what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files Date: 2000-12-03

qmail-scanner-0.94.tgz
Posted Dec 3, 2000
Site qmail-scanner.sourceforge.net

Qmail-Scanner, (previously known as scan4virus) is an addon that enables a Qmail Email server to scan all gatewayed Email for certain characteristics. It is typically used for its anti-virus protection functions, in which case it is used in conjunction with commercial virus scanners, but also enables a site to react to Email (at a server/site level) that contains specific strings in particular headers, or particular attachment filenames or types.

Changes: This release includes support for new anti-virus software, more language support, better documentation, and lots of bug fixes.
tags | virus
systems | unix
SHA-256 | 124ce699954f47a4ad622d28bac3e15b7b0b779bfa4478b4f3000b4a54835b89
debian.ethereal.txt
Posted Dec 3, 2000
Site debian.org

Debian Security Advisory - Hacksware reported a buffer overflow in the AFS packet parsing code in ethereal. Gerald Combs then found more overflows in the netbios and ntp decoding logic as well. An attacker can exploit those overflows by sending carefully crafted packets to a network that is being monitored by ethereal. This has been fixed in version 0.8.0-2potato and we recommend you upgrade your ethereal package immediately.

tags | overflow
systems | linux, debian
SHA-256 | 93f50aa785393b7baef6130cf1a2d807b98f2636af7cc8700005d24144d768a7
rkit.tar.gz
Posted Dec 3, 2000
Authored by Deathrow | Site deathr0w.speckz.com

Rkit is a backdoor based on blackhole.c which listens on a TCP port and requires a password.

tags | tool, tcp, rootkit
systems | unix
SHA-256 | a3124941b9cd2c830b6ca68a4cb058ebbd58ddf9da9fe6b3682fdcf6017971cb
freevsd-1.4.5-1.tar.gz
Posted Dec 3, 2000
Authored by Nick Burrett | Site freevsd.org

FreeVSD facilitates true Linux Virtual Servers within a 'chroot' environment, allowing Web servers and other applications to be deployed and administered discretely, without compromise to security. Each Virtual Server has its own IP address(es), Apache webserver, and view of the process table. FreeVSD expands the Linux system by creating a pseudo-'super user' (admin) for each Virtual Server. The admin user has the ability to create extra POP3/FTP and Telnet users and also administrate vital services such as the webserver.

Changes: Now supports OpenSSL! Also portability fixes, bugfixes, and documentation updates.
tags | web
systems | linux, unix
SHA-256 | e48052623b065d6b2bd38b85d3b0721e273a13c8ec359b973269e05d9232ca7e
CS-2000-04
Posted Dec 3, 2000
Site cert.org

CERT Quarterly Summary for November, 2000 - Since the last regularly scheduled CERT summary, issued in August (CS-2000-03), we have seen continued compromises via rpc.statd and FTPd. We have also seen a number of sites compromised by exploiting a vulnerability in the IRIX telnet daemon. Notable virus activity includes the Loveletter.as worm and the QAZ worm.

tags | worm, virus
systems | irix
SHA-256 | e8488c9895d8d674123d6fae983a30e4fa01369e7a25ab353192c987dd4546ee
cgiforum-1.0.txt
Posted Dec 3, 2000
Authored by Zorgon

CGIForum v1.0i (cgi-bin/cgiforum.pl) allows remote users to view any file on the system via a ../.. bug.

tags | exploit, remote, cgi
SHA-256 | 54a31d246b1ce0df322a76314cf66492c32c1c40d5388c5187fc9b897b0070fa
xp-bitchx.c
Posted Dec 3, 2000
Authored by RaiSe | Site netsearch-ezine.com

BitchX v1.0c16 remote exploit. Tested against Redhat 6.0, 7.0, and Debian 2.2.

tags | exploit, remote
systems | linux, redhat, debian
SHA-256 | f60db0f8af808e077c41cddcfbc5286c210560d141961d680824e2410e37b026
libc-language.su.c
Posted Dec 3, 2000
Authored by Doing

Glibc 2.1 + /bin/su local root exploit. Tested on Redhat 6.2, 6.1, and SuSE 6.2.

tags | exploit, local, root
systems | linux, redhat, suse
SHA-256 | 3b8551005bb76b0f86b59553d698f22a5a05b785634f1f4f7e8c60bdb0459e09
rhsa.2000-116-05.ethereal
Posted Dec 3, 2000
Site redhat.com

Red Hat Security Advisory - Ethereal prior to v0.8.14 allow remote root compromise.

tags | remote, root
systems | linux, redhat
SHA-256 | 08ce870b0a83f42cf086106e856eb6e7b15629e040e331549bfa6b3469222631
sqladv-poc.c
Posted Dec 3, 2000
Site atstake.com

Microsoft SQL Server Extended Stored Procedure remote proof of concept exploit. Affects MS SQL Server 7.0 and MS SQL Server 2000 for Windows NT 4.0 / 2000.

tags | remote, proof of concept
systems | windows
SHA-256 | 5fd70a776c270907c1dab025d719f1bc0ed94cb93096e57c8d76c639e5402a46
Atstake Security Advisory 00-12-01.1
Posted Dec 3, 2000
Authored by Atstake | Site atstake.com

Atstake Security Advisory A120100-1 - Microsoft's database server, known as SQL Server, contains several buffer overruns vulnerabilities that can be remotely exploited to execute arbitrary computer code on the affected system, thus allowing an attacker to gain complete control of the server. In situations where the SQL Server is protected by a firewall, it may still be possible to launch this attack through a connecting web server - though this depends on how secure the web server's application is. Proof of concept code available here.

tags | web, overflow, arbitrary, vulnerability, proof of concept
SHA-256 | 7a62c36595e25982e5eb61be78940b169d48a8771ddd9252d29796af5fbdf890
Atstake Security Advisory 00-12-01.2
Posted Dec 3, 2000
Authored by Atstake | Site atstake.com

Atstake Security Advisory A120100-2 - This advisory details multiple vulnerabilities in Microsoft SQL Server 2000 that allow an attacker to run arbitrary code on the SQL server in the context of a local administrator account. SQL Server provides a mechanism by which a database query can result in a call into a function called an "extended stored procedure". Several extended stored procedures supplied with SQL Server 2000 are vulnerable to buffer overflow attacks. Furthermore, in a default configuration these extended stored procedures can be executed by any user. Proof of concept code available here.

tags | overflow, arbitrary, local, vulnerability, proof of concept
SHA-256 | ec739fab767d599a0ee58f32f2ff762f3b6dfc21601af5994abc47bc96a9b5ec
sqladv2-poc.c
Posted Dec 3, 2000
Site atstake.com

SQL2KOverflow.c - This code creates a file called 'SQL2KOverflow.txt' in the root of the c: drive. Requires a SQL username and password.

tags | overflow, root
SHA-256 | fee58ba23f9c0ccef37684361da716327f6fff17eb2a15ff91fee59fd97842a4
suse.netscape.txt
Posted Dec 3, 2000

SuSE Security Advisory - SuSE Security Advisory - Two security problems exist in the netscape packages shipped with SuSE Linux distributions. The first one involves improper verification in Netscape's jpeg processing code that can lead to a buffer overflow where data from the network can overwrite memory. The second involves an error in the java implentation in Netscape where it is possible for an attacker to view files and directories with the priviledge of the user running Netscape if the user visits a maliciously crafted web site. Upgrade to 4.76!!! SuSE security site here

tags | java, web, overflow
systems | linux, suse
SHA-256 | 61dde4dec669baaf20d6eb539ece6a6596516754149c44442fa7f01e5e572dae
httpg.asm
Posted Dec 3, 2000
Authored by Orcrist | Site orcrist.box.sk

httpg.asm - uses the WinInet module to download and execute a file. Assembles to 432 bytes.

SHA-256 | f38ce51f52b56093fdca364765ddee243705e2e14c1c55218b8c4b800850df8b
ms00-091
Posted Dec 3, 2000

Microsoft Security Bulletin (MS00-091) - Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows NT 4.0 and a recommended workaround for Windows 95, 98, 98 Second Edition, and Windows Me. The vulnerability allows malicious users to pause networking or sometimes crash the entire system by sending a flood of specially malformed TCP packets to port 139. Microsoft FAQ on this issue available here.

tags | tcp
systems | windows
SHA-256 | ce5c2678c8cfc6835761849b44db34097dd30146db7d353cb1af43f7dc9c06ac
A-SnIf.c
Posted Dec 3, 2000
Authored by Asynchro | Site pkcrew.org

A-Snif is a simple packet sniffer, for learning.

tags | tool, sniffer
SHA-256 | 68ca08c3d245a3407496e7357066f73bae641a99f872879772ea1639cea1f8dc
ddb-sfe.tar.gz
Posted Dec 3, 2000
Authored by The Recidjvo | Site pkcrew.org

A backdoor that lets you to reach root/user account shells over tcp channel using a procedure of callback initialized by a ICMP packet.

tags | tool, shell, root, tcp, rootkit
systems | unix
SHA-256 | 40e1119a0fca835029b7c2e85d6c6ccbafd0692913e49dbf4cb0fc3fcd93b5e6
ddb.tar.gz
Posted Dec 3, 2000
Authored by The Recidjvo | Site pkcrew.org

A backdoor that allows you to keep remote access to a shell on a LAN protected by masquerading, getting rid of the inability for non public address to listen to a port reachable from the Internet.

tags | tool, remote, shell, rootkit
systems | unix
SHA-256 | 29be45ccba804fa0c6bfb2986291c1421597806abbb6a883bcab55b5e7b39b05
pcapture.tar.gz
Posted Dec 3, 2000
Authored by Cthuluh | Site pkcrew.org

Simple pcap dumper (just to learn on how to use libpcap).

tags | tool, sniffer
SHA-256 | a93ec3a12606796270a47d4527dbb14a533534642b2fd820eeabd953bd8ab9a2
Rial.c
Posted Dec 3, 2000
Authored by Technok | Site pkcrew.org

RIAL is a lkm based rootkit which can hide processes, files, directories, LKMs, connections and file parts. While some of these are present in a large number of lkms, connections and file-parts hiding are new ideas, or at least i couldn't find any lkm which had them. All the processes, files, directories and lkms containing in their name the string defined in HIDE are hidden. Reading from /proc/net/tcp is intercepted and read data is filtered to hide some connections.

tags | tool, tcp, rootkit
systems | unix
SHA-256 | 0f613b9d4f81d8b3f6acffc00433bc7a4e8b77ae76594327618483d6a1c8ee8f
hcl.tar.gz
Posted Dec 3, 2000
Authored by Asynchro | Site pkcrew.org

Host Control Library (hcl) implements dynamic host based control, Giving apps rsh-like trusting. Features the ability to learn and record a defined maximum number of hosts for users.

systems | unix
SHA-256 | 105ec761854e3c72f4132d42ce0543b589d559d2e638148f16cf6ed04be08913
4to6.tar.gz
Posted Dec 3, 2000
Authored by Cyrax | Site pkcrew.org

4to6ddos is a distributed denial of service against ipv6 that works without installing ipv6 support. It shoots ipv6 encapsulated in ipv4 packets directly to the ipv4-to-ipv6 tunnels.

tags | denial of service
SHA-256 | c0dbe725adf9a7ce51d22acf6661a36697b83d2a33a2cb06672b6a36c2282ce7
rf.tar.gz
Posted Dec 3, 2000
Authored by Cyrax | Site pkcrew.org

Route Faker adds an extra hop to the result when someone traceroutes to you.

systems | unix
SHA-256 | c6e6b154dd1329f3c79d0ba9667393dd5417727c101e0755563ff9d899054002
fpf.tar.gz
Posted Dec 3, 2000
Authored by Cyrax, FuSyS | Site pkcrew.org

FPF is a lkm for Linux which changes the TCP/IP stack in order to emulate other OS's TCP fingerprint. The package contains the lkm and a parser for the nmap file that let you choose directly the os you want.

tags | tcp
systems | linux
SHA-256 | bcc76c9851a69009bf74d505e657a312772e80b7ff657d12821a4290e44b1042
Page 1 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close