what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-05-12

seawall-3.0.tar.gz
Posted May 12, 2000
Authored by Tom Eastep | Site seawall.sourceforge.net

Seawall is an ipchains firewall that supports IP masquerading and can be used on a standalone system, on a dedicated firewall system or on a multi-use gateway/server. It supports VPN via IPIP tunnels and PPTP, has an easy to edit configuration file, and can be extended without modifying the base product. It also includes realtime monitoring with an audible alarm that sounds when suspect packets are detected.

Changes: New major release - Rewritten instalation script, updates are easier due to a second config file. Support for port forwarding, DMZ's, and PoPToP has been added, in addition to extensive documentation updates.
tags | tool, firewall
systems | linux
SHA-256 | c1e6b2a02f93a60cebb23853b7ab0496b72b1f0ab32f9250764cc4032875da8b
wpc-0_2b.tar.gz
Posted May 12, 2000
Authored by g1soft | Site members.xoom.com

WPC is a simple application that tries to guess usernames and passwords for password-protected web pages. This security tool is intended for webmasters.

Changes: Filters for specific http responses, improved http code, "configure" script tweaks.
tags | web
SHA-256 | 0a8216de126db4914a192cc687ed30f96963ee3768b34ef4e60d1edd74ff187a
pyro12.c
Posted May 12, 2000
Authored by Putois | Site asmbeginer.com

Pyro Scanner v1.2 scans for many web / cgi vulnerabilities and has the nice feature that it displays the server output so you can see what is really going on.

tags | tool, web, cgi, scanner, vulnerability
systems | unix
SHA-256 | 9ddc2b2e6e743728c84328afe7c7c42c29b91cf9abe474e97437c54bf302bf8d
nis-spoof.c
Posted May 12, 2000
Authored by Trevor Schroeder | Site zweknu.org

nis-spoof.c spoofs the response from a NIS server to a client.

tags | exploit, spoof
SHA-256 | e767ec14fcd1d8828d2216e5f793b7001d6f722f8cd0bbb2330dd185eed139b3
labs40.txt
Posted May 12, 2000
Site ussrback.com

USSR Advisory #40 - Remote DoS attack in Microsoft IIS 4.0 & 5.0 - Malformed Extension Data in URL Vulnerability. The Ussr Labs Team has recently discovered a memory problem in IIS. Performing an attack with specially-malformed information extension data in the URL will cause the server to slow or stop.

tags | remote
SHA-256 | 3ad2790a2aa9da5a9e68e4f05873fcf34d29c2e12efbfb4acaed60e374f2d48d
Neon_beta5.c
Posted May 12, 2000
Authored by Axess | Site b0f.freebsd.lublin.pl

Neon beta5 - Simple Host or Iplist cgi Scanner which does 358 checks.

Changes: Added more cgi, fixed better output.
tags | cgi
SHA-256 | a0fc3d293b0acf7825ebd5b79d94d7aa2fa74286565aaee9b6fc858b23fb9ae6
Internet Security Systems Security Advisory May 11, 2000
Posted May 12, 2000
Site xforce.iss.net

Internet Security Systems (ISS) X-Force has determined that Microsoft Internet Information Server (IIS) is vulnerable to a remote Denial of Service (DoS) attack. IIS is a popular web server application for Windows NT, and comprises the majority of Windows NT based web servers. This vulnerability may allow a remote attacker to effectively disable vulnerable versions of IIS.

tags | remote, web, denial of service
systems | windows
SHA-256 | b3f3869ababf8355003692b68bc463889b7d558c776dd4b96ffa2393d0ca1ac3
worm.txt
Posted May 12, 2000
Authored by Michal Zalewski | Site lcamtuf.na.export.pl

Writing Internet Worms for Fun and Profit - The love letter worm was very crude, and proof of concept code for much more powerful worms has been written. Expect next years worms to be architecture independent, invisable to the end user, spread without user intervention, learn and launch updated worms, polymorphic with no constant code, and dissapear after it has accomplished its objective.

tags | worm, proof of concept
SHA-256 | 4814e0d3497813ef018f3be0c85104943a8f0a6b10ad19514067d20f4a5d8653
cst1.tgz
Posted May 12, 2000
Authored by Toxic Ocean

Cum Security Toolkit (cst v1.0) - Contains a scriptscanner and a portscanner Coded in Java. The http-script scanner features the ability to use a proxy server, a scripts-to-scan database, anti-IDS url encoding, fake "X-Forwarded-For:" header, and uses fake "Referer: " info. The port scanner is a full TCP connection scanner which can scan port ranges and grab banners.

tags | java, web, tcp
SHA-256 | 4a48a8b8b4f3c855330733200affaf3d5fdca4f02a949b6e0d9a50938eab9560
bugzilla.txt
Posted May 12, 2000
Authored by Karin | Site root66.nl.eu.org

BufferOverflow Advisory: Unchecked system call in Bugzilla 2.8. The script used to submit new bugs, process_bug.cgi, is vulnerable because it does not check the contents of the who field. Includes perl remote exploit code.

tags | exploit, remote, overflow, cgi, perl
SHA-256 | c03b1338b6456d559d308a4ca0f67b5d6cb1acb1d1ed85a1dec83f1ca6175f4c
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close