exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-11-09

omnisux.pl
Posted Nov 9, 2000
Authored by Philer

The OmniHTTPd web server v2.06 and below contains a remote denial of service vulnerability in /cgi-bin/visadmin.exe.

tags | exploit, remote, web, denial of service, cgi
SHA-256 | e9fe1c87ec8c2ace2f271f1492b978a382de898fb38ca45578151f10e594c30a
knetfilter-2.0.0.tar.gz
Posted Nov 9, 2000

Knetfilter is a KDE gui application designed to manage the netfilter functionalities that will come with the new kernel 2.4.x. In Principal, all standard firewall system administration activities can be done just using knetfilter. But there is not just a GUI to iptables comand line, it is possible also some monitoring via a tcpdump interface.

tags | tool, kernel, firewall
systems | linux
SHA-256 | 1b72f4e75fbb3d7174aeed1d89518b3ba275629dd0302c682cbac709e18ceef7
zorp-0.5.25.tar.gz
Posted Nov 9, 2000
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to finetune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: Bounce check fixes, passive answer parsing fix, FTP proxy should work again.
tags | tool, tcp, firewall, protocol
systems | unix
SHA-256 | 64385ebef7b6716218ffb5c22e955b3430e2b18d34079db7618aad1b7d3e2250
libol-0.2.20.tar.gz
Posted Nov 9, 2000

Libol is required for Syslog-ng 1.4.8

tags | system logging
systems | unix
SHA-256 | 0dae1c7c66bc274d9db8a5322ad2ab787e486c0332dd821c23cd7f6019a70625
syslog-ng-1.4.8.tar.gz
Posted Nov 9, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng is a multi-platform syslogd replacement, with lots of new functionality. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: New stable release - Added macros for timestamps, fixed a memory leak with destination files, and small fixes. Requires libol-0.2.20.
tags | system logging
systems | unix
SHA-256 | 2c74015bb5576ba87058646d799cb1d1178f23e1f6c79002652ac0c6c22b6c04
sqldict.exe
Posted Nov 9, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

Sqldict is a dictionary attack tool for Microsoft SQL Server which lets you test if the accounts are strong enough to resist an attack or not.

SHA-256 | 41e688c7185065b68cd74e8c1c66f03331b936fc512c25400bdd89eda271d5a0
fwlogwatch-0.0.25.tar.gz
Posted Nov 9, 2000
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch analyzes the ipchains, netfilter, or iptables packet filter logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Added netfilter support, internal fixes and optimizations.
tags | tool, firewall
systems | unix
SHA-256 | 94c123b50692bd7991ebabc308b8124643dc7a1751bc5d2ec9d22e30b186b4e2
iis-unicode-exploit.pl
Posted Nov 9, 2000
Authored by Telehor | Site teleh0r.cjb.net

IIS Unicode remote exploit - Executes commands remotely on IIS 4.0 on NT and IIS 5.0 on Windows NT and 2000.

tags | exploit, remote
systems | windows
SHA-256 | fbc3b2aa102785a4757f4a193d95da46e9bee307e89c92a60281da7338e006dd
pollit-2.0-exploit.pl
Posted Nov 9, 2000
Authored by Telehor

Poll It v2.0 CGI exploit which binds a shell to tcp port 60179.

tags | exploit, shell, cgi, tcp
SHA-256 | ac9a11e96cfadd025d991a68aab80ce6e5c6b256ab9c91bac1ebb6ed4483fa53
saint-3.1.1.beta1.tar.gz
Posted Nov 9, 2000
Authored by Sam Kline | Site wwdsi.com

SAINT (Security Administrator's Integrated Network Tool) is an updated version of SATAN, designed to assess the remote security of computer networks. Features include scanning through a firewall, frequently updated security checks, 4 levels of vulnerability severity, and a feature rich HTML interface.

Changes: Now checks for vulnerable versions of the Lotus Domino Server, vulnerable iPlanet Web Servers, Cisco Catalyst switch vulnerabilities, improved detection of unpassworded NT guest and administrator accounts using samba, and bug fixes in the IMAP and Cold Fusion checks.
tags | tool, remote, scanner
systems | unix
SHA-256 | eeeea535e35390d99caf228cb1b9637757ce5a9e48fa7b6587dff52e6c35abd7
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close