Solaris /usr/sbin/arp local root stack overflow exploit.
b37113d4b5f35ea2807811dceb90d932c062e88b41f082fffecbf6522cc7344a
Microsoft Security Bulletin (MS01-001) - The Web Extender Client (WEC), a component that ships as part of Office 2000, Windows 2000, and Windows Me, does not respect the IE Security settings regarding when NTLM authentication will be performed - instead, WEC will perform NTLM authentication with any server that requests it. If a user established a session with a malicious user's web site - either by browsing to the site or by opening an HTML mail that initiated a session with it - an application on the site could capture the user's NTLM credentials. The malicious user could then use an offline brute force attack, or with specialized tools, could submit a variant of these credentials in an attempt to protected resources. Microsoft FAQ on this issue available here.
2879fb12eaf812aa96d02092ee3c430b3a4aa6204edaf13c2cc855f7b7b354c6
Patch advisory for Sun Microsystems. Please read for details.
ca226858f47414813867a5df9802d7a90f90d91e94f14f30eb774bcd505f6175
ProFTPd remote dos attack - Exploits multiple USER ftp commands to consume all available memory. Does not require an account. Written in java. Tested against ProFTPd 1.2.0rc1 and rc2.
1009450358c2059ee3d23a6f12fb7f622aed0047e1b3cc25606fc2efb9a087f9
Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.
68e2bd7b96d5fe4f9afc760d7d7c9787215c430c2cb2ff9f469a2cbe2a5e525b
Red Hat Security Advisory RHSA-2001:001-05 - A couple of bugs in GNU C library 2.2 allow unprivileged user to read restricted files and preload libraries in /lib and /usr/lib directories into SUID programs even if those libraries have not been marked as such by system administrator. This allows users to create or overwrite a file he did not have permissions to.
f093940dbad2e26f43305ea5252e4af144e7fdcd7673d8c14438879648f383ea
Telnetfp is an OS detection tool which uses do / dont requests via telnet to determine remote OS type. Contains 72 OS fingerprints.
ae48c9908a16c1891aecf361d8d8926967db8faac2b155964f6fb83ddb47c8d7
Accp.exe recovers lost passwords on MS Access 97 mdb files. Ported from Java.
1089cee0ab4745d52ee9307f5442af1e37c0ae6953568b5791596ed04a4265f3
Pudding is a proxy which recodes HTTP requests using most of RFP's IDS evasion encoding methods, plus random UTF-8 encoding support. Allows any web aware program/exploit/cgi-scanner to evade IDS without modification of the original code. Encoding methods include all uppercase, hex encoding, /./ directory insertion, fake parameters, premature URL endings, windows delimiters, and random UTF8 encoding.
c8a75f47892cf9971dfce9a19962ee940b44b6217ab7982e7299601b07617e91
Enabler.c attempts to find the enable password on a cisco system via brute force. Tested on Cisco 2600's and 12008's and has support for login-pass as well as login-only devices.
6c9df24566f021f2620f2e21a1865e88c3f4961ebb5920182e11f1f413bbba6a
CERT Advisory CA-2001-01 - Interbase is an open source database package that had previously been distributed in a closed source fashion by Borland/Inprise. Both the open and closed source versions of the Interbase server contain a compiled-in back door account with a known password which allows any local or remote user able to access port 3050/tcp [gds_db] to manipulate any database object and run arbitrary code on the system.
5297ff0a53b5eba8336466e8f9e3e1e95fe113d05804f9acb97fa56acbf32e90
Whois.pl is a remote exploit for Fastgraf's whois.cgi perl script.
805a20d41225bbbbdd659b9161bb4d4a47c0dad781d97b2378c5e7f8c4611a81
Port Scanning and OS Fingerprinting - In Spanish.
d29a0debb8f1e6c0c65c683ae42886381e2e396da3357cddb29a156f530e67d8