exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 31 RSS Feed

Files Date: 2001-04-25

gShield-2.4.tgz
Posted Apr 25, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Several run-time options added: gShield can now add clienthosts, highport access clients and blacklisted clients directly to the current ruleset and the permanent configuration. Security warnings added for recent FTP/RELATED issue, NOLOG now quietly drops broadcasts automatically, some kernel-specific ip-sysctl options are now configurable via gShield.conf (including ECN), documentation updated for new run-time options.
tags | tool, tcp, firewall
systems | linux, bsd
SHA-256 | 6e0b151af609001d14d4d8c76be5d1c72f2dfd20baa39f8b89a53cd1c49026f0
slsnif-0.3.0.tar.gz
Posted Apr 25, 2001
Site azstarnet.com

Serial Line Sniffer is a serial port logging utility. It listens to the specified serial port and logs all data going through this port in both directions.

Changes: Options to timestamp output and to print number of bytes transmitted added.
tags | tool, sniffer
SHA-256 | 87fe73581a4c74f6b432f345a1eec6e34037c6f08ebd20753a818eed18c92e08
fwmon-1.0.5.tar.gz
Posted Apr 25, 2001
Site sourceforge.net

fwmon is a firewall monitor for Linux which integrates with ipchains to give you realtime notification of firewall events. It has fairly customizable output, allowing you to display a packet summary, hex, and ascii data dumps to stdout, a logfile, or tcpdump-style capture files. It also boasts some simple security features such as the ability to chroot itself, and does not need to run as root.

Changes: Lots of bugfixes were made, as well as some documentation fixes. Plenty of testing was done. This version is stable.
tags | tool, root, firewall
systems | linux
SHA-256 | 09f707cab121a67dc9422dc939f863acbd2bcc94a414d389b3be0603120b9fb7
hfaxd-fs-exploit.pl
Posted Apr 25, 2001
Authored by Telehor | Site teleh0r.cjb.net

Hylafax (/usr/libexec/fax/hfaxd) format string local root exploit. Tested on hylafax-4.0pl2-2.

tags | exploit, local, root
SHA-256 | 27326b522b9dab8a30cd201131238bab6559ce649d75129f48fd4a1556aa0ffe
sentinel-1.2.1c.tar.gz
Posted Apr 25, 2001
Site zurk.sourceforge.net

Sentinel is a fast file integrity checker similar to Tripwire or ViperDB with built in authentication using the RIPEMD 160 bit MAC hashing function. It uses a single database similar to Tripwire, maintains file integrity using the RIPEMD algorithm and also produces secure, signed logfiles. Its main design goal is to detect intruders modifying files. It also prevents intruders with root/superuser permissions from tampering with its log files and database.

Changes: Sentinel-user for individual users has been added. The copyright has been changed to the FSF. This release also contains minor makefile updates.
tags | tool, root, intrusion detection
systems | unix
SHA-256 | 5fd4cedb481fb37ba5e0c4cedf76af09d5bb6fd958d27a817f21132886c5c9a1
openssh-2.5.2p2+SecurID_v1.patch.gz
Posted Apr 25, 2001
Site omniti.com

This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.

Changes: This release includes fixes for next token handling code. The patch is for OpenSSH 2.5.2p2.
tags | patch
systems | unix
SHA-256 | 8c85de6b8d937a46c60b6fad37711f51d73f43cd096bed407e03d37ddd76ffe9
IRCR.zip
Posted Apr 25, 2001
Authored by John McLeod | Site incident-response.org

IRCR is a collection of tools that gathers and/or analyzes forensic data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. It is similar to TCT by Dan Farmer and Wietse Venema, as most of the tools are oriented towards data collection rather than analysis. The idea of IRCR is that anyone could run the tool and send the output to a skilled Windows forensic security person for further analysis.

systems | windows
SHA-256 | e0179a471c10435d540525a98e8a6c71a962a84a61aab8615d91c7f78a95e659
Unisploit2.1.zip
Posted Apr 25, 2001
Authored by DarkWizard&Drakaz

IIS Unicode graphical exploit for Windows. This is an updated version of Unisploit1.0-FireLust which has more cool stuff.

tags | exploit
systems | windows
SHA-256 | 7001b497fb792bdfb74ef2a47fefe2e51fb5b4b9c317143fd9521347b0356319
ubt-scan.tar.gz
Posted Apr 25, 2001
Authored by G0ne | Site scrypt.net

Ubt-Scan is a simple extensible vulnerability scanner written in perl. Includes some external exploits.

tags | tool, scanner, perl
systems | unix
SHA-256 | 8fceb8d4ce40c0d4ab8ba10ca2da2ac254f05a1b0ad4b76887f1fc8e21a17672
ADMgetip.c
Posted Apr 25, 2001
Authored by ADM

ADMgetip.c

SHA-256 | 4cb93903b49c02f60fab9cba73cbd8b7c9699a172e0b77e39bb982d347b02741
FreeBSD Security Advisory 2001.38
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:38.sudo - The sudo port, versions prior to sudo-1.6.3.7, contains a local command-line buffer overflow allowing local users to gain root privileges on the local system.

tags | overflow, local, root
systems | freebsd
SHA-256 | ee17e318cbfabdca5e6419afbcd93bf8c6e4b3fa76924d4ad7175977535f0963
FreeBSD Security Advisory 2001.37
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:37.slrn - The slrn port, versions prior to slrn-0.9.7.0, contains a buffer overflow in the wrapping/unwrapping functions of message header parsing. If a sufficiently long header is parsed, a buffer may overflow allowing the execution of arbitrary code contained in a message header as the user running the slrn program.

tags | overflow, arbitrary
systems | freebsd
SHA-256 | 10eadabec9a8b1d16ad4939869c7126222596ddd4abf6d163d490a36532df582
FreeBSD Security Advisory 2001.36
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:36.samba - The samba ports, versions prior to samba-2.0.8 and samba-devel-2.2.0, contain /tmp races that may allow local users to cause arbitrary files and devices to be overwritten. Due to easily predictable printer queue cache file names, local users may create symbolic links to any file or device causing it to be corrupted when a remote user accesses a printer. In addition, the file will be left with world writable permission allowing any user to enter their own data.

tags | remote, arbitrary, local
systems | freebsd
SHA-256 | 83fe638951363ccd0063fc9691856f2ac00bfa75e1104a56acf4148f8d68d5c3
FreeBSD Security Advisory 2001.35
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:35.licq - The licq port, versions prior to 1.0.3, contains a vulnerability in URL parsing. URLs received by the licq program are passed to the web browser using the system() function. Since licq performs no sanity checking, a remote attacker will be able to pipe commands contained in the URL causing the client to execute arbitrary commands.

tags | remote, web, arbitrary
systems | freebsd
SHA-256 | aaa396a811cf768bab9589ce4c8251c23bc9dac97e476c3e35b94efa6a51e522
FreeBSD Security Advisory 2001.34
Posted Apr 25, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:34 - The hylafax port, versions prior to hylafax-4.1.b2_2, contains a format string bug in the hfaxd program. A local user may execute the hfaxd program with command-line arguments containing format string characters, gaining root privileges on the local system.

tags | local, root
systems | freebsd
SHA-256 | e2e3043bd622200fe9ab2ce74472e03447529ab973b612d2bc4f89be0afbfad5
Nmapnt.zip
Posted Apr 25, 2001

NMAP NT - eEye originally developed Nmapnt for Windows NT/2000 and had made it available in the past for download. Recently, eEye security no longer makes this program available and there does not seem to be any mention of anywhere else. No installation needed. Requires packet capture drivers, available here.

tags | tool, nmap
systems | windows, unix
SHA-256 | 9ef4874e10534cb7a123df8e2da277b5b26d25f6239b7af35874824068d68b8d
DRIVERS.zip
Posted Apr 25, 2001

Drivers needed to get Nmap for NT to work.

tags | tool, nmap
systems | unix
SHA-256 | 9e898fe9fee72f5275627bc4268072d508320b5a6000176d3df7c6bc25d796d8
debian.sendfile.txt
Posted Apr 25, 2001
Site debian.org

Debian Security Advisory DSA-050-1 - The saft daemon 'sendfiled' dropped privileges incorrectly allowing local users to execute arbitrary code under root privileges.

tags | arbitrary, local, root
systems | linux, debian
SHA-256 | d9bd5948da66d174226338dfd12fad63a17fc8ac455f311a4a83013e7f02c069
debian.netscape.txt
Posted Apr 25, 2001
Site debian.org

Debian Security Advisory DSA 051-1 - The Netscape browser does not escape the GIF file comment in the image information page. This allows javascript execution in the "about:" protocol and can for example be used to upload the History (about:global) to a webserver, thus leaking private information. This problem has been fixed upstream in Netscape 4.77.

tags | javascript, protocol
systems | linux, debian
SHA-256 | d245c1b069c66fda15f817b49e426623e5b1c185f8661043593be04be789060d
MSEC.single-user.patch.pkg.sit
Posted Apr 25, 2001
Authored by Marukka Der Inhaber | Site msec.net

The MSEC single-user patch disables the ability to boot into single-user mode under OS X. If this patch is not applied then anyone with physical access to the Mac OS X machine can gain root access easily by holding down the command and s keys at startup. The patch disables this by installing a modified version of /sbin/mach_init. The patch does NOT backup the insecure version of /sbin/mach_init so if for some strange reason you want to revert to the insecure copy of mach_init you must restore that file from your own backups. If you have any questions check our website at http://www.msec.net or email support@msec.net.

tags | web, root, patch
systems | unix, apple, osx
SHA-256 | 608ab66a3bdace92d180a2bce3e621367db4fbed4a386c2c3d85293c863151af
Hexyn-sa-19.txt
Posted Apr 25, 2001
Authored by T-Omicron | Site t-omicr0n.hexyn.be

Securax / Hexyn Security Advisory #19 - FTP Server Denial Of Service tested on Serv-U FTP Server, G6 FTP Server and WarFTPd Server. The servers will freeze for about one second, and the CPU usage will go through the roof. Includes perl exploit.

tags | exploit, denial of service, perl
SHA-256 | 2d2c1f7da07480b818ba73c4939a20bb83cb1d28705c9d63c332c2c8acb5f5fe
Hexyn-sa-18.txt
Posted Apr 25, 2001
Authored by T-Omicron | Site t-omicr0n.hexyn.be

Securax / Hexyn Security Advisory #18 - Savant WWW Server is an HTTP server for Windows 9x/NT. A bug allows any user to change to any directory, and in most cases, execute MS-DOS commands.

tags | exploit, web
systems | windows
SHA-256 | 6f737629eeb7c998b7477e842ffe7e837b20a277e54d231e927e0c33aa58dc9b
Hexyn-sa-17.txt
Posted Apr 25, 2001
Authored by T-Omicron | Site t-omicr0n.hexyn.be

Securax / Hexyn Security Advisory #17 - Bison FTP Server is an FTP server for Windows 9x/NT. A bug allows any user to change to any directory.

tags | exploit
systems | windows
SHA-256 | 51cbeefe5885ffa571c47f49a694aff56ebe3391b705e2d1ab287c0dd17fcb5a
Hexyn-sa-16.TXT
Posted Apr 25, 2001
Authored by T-Omicron | Site t-omicr0n.hexyn.be

Securax / Hexyn Security Advisory #16 - G6 FTP Server is an FTP server for Windows 9x/NT. A bug allows any user to change to c:\ and sub directories.

tags | exploit
systems | windows
SHA-256 | 43d9198ebb5fa6616439c99764fe5b23245afb02e05b085d7cf0550c2d427b77
cst1_3.tar.gz
Posted Apr 25, 2001
Authored by Toxic Ocean | Site blackhat.be

CST contains a script scanner, that scans using a database of scripts (user editable). The sample databases included contains +700 possibly vulnerable scripts/dirs. You can scan with or without a proxy server. The scanner has 11 different Anti-IDS tactics (hex-values, double slashes, self-reference dirs, parameter hiding and session splicing), and sends fake "X-Forwarded-For:", "Referer:" and "User-Agent:" headers to hide your scan even more. You can also specify a wait time between 2 script fetches. The scanner uses HEAD requests instead of GET for faster scanning, and has support for scanning virtual hosts. You can also specify another port to scan instead of the standard port 80. The scanner outputs the scripts/dirs that return a 200, 403 or 401 HTTP code and outputs the webserver software. A full and comprehensive manual is included.

tags | web, cgi
systems | unix
SHA-256 | 856e57db08f283a0a2df8d4ec62c30581e58231f2d536f8fafceed1d15ed67a1
Page 1 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close