exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2004-07-12

ettercap-NG-0.7.0.tar.gz
Posted Jul 12, 2004
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap NG is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 327afcea6e037958a0d56f73803de85957b802af4c77cdd933eb8056fe16a014
ethereal-0.10.5.tar.gz
Posted Jul 12, 2004
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Fixes a remotely exploitable vulnerability which can cause code to be remotely executed! Added several new protocols and updated many other protocol parsers.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 8cf555a4a02716ee1b65b6b8e016a632d869a57c46d8f8a304a324f8ae200dd4
linux.ia64.psr.mfh.txt
Posted Jul 12, 2004
Authored by Arun Sharma | Site bugzilla.redhat.com

Arun Sharma has discovered a vulnerability that affects Linux ia64 kernels. When the psr.mfh bit is checked without checking the identity of the FPH owner, another process may be able to see the first process's registers.

tags | advisory, kernel
systems | linux
advisories | CVE-2004-0565
SHA-256 | 7e63b0d22a6886171fcbc995871136e9f5eb57f8cec14c4fe69851519273f6f5
covert.txt
Posted Jul 12, 2004
Authored by Marc Schoenefeld

The Microsoft Java Virtual Machine suffers from a cross-site communication vulnerability that allows Java applets originating from different domains to communicate.

tags | advisory, java
SHA-256 | 1ac451abafed1ae8f6d56e153fc9d3e676e21a33c0eeff20a26841bdf18887e3
Ability_mail_server_1.18.txt
Posted Jul 12, 2004
Authored by Dr. Insane | Site members.lycos.co.uk

Ability Mail Server 1.x is susceptible to a cross site scripting flaw and a denial of service vulnerability.

tags | advisory, denial of service, xss
SHA-256 | 1f7f8a8d03be95cfa388c5d59de178d57af5d4318ec74a2eddbfaedf6efac7e8
webstretch-0.1.6.zip
Posted Jul 12, 2004
Authored by Simon Shanks | Site sourceforge.net

Webstretch is a tool that enables a user to view and alter all aspects of communications with a web site via a proxy. Primarily used for security based penetration testing of web sites, it can also be used for debugging during development.

tags | web
SHA-256 | e911accba39430b294eeae3392227f6175dbf03045d28c3460cf937f95871ef7
hlboom.zip
Posted Jul 12, 2004
Authored by Luigi Auriemma, Terry Henning | Site aluigi.altervista.org

Remote denial of service exploit for a flaw in the Half-Life server on Linux and Windows where a write occurs to a read-only memory zone.

tags | exploit, remote, denial of service
systems | linux, windows
SHA-256 | e7c70144dd5330c1cc7ffb608a02732ad9ec1fa4f17140d79be8c64ffa1b32d3
memHalfLife.txt
Posted Jul 12, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

A malformed packet to a Half-Life engine will cause a denial of service when a write to a read-only memory zone occurs. Both Windows and Linux releases are affected.

tags | advisory, denial of service
systems | linux, windows
SHA-256 | 0aadb5786ecf985cde4b3895881ce8c7ae018bc807c214246e981dfe8b706fc5
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close