what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 49 of 49 RSS Feed

Files Date: 2000-02-11 to 2000-02-12

vwxploit.c
Posted Feb 11, 2000
Authored by teso

Interscan VirusWall 3.23/3.3 exploit (by dark spyrit, unix port by team teso)

systems | unix
SHA-256 | 6e4ace9f970b47cf9e7c89aa49783ea028b61de99eb7c9f46eadd4f27ccdf67f
3wahas.tar.gz
Posted Feb 11, 2000
Authored by teso

LAN based SYN flooder which spoofs SYN ACK packets too, allowing to bypass SYN-cookies ;)

tags | spoof
SHA-256 | d6389fa94812201d6f8fca90481cb40f46bb6c73c410787a5ce1da82267394a6
adv1.tar.gz
Posted Feb 11, 2000
Authored by teso

Linux 2.2.x ISN Vulnerability Advisory and Exploit

systems | linux
SHA-256 | 95d014e8e35cfb3ea836468f2d0ec0947af54f0e99ee6159d36fd319e86ea537
fizzbounce-0.2.tar.gz
Posted Feb 11, 2000
Authored by teso

maps connections over http proxies (connect/post)

tags | web
SHA-256 | dc368561a60718b2c86eab0648b63dfacbd087d351117745fe992804dc07207f
itunnel-1_2.tar.gz
Posted Feb 11, 2000
Authored by teso

ICMP tunneling tool

SHA-256 | eb69dd5115a31a163495e42fc528290756b7ee7479d53b654ec291d1613d9725
lamescan-1.0.tar.gz
Posted Feb 11, 2000
Authored by teso

simple threaded portscanner

SHA-256 | 05d9e68412a59bea9ac19171140afcd8cd7af676c709715056ec30e8160a277a
numby-0.2.tar.gz
Posted Feb 11, 2000
Authored by teso

scans for relay vulnerable http-proxies

tags | web
SHA-256 | 0217e2c40db864b44dbf94e852db56de3c54df0251c9c3e6ecba85ab1f101285
phoenix.tar.gz
Posted Feb 11, 2000
Authored by teso

shoots every TCP connection in LAN by spoofing TCP packets

tags | spoof, tcp
SHA-256 | 8589b1dbc478d59ca70a644dd12ba947f6d3e623293978c98abbb8f38880c556
phoenix2.tar.gz
Posted Feb 11, 2000
Authored by teso

like the first, but also spoofs the MAC address

tags | spoof
SHA-256 | 13a2aca18315249383442efd3f89eaeb95dc322d82b27c0363cce55805aa8bdb
reverb-0.0.2.tar.gz
Posted Feb 11, 2000
Authored by teso

maps passive to passive and active to active socket

SHA-256 | 9b0b143d11c78c83ef09a5b27cfaa3a4557cfe644edbcea6fa83a17f0552d976
zylyx-0.1.1.tar.gz
Posted Feb 11, 2000
Authored by teso

http proxy-cache file finder (goes through http proxies from a file and request a file)

tags | web
SHA-256 | 3f77732839bc07525ace63773abff4f555dcfbbdbc336f6add8768d1b19f7801
qpop-xtnd.c
Posted Feb 11, 2000
Authored by Portal | Site security.is

Linux x86 exploit for Qualcomm Popper 3.0b?? (was fixed silently) Remote, but requires username / password.

tags | exploit, remote, x86
systems | linux
SHA-256 | ee5bf46e3b23428524f1537aa6b73d69ca254a1b739cf8bccec5390219672ff9
fw1-ftp.txt
Posted Feb 11, 2000
Authored by John McDonald

FireWall-1 FTP Server Vulnerability Background Paper #1 - The basic idea of the described attack is to subvert the security policy implemented by a stateful firewall. This is done by triggering the generation of a TCP packet that, when inspected by the firewall, will change the firewall's internal state such that an attacker is able to establish a TCP connection to a filtered port through the firewall. This packet is the server response to a PASV user request during a FTP session.

tags | exploit, tcp
SHA-256 | fcb6f48f31d6598b702db1e3ab3a2478a63a0a80c8c9de809337c6e185b65a4a
asp.runtime-error.txt
Posted Feb 11, 2000
Authored by Jerry Walsh | Site jwsg.com

Active server pages (ASP) with runtime errors expose a security hole that publishes the full source code name to the caller. If these scripts are published on the internet before they are debugged by the programmer, the major search engines index them. These indexed ASP pages can be then located with a simple search. The search results publish the full path and file name for the ASP scripts. This URL can be viewed in a browser and may reveal full source code with details of business logic, database location and structure.

tags | exploit, asp
SHA-256 | 8df08f77a97c4061a43c01be319e5ef4511a09240fd42e5c021cd65c36a798af
cfing.c
Posted Feb 11, 2000
Authored by Babica Padlina

Cfingerd 1.3.3 (*BSD) local root buffer overflow exploit.

tags | exploit, overflow, local, root
systems | bsd
SHA-256 | 5097329aa98ef60c423e4f68641079c5f39fc54d6c9cb6c8ce27b39693f13f56
doscmd.c
Posted Feb 11, 2000
Authored by Babica Padlina

FreeBSD 3.4-STABLE /usr/bin/doscmd local exploit.

tags | exploit, local
systems | freebsd
SHA-256 | 240aafd27efd7ec32f33b54c6a35ce6df301d9a00e9f637b34305726c91908ba
twinge.c
Posted Feb 11, 2000
Authored by Sinkhole

Crashes almost any Windows box on your local network. Compiles on linux. Cycles through many different types of ICMP packets.

tags | exploit, local
systems | linux, windows
SHA-256 | 2575111d1cf5e36392a4463a57706b1b04889b8ee26fbe68c73a9d0a0787c259
umount.c
Posted Feb 11, 2000
Authored by Babica Padlina

FreeBSD 3.3-RELEASE /sbin/umount local exploit.

tags | exploit, local
systems | freebsd
SHA-256 | 05c1e68a23b63191f9b39ac50e86987af8789d42d2f9bc5feda53505bfd8947e
fw1-pasv.txt
Posted Feb 11, 2000
Authored by Mikael Olsson | Site enternet.se

It is possible to cause certain firewalls to open up any TCP port of your choice against FTP servers that are "protected" by those firewalls. This is done by fooling the FTP server into echoing "227 PASV" commands out through the firewall. Firewall-1 v3 and v4 are known to be affected.

tags | exploit, tcp
SHA-256 | 02813345d04b4c54a9270f3a6f8c304ab46a80dcf60f14aab96e9458dbf927dd
anywhere-3.1.3.txt
Posted Feb 11, 2000
Authored by Nobuo Miwa

Anywhere Mail Server Ver.3.1.3 for Windows contains a remote DoS vulnerability, via a long RETR string over port 110. Also multiple connections will kill the sendmail server.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 898ce037d5ae22060272023db6f516430cb43637744b94e23045e20f85dc5447
mousemove.zip
Posted Feb 11, 2000
Authored by Cash4All Admin | Site members.xoom.com

Moves your mouse every specified period of time. Can be very useful for things that check this, like free internet service.

SHA-256 | 9506274dadf30521ee5544dc26e366348d66d98a21c3ea92ee3409c2a4a4a4f4
NTOMax10.zip
Posted Feb 11, 2000
Authored by JD Glaser | Site ntobjectives.com

NTOMax v1.0 - A scriptable, server stress testing tool.This tool takes a text file as input and runs a server through a series of tests based on the input. The purpose of this tool is to find buffer overflows and DOS points in a server.

Changes: Trial parameter lets you view the buffer to be sent w/o sending it, verbose toggle, norecv parameter, and reopen parameter. This version fixes many timeout errors users were getting.
tags | overflow
SHA-256 | 67706ebf49993f04d67f291331b9d20efa84b717acc0cb97a856eec2bbf2198b
tinc-0.3.3.tar.gz
Posted Feb 11, 2000
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: A fix for a problem when using kernel 2.2.14 or the newer 2.3 kernels where packets would not be accepted when using the wrong MAC address. The documentation has been updated with instructions on how to correctly set it up, and an example configuration of a VPN using tinc.
tags | encryption
SHA-256 | 0c3927343a479fa72bd2ab10d2f20f6f71997769f5aa3400d908043679b6baf5
cisco-newsflash.htm
Posted Feb 11, 2000

Cisco Newsflash - Distributed Denial of Service. Contains information to help you understand how DDoS attacks are orchestrated, recognise programs used to launch DDoS attacks, and apply measures to prevent the attacks (including anti-spoofing commands, egress filtering, RPF and CEF, ACL's, rate limiting for SYN packets). Also contains information on gathering forensic information if you suspect an attack, and learning more about host security.

tags | denial of service, spoof
systems | cisco
SHA-256 | 5706e76198a9513e1ab2858df9480fb5b1c60bd30defbb8002e77823fa329be8
Page 2 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close