exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 1999-10-22

ex_imagemap.c
Posted Oct 22, 1999
Authored by Unyun

imagemap CGI which is distributed with OmniHTTPd 1.01 and Pro2.04 has a buffer overflow bug, I coded an exploit which can execute any command on the victim host. The Shadow Penguin Security.

tags | exploit, overflow, cgi
SHA-256 | 934905f1f9f1cb9de1cc562db508da34d8ccefe4d46bd6355fecc4455384cec2
tailbeep-0.3.tar.gz
Posted Oct 22, 1999
Authored by Tommy. | Site soomka.com

Tailbeep opens a file (-f), seeks to the end, and watches for a string (-s). If the string is found, a beep is sent to the specified tty (-t) device. You can also daemonize (-d) it. I wrote it so I could watch /var/log/messages for the DENY string (so I can tell if someone is trying to break into the firewall.)

Changes: Speech (through speechd) and a debug option.
tags | tool, intrusion detection
systems | unix
SHA-256 | 44c568b15d10d6153f5b49137e01ff1d3ba63549b16e672d0a3990bf420a5186
ethereal-0.7.6.tar.gz
Posted Oct 22, 1999
Authored by Gerald Combs | Site ethereal.zing.org

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers.

Changes: New protocol decoders include BPDU, SNA, RIPng, PIM, Yahoo Messenger and Pager Protocol, NTP, BGP, AFS and RX, and VLAN (802.1q). Many more protocols now have fields that are filterable via Ethereal's display filter engine, the syntax for filtering on byte strings has been extended, protocol decoders that have been updated include IPv6, SMB, OSPF, POP, NBNS, and DNS, the TCP Follow window can now convert from EBCDIC, Ethereal can now read HP-UX's nettl trace-file format and some bugs were fixed as well.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | e223e4d6dedfe7e08e074834e8a728a44ba1f8ad4dcc95e5c893a7a1988e832f
EasyTcpIp-lib-0.2.tar.gz
Posted Oct 22, 1999
Authored by Marcelo Gornstein

Easy TcpIp Library is useful to add basic TCP/IP support to your applications by simply linking it in.

tags | paper, tcp
SHA-256 | c49cd25eebd1db8f427ebdbdf7fcec255bce3bcdea3f7f433d77f240fa31ee01
ms99-045
Posted Oct 22, 1999

Microsoft has released a new version of the Microsoft(r) virtual machine (Microsoft VM) that eliminates a security vulnerability that could allow a Java applet to take unauthorized actions on the computer of a web site visitor. Although no standard Java compiler can generate such an applet, a Java applet constructed by hand with a Java bytecode assembler could bypass the sandbox and take virtually any action on the computer that the user would be capable of taking.

tags | java, web
SHA-256 | 8c02eaa1084336b7cffb85cbeeee6bbe73094d24374f1495e1fc5018b391ad3f
winsd.101899.txt
Posted Oct 22, 1999
Authored by winsd

[ Windows Security Digest ] 1999 - October 18. Excel Symbolic Links, JavaScript Redirect, Anatomy of an Intrusion, Getting the Drop on Network Intruders, State of Security 2000, So You Want to Be a Cryptographer, C2 Compliance Check. www.ntsecurity.net

tags | javascript, magazine
systems | windows
SHA-256 | b52d9e47f72f9bd6daa0001926b02ea197343a60b323bde7dd34592350f20bdf
acct0.91.tar.gz
Posted Oct 22, 1999
Authored by S. Krahmer | Site cs.uni-potsdam.de

Linux accounting-tool for 2.2.x.

systems | linux
SHA-256 | 9fea4c4d1397cf298dd5a4cfdd58e5ccac4e42e2a9f5fa8af2913c2db86a3676
omega.txt
Posted Oct 22, 1999
Authored by Lamagra

Tutorial on a new way of exploiting buffer overflows (ret-into-libc).

tags | paper, overflow
systems | unix
SHA-256 | 71f6c76b0584c12d0217a57f3052e0e21eedfa5cd3d63661e5ed666690b0ac17
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close