb5609cd6012765d85d04dbbebd34e50597b3e154
PocketC program to dehash the admin password for FlowerFire's Sawmill 5.0.21 log analysis package. This has been written, compiled and tested on my palm IIIxe. Takes a few seconds since the hash is so weak.
0aa155e7517924fa800b7c6c2d61993936bdde7128b24b1b64a1311803519fd9
CIMcheck.exe is an exploit for the Compaq Insight Manager root dot dot bug. The remote webserver must be running NT with port 2301 open. The exploit opens up the full vulnerable url and attempts to get the sam._ backup password file from the remote repa ir directory. You can specify which file you want to download, default is the /wi k nnt/repair/ directory and the sam._ backup password file. Perl2exe binary.
5544d2db9c8dc0786db03c0333204f82c3ce81f66faa47a4e2eca3e446cb972a
Debian Linux Security Advisories - The version of X-Chat that was distributed with Debian GNU/Linux 2.2 has a vulnerability in the URL handling code: when a user clicks on a URL X-Chat will start netscape to view its target. However it did not check the URL for shell metacharacters, and this could be abused to trick xchat into executing arbitraty commands. This has been fixed in version 1.4.3-0.1, and we recommend you upgrade your xchat package(s) immediately.
92ea17ad4b9f5d402e151a4484533f7e07caad18dba33aa33f837e36d1ba8144
-Web Application Security Survey- Results show that Microsoft Hotmail, Excite, Altavista, E-Bay, Lycos, Netscape WebMail, E-Trade, Infoseek/Go.com and their users are all currently vulnerable to web based attack. The following report is the result of a two hour security survey of high profile webmail and auction services offered free over the internet. This survey is in no way extensive or thorough. It serves only as "proof of concept" that these types of services are vulnerable to attack on a wide scale. All the following vulnerabilities are currently active as of Aug. 25, 2000. The following webmail vulnerabilities all stem from the same problem. The attacker has the ability to pass unfiltered malicious HTML/JavaScript into the target users web environment.
0816d0752bc9ca5d7c49022abbc5dabc570e44109e381d1ba13966b6b2106a36
Fpage-DoS.pl - Info based attacks DoS Front page. To exploit this vunerability you must have the extensions "/ _ vti_bin/shtml.exe in your server. This is a demonstration script to remotely overflow various server buffers, resulting in a denial of service, for TESTING purposes only. Runs on *nix & Windows with perl.
fd30db3d59fb11eebed664de7828aa72bf38858d22179822a5620979f47adbd7
Debian Security Advisory - Using ntop to distribute network traffic through the network, i.e. running ntop as webserver, it is possible to access arbitrary files on the local filesystem. Since ntop runs as root uid, guess what that means, even /etc/shadow got unsecured.
46903f38c37d51ae42ab5e007449f7c7e49a1b6750c646d43af71efc518dbca6
This decrypts the safe passwords of NcFtp
1456100cf9a8fdbad6da475d328a766118e6fa62d942b9ddef1a6d3d0bb7d718
This is an exploit that explores the vulnerability of the versions 2.4.4, 2.5.0 and 2.6.0 of Wu-ftpd. Written in Portugese.
c26bee1cd2d462edde38575ca8ae2a80b30398e106409a54ccc6ef6a98fdf6e8
This scanner scans to see if a certain host or IP is vulnerable to the Wu-ftpd 2.6.0 bug. Written in portuguese.
ae964328b738ae8d1db754f190ae243c054607cd19ca7ebdc57fda7af06acd81
A simple flaw in the web mail service offered by Critical Path (www.cp.net) allows an attacker to gain full access of any webmail account. The attack falls under the umbrella of cross-site scripting, which was addressed in detail by CERT in their advisory CA-2000-02, entitled "Malicious HTML Tags Embedded in Client Web Requests." The bug is aggravated by an defective session token scheme.
89bcdeb0f24a910c4dcaa633ef6aa1a288acd34b4f9b1497078ed75916af2589
Purge-it is a Windows utility that allows the end-user to take a look inside a system, see what programs are running, which ports are open. The user chooses what happens to the system, and can remove various malware such as backdoors, trojans and spyware.
cc99629eb0ad61bcd96e60e7a7d3dbec3017a2c6eff89af68a1cfc674252c312
Microsoft has released a patch for a security vulnerability in Microsoft Money. The vulnerability could allow a malicious user to obtain the password of a Money data file. Frequently asked questions regarding this vulnerability and the patch can be found here
310762eaf43db128fe3dfe2d41bd2696eb5dbb85dfc00088d883c08c9f12646a
The Javaserver Webserver Development Kit (WDK) v1.0 contains a .. vulnerability allowing remote attackers to read any file on the system with the permissions of the webserver. The server typically resides on TCP port 8080 and instructions for identifying this server are given.
8515eea65683688bde7181a502762ac58e5f98c78c8520653bfa290922c6ef5e
vqServer version 1.4.49 is vulnerable to a denial of service attack by sending a malformed URL request. Tested on Windows version. The latest edition of vqServer (1.9.47) is unaffected.
50488cee02fca807a8ce6e2060e9884bc802b907abd649fbdd372b9c7f8b7fae
Secure Files 0.1b is a security tool that checks system integrity by comparing the MD5 checksums of flagged files against their earlier recorded checksums.
caad669b0b465c73e0613d69b59ad4a8753e02d3a078318bc637439fcf97fe34
ICMPSpewf is a simple tool that allows you to spoof the source of any of the ICMP packets listed in ip_icmp.h
3424a0d35ca16af9325efab0bdaf545d61bc2802ab22396ed335a0952746dda2
Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: The FrontPage Server Extensions are vulnerable to a remote denial of service, a buffer overflow memory problem in the rpc module of the Pragma TelnetServer 2000, webserver Pro 2.3.7 vulnerability, Mandrake Linux Xchat update, ld.so problem that allows local users to obtain super user privilege, IIS Cross-Site Scripting patched, Microsoft Money password vulnerability patched, MGetty local compromise, and Kerberos password authentication issues.
41a3d0d05b3290fcc821f93f043a30e580de167d85445843559dbda0f11021ee
FreeBSD Security Advisory FreeBSD-SA-00:43 - The brouted port is incorrectly installed setgid kmem, and contains several exploitable buffer overflows in command-line arguments. An attacker exploiting these to gain kmem privilege can easily upgrade to full root access by manipulating kernel memory
11e91750b070a2da94c3d5310490bb38f633a7be33705f3f6dee2e94d8eca474
FreebSD Security Advisory FreeBSD-SA-00:42 - The linux binary-compatability module implements a "shadow" filesystem hierarchy rooted in /compat/linux, which is overlayed against the regular filesystem hierarchy so that Linux binaries "see" files in the shadow hierarchy which can mask the native files. Filenames in this shadow hierarchy are treated incorrectly by the linux kernel module under certain circumstances, and a kernel stack overflow leading to a system compromise by an unprivileged user may be possible when very long filenames are used. ~
17e4a4ac716ec87e9f9ec1303ae1ee1e09d2c29f571974e1f8d434cb3024a5d1
floppyfw is a router and simple firewall on one single floppy. It uses Linux basic firewall capabilities and have a very simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It has a simple installation, mostly only needed to edit one file on the floppy.
740e90710fcfcc2a2606b81d3715be69d3a20eb83c3fc2f37fa85cbfe9c1b276