exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2001-03-27

sara-3.3.5.tar.gz
Posted Mar 27, 2001
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Now detects the SunOS snmpXdmid remote root bug, and te lion worm. We also enhanced our SSH detection logic to address not only the new vulnerabilities but also its use as a backdoor.
tags | tool, cgi, scanner
systems | unix
SHA-256 | a8957f7dbcca2d44395bc50b3f2db2ea5f6dedc6995d88509ffea69ab9604f0a
bind_scan.pl
Posted Mar 27, 2001
Authored by Nemes||y

Bind Scan is a perl script which scans for vulnerable BIND servers. Uses dig to get information.

tags | tool, scanner, perl
systems | unix
SHA-256 | f61a4f4d436d5be1de4dfe50468d058777208b082da2808da3f641c2ac0e2afa
apache_1.3.19+ssl_1.42.tar.gz
Posted Mar 27, 2001
Site apache-ssl.org

Apache-SSL is a set of patches for Apache to create a secure Webserver, based on SSLeay/OpenSSL. It is designed to be small, secure, and efficient.

tags | encryption
SHA-256 | fe90030c75f9cddeedf12e6f749e07f6cdc8fad9e4406c2b2d642cfb2ee3ee7d
mdcrack-0.7.tar.gz
Posted Mar 27, 2001
Authored by Gregory Duchemin | Site mdcrack.multimania.com

MDcrack is a brute forcer for MD5 hashes. Many programs send MD5 hashes of passwords over the wire for security, not realizing that brute forcing MD5 hashes is as simple as brute forcing our old UNIX DES password. MDcrack has been built with performance in mind, and is capable of breaking up to 6 characters in length hashes in hours, 8 character passwords can be cracked in a couple days.

Changes: Now includes a human readable form output so grep can be used to search through results, a -F option to write in non-human form speeding up performance by 60%, and bug fixes.
systems | unix
SHA-256 | b1d8492042611af996c56bf4b7c71729c98dae5e8ba376bc094d8dcd96bad7e9
ICQMachineGun.zip
Posted Mar 27, 2001
Authored by AleXXL | Site project.od.ua

ICQ MachineGun v1.0b is an ICQ spamer/bomber.The messages send through the ICQ server to any (Online/Offline) users. It's may be normal or uin messages. Tested on Windows 98SR2.

systems | windows
SHA-256 | 711107a9e7b0d4f2bccb2b4aa23d2dcfe1e7121742408b5b2668150d58be95d5
chkrootkit-0.30.tar.gz
Posted Mar 27, 2001
Authored by Nelson Murilo | Site chkrootkit.org

chkrootkit locally checks for signs of a rootkit. Includes detection of LKM rootkits, ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions. Tested on Linux, FreeBSD, Solaris, and OpenBSD.

Changes: Now detects RK17 and the lion worm. New tests - Now checks for patched versions of basename, dirname, traceroute, rpcinfo, rexedcs, date, echo, env, timed, identd, pop2, pop3, write, tar, mail, biff, and grep.
tags | tool, integrity, rootkit
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | ded10ae067d2ad1653ba7b8d67cc5c3c8d994e3edef7bd1dd14a257e0160f21a
adore-0.34.tgz
Posted Mar 27, 2001
Authored by teso, stealth | Site team-teso.net

Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.

Changes: Improved 2.4 support, better authentication checking, permanent PID removal, configure script, experimental exec redirection for i386.
systems | linux
SHA-256 | cb6a7f28f3180a55c6b06e51a03d1a0d0fb4af64f083d6b2b94ca067652a1ed4
ddnsf.tar.gz
Posted Mar 27, 2001
Authored by Extirpater

Distributed DNS Flooder v0.1b - A powerful attack against DNS servers.

tags | denial of service
SHA-256 | 103df02808e448b0350bfd7fc00522a43bca6f8945d61ee79851f123f124dedd
ASPSeek.txt
Posted Mar 27, 2001
Authored by Tack

ASPSeek by SWSoft allows remote users to view any file on the webserver via a /../ bug.

tags | exploit, remote
SHA-256 | 2c9c13f9ddeafd7f77286ec885d5a0c1c90811b41c5ed7a4739c36827378aed7
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close