exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 1999-10-15

lids-0.1-2.2.12.tar.gz
Posted Oct 15, 1999
Authored by Xie Hua Gang

lids is an intrusion detection system patch for the Linux kernel; it can protect important files from being changed. When it's in effect, no one (including root) can change the protected files or directories and their sub-directories. First release.

tags | kernel, root
systems | linux
SHA-256 | 876cfbda1720c31debfa343471e807d720b478388d1840e06c0a90c0be175976
Packetx1.zip
Posted Oct 15, 1999
Authored by JD Glaser

PacketX 1.0 is a native Windows NT firewall testing tool that allows for complete TCP/IP packet creation. It creates packets to be 'fired' at a firewall in validation tests so that firewall rules can be confirmed. PacketX[tm] contains complete TCP/IP packet spoofing technology in order to verify the approval/denial of internet domain address against firewall ACL's. Freeware version.

tags | spoof, tcp
systems | windows
SHA-256 | 4c35e611d93dad2d380a1e9f3e54a132c151acf2d5fc5d0e14e626923b7725b3
yaws.c
Posted Oct 15, 1999
Authored by Tempus Fugit

Yet Another Wingate Scanner (YAWS) Version 0.1.

tags | tool, scanner
SHA-256 | 1e321a08d3f5472a712fdfbdbbb470dd8f42a2f100e6e751422294ebac6dcf44
ms99-042
Posted Oct 15, 1999

Update to ms99-042, released Oct. 15. Updated patch availability. The IE 5 security model normally restricts the Document.ExecCommand() method to prevent it from taking inappropriate action on a user's computer. However, at least one of these restrictions is not present if the method is invoked on an IFRAME. This could allow a malicious web site operator to read the contents of files on visiting users' computers, if he or she knew the name of the file and the folder in which it resided. The vulnerability would not allow the malicious user to list the contents of folders, create, modify or delete files, or to usurp any administrative control over the machine.

tags | web
SHA-256 | 368f46701e13ab6e23ee4e12a95583ca7ffd7eacdd5e56b4c0404fe1899040db
SCOUNIX_shadow_exploit.txt
Posted Oct 15, 1999
Authored by Brock Tellier

Any user may overwrite any file with group auth (i.e. /etc/shadow, /etc/passwd) using /etc/sysadm.d/bin/userOsa.

tags | exploit
SHA-256 | efdff100c4986b360fdb21f715839b67fb3d8d0b39aa721df77706513060b1a7
SCO_OpenServer_exploit.txt
Posted Oct 15, 1999
Authored by Brock Tellier

An overflow in /opt/K/SCO/Unix/5.0.5Eb/.softmgmt/var/usr/bin/cancel which will allow any user to gain lp privs.

tags | exploit, overflow
systems | unix
SHA-256 | 9a4e597b84c8c1eb31bb630c9cc574cac8e99b62e17a606be42a39e44a6790f1
RDS_exploit.txt
Posted Oct 15, 1999
Authored by rain forest puppy

Windows 95 updated RDS exploit.

tags | exploit
systems | windows
SHA-256 | 149a610621db59471d4420731c09658ea691396164cc0d8d1ac34ce2e22ef793
IE5_IFRAME_vuln.txt
Posted Oct 15, 1999
Authored by Georgi Guninski

IE 5.0 vulnerability - reading local (and from any domain, probably window spoofing is possible) files using IFRAME and document.execCommand. Includes exploit. Demonstration code Here.

tags | exploit, local, spoof
SHA-256 | 9675de24df2217c21e2f6231a2c519019a809807235ded9783257956a7c2f796
Finjan_Exploit_Alert.txt
Posted Oct 15, 1999

WinNT.Infis is an executable file with .EXE extension that installs itself as a native Windows NT system driver. Alert from Finjan

tags | exploit
systems | windows
SHA-256 | 23e7fbdac27458b692f699f8b02855358119285d3d4e180ca6f8cd287273b70a
telnet_toy.c
Posted Oct 15, 1999
Authored by Palante

multithreaded telnet toy first seen on palante's DefCon 7 CTF server. Waits for a incoming connection, port scans the source IP, and forwards the tcp connection back to one of the open TCP ports on the source IP.

tags | tcp
systems | linux
SHA-256 | 3fe5fbb7e8645bc3f727dd1d289575575ded8656f7a9147c5a91414d5c07a22c
Nashuatec_printer_vulns.txt
Posted Oct 15, 1999

The NASHUATEC D445 printer is vulnerable to many attacks

tags | exploit
SHA-256 | 394d23effdf942f93c8f35952664715426d28a4501b41528f8f01ed69afed5fc
veganizer-0.03.tar.gz
Posted Oct 15, 1999
Authored by Francisco Roque

The Veganizer is a spam counter-attack. It searches the headers of a specified message for all associated IPs and Domains, then sends mail to pre-specified addresses at those servers (abuse@, postmaster@) as well as addresses found by a whois query on the IPs/Domains. The mail sent will also include the original message with full headers.

systems | unix
SHA-256 | 269eb9c4b6ca3f3682eadc3e191298bd93cccb8ccb1c7946fd5bdd3d79c2675d
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    73 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close