what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files Date: 2000-05-17 to 2000-05-18

rm.racecondition
Posted May 17, 2000
Authored by Morten Welinder

If root ever does "rm -rf /tmp/foo" for a directory structure not completely owned by root, a local user can delete all files that root can.

tags | exploit, local, root
SHA-256 | 3ba1f58d2454e57c2aabb1552bf4229866c003b9fde29b9e8099400b1fef591c
saint-2.0.2.tar.gz
Posted May 17, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 80d45841dec9a0d786bc5d96c0313c747174e4d4c3cdcc8cfdbfc8bc237fc3d5
ultraboardv1.6
Posted May 17, 2000
Authored by RC

Using the good old NullByte(\000) its possible to open "any" file on the webserver(with its permissions) running the "UltraBoard" forum-software.

tags | exploit
SHA-256 | cac53c20c8f003f1c433d4901d938d89d764d76df657e71ce2c13537f325a103
nessus-1.0.0.tar.gz
Posted May 17, 2000
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 330 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.

Changes: First stable release! Added SMB checks, and bugs fixed in NASL.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
SHA-256 | c274f0954a44be2fa72bcd3e402b190f0bb3cb50d5d7c4b1f3b55b9233c1a746
RFP2K04.txt
Posted May 17, 2000
Authored by rain forest puppy | Site wiretrip.net

RFP2K04 - Mining BlackICE with RFPickAxe. BlackICE IDS uses a management console called ICECap to collect and monitor alerts sent by the various installed BlackICE agents. The ICECap user console sits on port 8081 and has the default login of 'iceman' with no password. The second problem is that the software uses, by default, the Microsoft Jet 3.5 engine to store alerts. If you couple that with the shell VBA problem, that means you can push alerts that contain commands to be executed on the ICECap system. Includes RFPickaxe.pl demo exploit.

tags | exploit, shell
advisories | CVE-2000-0325
SHA-256 | eb477a77f630953d91b35937b63fd59b9bc492d8898abfeed95794044c8189f8
disable.tcpdump
Posted May 17, 2000
Authored by Hugo Breton

There is a way to disable tcpdump running on a remote host. By sending a carefully crafted UDP packet on the network which tcpdump monitors, it is possible, under certain circonstances, to make tcpdump fall into an infinite loop.

tags | exploit, remote, udp
SHA-256 | 762d8e63fbcb7f43d09fcb049e572dc985c7e6be26bd6c5efc3db1e022573ef8
filemaker.pro5
Posted May 17, 2000

The precise details of how to exploit these holes is minimized to prevent compromising the integrity of all current Internet-accessible FileMaker Pro 5 databases and mail servers. However, details can be easily deduced by referencing the FileMaker Pro 5 documentation and by consulting the FileMaker XML Technology Overview white paper available via the FileMaker XML Central Web site.

tags | exploit, web
SHA-256 | 266a2b3612f869f2b2ce836b82d96495dbb6d573fd9f243d85c88bce65c7fde5
cisco.help
Posted May 17, 2000
Authored by Fernando Montenegro

It seems that, even though a regular (non-"enabled") user should not be able to see the access-lists or other security-related information in the router, one can do just that. The online help systems doesn't list the commands as being available, but out of 75 extra "show" options that are available in "enable" mode (on a 12.0(5)3640), only 13 were actually restricted.

tags | exploit
SHA-256 | 2c33ae7e113f98c67d0be4eb389aefb18fd47f1579f69e7636939aefb440a243
pam_console.bug
Posted May 17, 2000

When accepting luser console login, pam_console called by /bin/login tries to be user-friendly, doing several chowns on devices like login tty and corresponding vcs[a] device, as well as other interesting devices: fd*, audio devices (dsp*, mixer*, audio*, midi*, sequencer), cdrom, streamer/zip drive devices, frame buffer devices, kbd*, js*, video*, radio*, winradio*, vtx*, vbi* and so on. Probably it's designed to make console logins more comfortable, but has DEADLY effects on servers with console luser-login ability (and that's quite common).

tags | exploit
SHA-256 | 1d635e59bee6725bcf7c4b9d3459f4bb45a1383179c65d540f6ca36f5edf6fe0
JANAHTTP.server
Posted May 17, 2000
Authored by eAX

Here is how to exploit the bug for cracking systems running Jana. I tested it with Jana 1.45 on Windows 98 and Windows 2000. 1. Open a browser window 2. Type i.e https://the.server.com/./.././.././.././windows/win.ini.

tags | exploit, web
systems | windows
SHA-256 | 5619cda37bd593b8aa8636730088c1f2262151ba1f7ad4ec649f9de333df9d1a
DoS.knfsd
Posted May 17, 2000
Authored by Chris Evans

A DoS condition exists in the Linux kernel knfsd server. Remote, unauthenticated users (i.e. those with neither a directory mounted nor permission to mount one) can OOPS the host kernel. The OOPS does not bring down the target host, but it is possible to render the NFS service inoperable until a reboot.

tags | remote, denial of service, kernel
systems | linux
SHA-256 | 7a554cf14acdc3fef95cadd5e0b687b47576cc0e8024390737cb14e3860d6e69
saint-2.1.beta1.tar.gz
Posted May 17, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | b29ecdbd2a274300ddad53366333d83a5a667e80f048aed6f8651989be1ffdc8
syrin15.zip
Posted May 17, 2000
Authored by Digital Monkey | Site b0f.freebsd.lublin.pl

Buffer Syringe is a tool for win32 that tests a daemon for buffer overflow on it's parameter(s) sort of "brute forcing" or "stressing" the daemon by means of injecting a user specified parameter or a command with a value of a user specified number of characters to the daemon. Chances are, if the parameter being tested is vulnerable to an overflow, and the user specified number of characters exceeds that of the parameter's limit, then the daemon would likely crash.

tags | overflow
systems | windows
SHA-256 | abd825833c7b497a0e3d17058eb7119b3458be5b9e91dd6fa18bc85d104ab967
fdmnt-smash2.c
Posted May 17, 2000
Authored by Scrippie | Site b0f.freebsd.lublin.pl

fdmount local root exploit - tested on Slackware 4.0. Must be in the floppy group. Modified from last version to work on Slackware 7.

tags | exploit, local, root
systems | linux, slackware
SHA-256 | 255ecb2ad7fe3f717a036f24b6eb2b7864a4ac3e503bf58f697e951d039c3d6b
sara-3.0.4.tar.gz
Posted May 17, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Added test for SunOS netpr vulnerability, Added test for counter http vulnerability, Added a range argument to target spec, and incorporated target specs in interactive mode.
tags | tool, cgi, scanner
systems | unix
SHA-256 | f1eadc308e0fa9c0ff68946ebf297fe6032ba691fc2059f1c021cc5c8e7b0250
anti_sniff_researchv1-1.tar.gz
Posted May 17, 2000
Authored by Mudge | Site l0pht.com

Antisniff Unix Researchers (free) version 1-1 - This is a command line only version that runs many of the same tests to determine if a sniffer is running on the local network that the Windows NT/98/95 GUI does. Currently only Solaris and OpenBSD are supported.

tags | tool, local, sniffer
systems | windows, unix, solaris, openbsd
SHA-256 | d6e2c4c3da8d8dc4fa5b2a702a65d8f22552aff1a897e8f70b86863afc84a4ef
cscope-13.0-2.tar.gz
Posted May 17, 2000
Authored by Petr Sofra | Site cscope.sourceforge.net

cscope is an interactive, screen-oriented tool that allows the user to browse through C source files for specified elements of code. The current version allows searching code for all references to a symbol, global definitions, functions called by a function, functions calling a function, test string, regular expression pattern, a file, and files including a file.

Changes: Supprts more architectures.
systems | linux
SHA-256 | 185c52ce8dd0518391d04162c1465c0d0a7c18859426ff7d42695d07df85196b
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close