exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-05-28

sysmsg.pl
Posted May 28, 2004
Authored by mu-b

Simple UK GSM mobile network mail-bombing utility.

systems | unix
SHA-256 | fa1c075f2a2f366d0d4b7b0e0c7a3091066aaa7868feb157fd2a0044ab8735ca
nbtstat.pl
Posted May 28, 2004
Authored by Jimvin | Site watersheep.org

nbtstat.pl is a simple Perl script that provides the basic functionality of the nbtstat utility that is available on Windows. It grabs the NetBIOS name table from a remote machine. This is a Perl port of eSDee's nbtstat.c (http://www.netric.org/tools.htm), written with portability in mind. It only requires Perl and the IO::Socket module.

tags | tool, remote, web, scanner, perl
systems | windows, unix
SHA-256 | 13166a14ceb220484c98d39013a6a4c0060355f3bb85f104f1f59e07c7141da8
WifiScanner-0.9.4.tar.gz
Posted May 28, 2004
Site wifiscanner.sourceforge.net

WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.

Changes: Various code clean ups and fixes.
tags | tool, wireless
systems | linux
SHA-256 | 16751fe94097aa634d7d4fe4759ee5cfc710cf6685c825ca389f2f27494305d6
tacshell-0.91.tar.gz
Posted May 28, 2004
Authored by Christopher SEKIYA | Site rezrov.net

tacshell is a drop-in replacement for sdshell, the functionality used with RSA's ACE/Server. It uses the TACACS+ protocol for authentication.

tags | tool, protocol
systems | unix
SHA-256 | ede71e0999d7bfd053f9057721f96d6f11df13cf7aa73e4d659afe677f8e6f14
csr-exploitation.pdf
Posted May 28, 2004
Authored by SolarIce | Site covertsystems.org

Tutorial written by Covert Systems Research. It defines several of the common types of vulnerabilities together with their counterpart command line exploit sequences. The descriptions of these types of vulnerabilities range from stack to heap, function pointer and format string weaknesses. This whitepaper has been developed to help those seeking to improve their exploitation skills while also aiming to give the reader the knowledge for a more surgical aspect to manipulating vulnerable programs.

tags | paper, vulnerability
SHA-256 | df7d9d5f892763880a05d4e45b7e6b4aa2abc083b26886bb80971593a3d97615
wildtangent.txt
Posted May 28, 2004
Authored by Peter Winter-Smith | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR27052004 - It is possible to cause a number of buffer overruns within the WildTangent WTHoster and Web Driver modules via any method that takes a filename as a parameter. Version 4.0 tested and others are possibly affected.

tags | advisory, web, overflow
SHA-256 | 1fd4a6d0da967ff355c42ac21d6118964e275521cf330235468cd3d7fe398cc5
sunjavaapp.txt
Posted May 28, 2004
Authored by Marc Schoenefeld

Sun-Java-App-Server PE version 8.0 suffers from a path disclosure vulnerability when returning server error 500 pages.

tags | advisory, java
SHA-256 | 80f7cd44aca210a567313a3abe3eec919dc378cf120eb973210189e875ca9082
Technical Cyber Security Alert 2004-147A
Posted May 28, 2004
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA04-147A - A heap overflow vulnerability in the Concurrent Versions System (CVS) could allow a remote attacker to execute arbitrary code on a vulnerable system. Systems affected: Concurrent Versions System (CVS) versions prior to 1.11.16. CVS Features versions prior to 1.12.8.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2004-0396
SHA-256 | eb076a8b5b46b1ff5cdb1e09fb7058dfaf0b977564279a22443f627e735d5bc8
SSRT4724.txt
Posted May 28, 2004
Site support.openview.hp.com

Use Of TCP/IP Reserved Port Zero Causes Integrated Lights-Out (iLO) To Stop Responding. LAN management products that use port zero when accessing an Integrated Lights-Out (iLO) in a ProLiant server will cause iLO to become unresponsive. Port zero is specified as a reserved port by the Internet Engineering Task Force (IETF) and should not be used.

tags | advisory, tcp
SHA-256 | 89bf8595009c96fdcd64a1994970dee44c3b8ddbf57df3ebd1eaf1ce3c2b6205
minishare132.txt
Posted May 28, 2004
Authored by Donato Ferrante | Site autistici.org

MiniShare HTTP server version 1.3.2 is susceptible to a denial of service attack due to mismanagement of requests. If a HEAD or GET request is sent with only one line following it, the server will crash.

tags | advisory, web, denial of service
SHA-256 | 5c8714016e397698c8a92f9d1d06a4284a4966ce9ff23ddb246c6e039dd72d94
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close