exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 31 of 31 RSS Feed

Files Date: 2001-02-02 to 2001-02-03

prodbx.c
Posted Feb 2, 2001
Authored by The Itch | Site bse.die.ms

Progress Database Server v8.3b local root exploit - Tested on Sco Unix and Linux.

tags | exploit, local, root
systems | linux, unix
SHA-256 | 100a970028aac2a1194ba986a81b6e2e4aec519e82a37df1992d7a51e4ecc4c0
aat4xx.zip
Posted Feb 2, 2001
Authored by G-Lock Software | Site glocksoft.com

G-Lock Software Advanced Administrative Tools v4.3 is a multithreaded network diagnostic tool which combines 9 tools into one. Its purpose is to accumulate data pertaining to network status and availability, using all of the latest development tools in network research. Includes a port scanner, cgi scanner, proxy analyzer, netstat, process info, and more. 30 day shareware trial. Tested on Win 95/98/NT/2000. Screenshot available here.

Changes: Added registry cleaner and some new things.
tags | cgi
SHA-256 | 2e6c05f6b09b778d88b9d992d855a6ad2220d8693ea7ba150d97fb97e41c2fb0
nid_3pe_v101.pdf
Posted Feb 2, 2001
Authored by Richard Bejtlich | Site bejtlich.net

Network Intrusion Detection of Third Party Effects v1.0.1 - This paper describes "third party effects," generally caused by adversaries spoofing your IP addresses while attacking an unrelated victim. The events are explained from the points of view of the three parties: the first party (the adversary), the second (the victim), and you, the third party (the bystander whose IPs were spoofed.) The paper includes packet captures, diagrams, and material not originally presented in the author's "Interpreting Network Traffic," such as a comparison of SYN vs ACK floods.

tags | paper, spoof
SHA-256 | 96e5b344c8fc7d81d1401194a28fdea918751bf78780c5bc31ef9ea0ee322d2a
seyon-exploit.pl
Posted Feb 2, 2001
Authored by Telehor | Site teleh0r.cjb.net

Seyon v2.1rev4b local exploit - Requires a valid display variable.

tags | exploit, local
SHA-256 | 05f961ae5eea578579a5554674f759ec21d2787c231c85db34475e46faa747ec
jazip-exploit.pl
Posted Feb 2, 2001
Authored by Telehor | Site teleh0r.cjb.net

Jazip v0.32-2 local root exploit - Takes advantage of a buffer overflow in the Xforms library.

tags | exploit, overflow, local, root
SHA-256 | 0bb3081442c2c8049ba97fcecf4791726f57f01f26e8e42e9099a1a2abaf460a
0101-exploits.tgz
Posted Feb 2, 2001
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for January, 2001.

tags | exploit
SHA-256 | 7cf2f86f82bd70408231897c52a93f41c21f1a3426999e80d34c02b17b565598
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close