exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files Date: 2004-08-31

0408-exploits.tgz
Posted Aug 31, 2004
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for August, 2004.

tags | exploit
SHA-256 | 23a4c0e2fc061340844db15906f88155421b2ed0ad38202ceeb8256553e209fc
rkhunter-1.1.7.tar.gz
Posted Aug 31, 2004
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Added support for ADM Worm, Added support for MzOzD and spwn backdoor, Added LKM filename check (experimental), Added passwordless user account test.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | 61178c2481dc83ac450af064ef072dcd6a76d5ce4df0af6fa657b7ec33feeafe
backdoor-list.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

List of the most known backdoors and the ports they use. It has 130 different trojans and more than 150 ports listed.

tags | trojan
SHA-256 | c0ca6e5af2ea2bc12bb290309372e81c364d8109c1d25218f4e4c52443f89292
abouttrojans.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

White paper discussing Windows trojans. Written for newbie home PC users.

tags | trojan
systems | windows
SHA-256 | 33f7db9373b30ae302e7ee598301369005f836114516b5f2ed62e23b3a46a86a
klezanalysis.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

An analysis of the Klez worm listing all the steps that it takes.

tags | worm
SHA-256 | f2c65ec510c5523d748d5d277a63219df67263954663d1d20fdfc5ad9b1abcfc
crackingpatterns.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

This paper explains a technique of cracking any kind of raw encryption using word patterns, without the conventional key combination trying.

SHA-256 | dce740abf0c17e037fbd17ff6fb1e118ffc53ede465268b5bbfa137c109d6cc4
bypassav.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

White paper explaining how to try and bypass detection from antivirus software by recompiling the same code with a few minor changes.

SHA-256 | ed996b12d0f2df8baf46b0eb9266cbde4f7134bafe3dd50cd775fe7dd5ff08c9
sishell-0.2.tar.gz
Posted Aug 31, 2004
Authored by Michel Blomgren aka Shadowinteger | Site tigerteam.se

sishell is a reverse (connecting) shellcode kit for x86 Linux, FreeBSD, NetBSD and OpenBSD. It generates both regular shellcode without NULLs and stand-alone ELF executables. sishell is distributed with a Makefile system, a custom ELF brander (brandelf) and a C example code generator. sishell is distributed under the MIT License.

Changes: Added the -X option to scprocessor.c. scprocessor can now generate ascii-encoded hex output for use with printf, echo -ne, etc. This is much better than ascii-encoded octal as before.
tags | x86, shellcode
systems | linux, netbsd, freebsd, openbsd
SHA-256 | eb3226fcdde43122beef233db2fe7fa8429b08bce8d263a6fc202949daf66992
gwee - Generic Web Exploitation Engine v1.36
Posted Aug 31, 2004
Authored by Michel Blomgren aka Shadowinteger | Site tigerteam.se

gwee, or Generic Web Exploitation Engine, is a small program written in C designed to exploit input validation vulnerabilities in web scripts, such as Perl CGIs, PHP, etc. gwee is much like an exploit, except more general-purpose. It features several reverse connecting shellcodes, 4 methods of injection, and a built-in HTTP/HTTPS client and server. gwee is distributed under the MIT License. The Perl and Python shellcodes were written by Sabu.

Changes: It has been ported to Microsoft Windows. Minor code clean up.
tags | tool, web, cgi, perl, php, vulnerability, shellcode, python
systems | unix
SHA-256 | 5b057dc779cbc8e9e663251dac2448b253002f74a9570a2e50b915bf2bed149b
sbd-1.33.tar.gz
Posted Aug 31, 2004
Authored by Michel Blomgren | Site tigerteam.se

sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-128-CBC + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. Only TCP/IP communication is supported. Source code and binaries are distributed under the GNU General Public License.

Changes: Added the -s option to have sbd invoke a shell (/bin/sh), nothing else. If sbd is setuid 0, -s will invoke a root shell.
tags | tcp
systems | windows, unix
SHA-256 | 6c8d26a05fe91f44aa4b406966355f89c4057c883dadf7ad576fd9c45decae7b
Secunia Security Advisory 12397
Posted Aug 31, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Samba 2.x, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the handling of client printer change notification requests. This can be exploited to crash smbd by sending a FindNextPrintChangeNotify() request without first sending a FindFirstPrintChangeNotify() request.

tags | advisory, denial of service
SHA-256 | ee130cef4b714074de9166bee757621997f1bf5ef4e3f7f7b228aaffbbd958bb
impost-0.1rc1.tar.gz
Posted Aug 31, 2004
Authored by Ziplock | Site impost.sourceforge.net

Impost is a multi-purpose scriptable network protocol security auditing tool designed for analyzing network attacks and exploitations while operating as a honey pot or packet sniffer.

Changes: New features and various algorithmic improvements.
tags | tool, protocol, intrusion detection
systems | unix
SHA-256 | bd3addabda41e3c106b700d49400af1d4be939a8b0c8e41d4302e5cd59ec0c20
Secunia Security Advisory 12401
Posted Aug 31, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Smart Guest Book 2.x, which may allow malicious people to gain knowledge of sensitive information. The problem is that the database file SmartGuestBook.mdb by default is accessible by anyone. This may disclose various information including the administrative username and password by downloading the file from an affected web site.

tags | advisory, web
SHA-256 | b955a6994768bd799bfa35a4596aa97312a1d5f066225ce9b7d05858ff62ef93
wsFTP-DoS.txt
Posted Aug 31, 2004
Authored by Lion

A vulnerability has been found in WS_FTP Server version 5.0.2. The problem is in the module handling the file path parsing.

tags | advisory, denial of service
SHA-256 | 0e9084f43b4dd2a738430735be464461a912bebcc7ffe06033f3e6e2a76d5da7
dlinkdown.c
Posted Aug 31, 2004
Authored by anonymous

Remote exploit that will change an IP address for the D-Link DCS-900 IP camera, due to the fact that it listens for a 62976/udp broadcast packet telling it what IP address to use without any authentication.

tags | exploit, remote, udp
SHA-256 | 80731a57a2cea9ecb8dd3acadf07b2de5a77b44a1815266951ba9d93b953b1aa
cutenews136.txt
Posted Aug 31, 2004
Authored by e0r

Cute news versions 1.3.6 and below have a world writable news.txt file that allows for site defacement.

tags | advisory
SHA-256 | 888f182df2b68a165e3e0b213cb4ae41f1446894967a95da68b89f850e712485
Gentoo Linux Security Advisory 200408-27
Posted Aug 31, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200408-27 - Gaim versions below 0.81-r5 contain several security issues that might allow an attacker to execute arbitrary code or commands.

tags | advisory, arbitrary
systems | linux, gentoo
SHA-256 | b60403c853c18a5c0b61329b35794b50f6e063580ecc1b96de4158dca60f75f3
skl0g_v1.14.zip
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

skl0g is a simple and compact keylogger for Windows. It runs invisibly and effectively. It logs everything that is typed at the computer and saves them in log files according to the date.

systems | windows
SHA-256 | 17c563fff95bddddea1a4b94071044a54181dfeb472a96552590df349f6134ad
neb-citadel.c
Posted Aug 31, 2004
Authored by haker haker

Remote exploit for Citadel/UX versions 6.23 and below that makes use of the USER directive overflow. Successful exploitation adds an account in /etc/passwd.

tags | exploit, remote, overflow
SHA-256 | 49c652bb47321274ba36227f601c86fc98a4cb2b83fcc5e9942bc5c64a9773ad
Secunia Security Advisory 12392
Posted Aug 31, 2004
Authored by Secunia, J. Courcoul | Site secunia.com

Secunia Security Advisory - A vulnerability in Netscape can be exploited by malicious people to conduct phishing attacks. The problem is caused due to errors in the displaying of Java applets in a window when multiple tabs are used. This can be exploited to spoof the content of a HTML document from another HTML document being in a different tab. The vulnerability has been confirmed in Netscape 7.2 on Mac OS X 10.3.5.

tags | advisory, java, spoof
systems | apple, osx
SHA-256 | c156bfd1618a6dc5ad052d0844d49de260fde926b32357fee71f463e842dafae
Secunia Security Advisory 12393
Posted Aug 31, 2004
Authored by Secunia, Mathieu Lacroix | Site secunia.com

Secunia Security Advisory - A vulnerability in Network Everywhere Cable/DSL 4-Port Router NR041 allows malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 9a112b13d4c700c53499ba70b67a09d6ae6736e143c97ef7195074e130d0e605
nabou-2.4.tar.gz
Posted Aug 31, 2004
Authored by Thomas Linden | Site nabou.org

nabou is a Perl script which can be used to monitor changes to your system. It provides file integrity checking, and can also watch crontabs, suid files and user accounts for changes. It stores all data in standard dbm databases.

Changes: Security bug fix.
tags | tool, perl, intrusion detection
systems | unix
SHA-256 | a6700ded216f2f75fd7c1d5e56fcc6ceccb24db60b571db51d3f34b57eda28c3
Linux IPTables Firewall
Posted Aug 31, 2004
Site iptables.org

iptables is the new packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.

Changes: Bug fixes.
tags | tool, firewall
systems | linux
SHA-256 | be7bd67232fddbe3ce81f40f5b79123380a2e67cd166ec06e650842f8acb373d
Nmap-Parser-0.78.tar.gz
Posted Aug 31, 2004
Authored by Anthony G Persaud | Site npx.sourceforge.net

Nmap Parser is a Perl module that simplifies the process of developing scripts and collecting information from the XML nmap scan data, which can be obtained by using nmap's -oX switch or from the file handle of a pipe to an nmap process. It uses the XML twig library for parsing, and supports filters.

Changes: Updated documentation, added new methods, and verified format for nmap 3.55.
tags | tool, perl, nmap
systems | unix
SHA-256 | 12b1c24b3e86ca3aa2c20405f18056e443c224e8d90a77cccfd9aeb3b3348db7
RFC-NG-3.2.0.tar.gz
Posted Aug 31, 2004
Authored by Claudio Panichi | Site rfc.sourceforge.net

RFC (Remote Filesystem Checker) is a set of scripts that aims to help system administrators run a filesystem checker (like tripwire, aide, etc.) from a master-node to several slave-nodes using ssh, scp, sudo, and few other common shell commands.

Changes: Minor fixes.
tags | tool, remote, shell, integrity
SHA-256 | d44a76febd0400f975eeecda7d4a61a9cdf8fa8cce822786c156192af1fe4200
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close