what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2001-03-19

lids-1.0.6-2.4.2.tar.gz
Posted Mar 19, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: This release includes an inheritable level (TTL) feature, modifications to the inheritable routine in do_fork() and do_execve(), updates to the lidsadm and lidsadm man pages, a parent pid in lids security alert message, and some code clean-ups. Changelog available here.
tags | kernel, root
systems | linux
SHA-256 | cbaab72e4f20d696eea4e7251c3a4edfe3d75660587798d51395378d701d87e6
xscreensaver-3.30.tar.gz
Posted Mar 19, 2001
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: New hacks - molecule, dangerball, and rotzoomer, a new version of "gflux", the ability to have "gltext" display the current time, and bug fixes.
tags | root
systems | unix
SHA-256 | 363307e21737a48b4ca59bded453f00008e46fa84e58c6f349f30e4110dcca81
OW-003-ssh-traffic-analysis.txt
Posted Mar 19, 2001
Authored by Solar Designer | Site openwall.com

Openwall Advisory - Passive Analysis of SSH Traffic. This advisory demonstrates several weaknesses in implementations of SSH protocols. When exploited, they let the attacker obtain sensitive information by passively monitoring encrypted SSH sessions. The information can later be used to speed up brute-force attacks on passwords, including the initial login password and other passwords appearing in interactive SSH sessions, such as those used with su(1) and Cisco IOS "enable" passwords. All attacks described in this advisory require the ability to monitor (sniff) network traffic between one or more SSH servers and clients.

tags | paper, protocol
systems | cisco
SHA-256 | bfeb7cdafd8058c9afd04d84449f245f170f6508d8227c5fdcf97b1a9b102c98
vv5.pl
Posted Mar 19, 2001
Authored by Georgi Guninski | Site guninski.com

IIS 5.0 / Windows 2000 WebDAV remote denial of service exploit - Sends a specially crafted request, as described in MS01-016.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 025cc976603fe7243eaee030053fb6e90d63847d20684126b98f538d5ccadbca
freebsd.execve_binsh.c
Posted Mar 19, 2001
Authored by Marcetam

FreeBSD 23 byte execve code.

tags | shellcode
systems | freebsd
SHA-256 | 5297d7b01c14324cdd6cab82dc510abfbfc8418025d9ca092cd05332f6d6e238
n82x.c
Posted Mar 19, 2001
Authored by Ix, Lucysoft

Named v8.2.x remote root exploit - Uses the tsig bug. Only includes linux shellcode.

tags | exploit, remote, root, shellcode
systems | linux
SHA-256 | d5e607468e5db97a21778c60ad95951a67c88c8da40feb92ff587708b01bae99
glob-abuse.c
Posted Mar 19, 2001
Authored by R00T-dude

This code exploits a bug in the glob() function used in some ftpd's (like proftpd, netbsd ftpd, iis ftpd). It sends a 'ls' command for which will take up about 100% of a systems memory, creating a very effective dos.

tags | exploit
systems | netbsd
SHA-256 | 7f1cdb3862da20f5231d975f2a3cbd7fb8960b8beeaf13ca49ae65058f1a1479
apachebd.tgz
Posted Mar 19, 2001
Authored by venomous

Apache backdoor - Backdoors apache 1.3.17 / 1.3.19 to spawn a root shell when a certain page is requested.

tags | tool, shell, root, rootkit
systems | unix
SHA-256 | e698c564d4808ff114e58bf39b34e7af99192e7dd9bcc390a7b4266e71965926
MDCrack.zip
Posted Mar 19, 2001
Authored by Goldie, checksum | Site checksum.org

Win32 port of MD5Crack.

systems | windows
SHA-256 | 0bb1c55e2cdc8f43131518137fdd9b3a519365af7903c0af8020c013deffa344
ftpsed.pl
Posted Mar 19, 2001
Authored by Speedy | Site dutchriot.com

ftpsed.pl is a perl script which exploits a denial of service vulnerability in Proftpd v1.2 and below. Requires a username and password.

tags | exploit, denial of service, perl
SHA-256 | 697c7292c32b0c1b43a2055599df28cd1aac80583e074fdfabc4a4b2853e3725
joe28.c
Posted Mar 19, 2001
Authored by Fides

Joe 2.8 local exploit - Requires sysadmin intervention. Tested on FreeBSD 4.2-Release.

tags | exploit, local
systems | freebsd
SHA-256 | f9e4feab1aeef09555b1b33372679785c883b5a1fe388035f561b68cdbce1373
StJude_LKM-0.10.tar.gz
Posted Mar 19, 2001
Authored by Tim Lawless | Site sourceforge.net

Saint Jude LKM is a Linux Kernel Module for the 2.2.0 and 2.4.0 series of kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.

Changes: This is the most stable version yet. Tested with kernel 2.4. Added Learning Parser to facilitate the generation of the Rulebase from the Learning Mode output. Combined with the Override directive, remote root attacks may be thwarted.
tags | remote, kernel, local, root
systems | linux
SHA-256 | f7f922f8f16946ab95f37c07600d7d52e13c7d3e3b2865374f613ca83947a95c
StJude_LKM-0.07.tar.gz
Posted Mar 19, 2001
Authored by Tim Lawless | Site sourceforge.net

Saint Jude LKM is a Linux Kernel Module for 2.2.0 and greater kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local, and ultimately, remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work equally well for both known and unknown exploits.

Changes: Fixes problems on some of the newer Linux distributions. Makefile can now find include files better.
tags | remote, kernel, local, root
systems | linux
SHA-256 | c105819d64f6618d2359f51876d4b6557c65033cc7bb9236e94192f35a1f1e23
logplay-2.0-nosounds.tgz
Posted Mar 19, 2001
Site projects.babblica.net

Logplay is a sound-capable alert system with a modular design. It can monitor system logs, load averages, network connectivity, and is modular to support user-specific monitors. Logplay alerts the user via a sound (using anything Sox's play script understands), an e-mail, or system commands. It should run on almost any *nix system, or any system that has Perl, given that you can run it in the background and you write a module.

Changes: This is the first stable release, featuring a fully rewritten codebase with a modular approach and an extensive reworking of everything. There are currently 3 monitoring and 3 output modules, and even includes instructions on creating your own.
tags | perl, system logging
systems | unix
SHA-256 | 81716dcb4f91ce68a1dbfbeff61585a3fc2553f70d0edda0ffb5643a161688b8
fwipe-0.30.tar.gz
Posted Mar 19, 2001
Authored by Len Budney | Site pobox.com

fwipe overwrites your file a specified number of times (default: 5) and then deletes it. It is extremely secure; it will not be confused by filenames containing special characters, and is suitable for use against law enforcement.

Changes: A new "slowness" feature has been added to ease console "freezing" during large wipes.
systems | unix
SHA-256 | fee232d53a5cc6244852f216e41d1e0b4976221f14a16c93e40c90ae6c7eaf0f
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close