what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2003-12-30

pcds
Posted Dec 30, 2003
Authored by Bart Somers | Site doornenburg.homelinux.net

pcds is a Perl script written to monitor processes on a system and report changes.

tags | perl
systems | unix
SHA-256 | 5f198c35bda7d05c078a7a683a87be3ceb477bc374af209b621c46a0a2c6e406
env_audit-2.0.tar.gz
Posted Dec 30, 2003
Authored by Steve Grubb | Site web-insights.net

Env_audit is a program that ferrets out everything it can about the environment. It looks for process IDs, UID, GID, signal masks, umask, priority, leaked file descriptors, and environmental variables. It comes with test configurations for anacron, Apache, atd, crond, GDB, inittab, logrotate, PHP, pppd, procmail, rsh, rxvt, Sendmail, SSH, stunnel, sudo, xinetd, and xterm.

tags | php
systems | unix
SHA-256 | 2ded505c9776412372ae67832707fe5e29399cee84b389c485c1bfc340a0fe2c
firewall-jay-1.0.3.tar.gz
Posted Dec 30, 2003
Authored by Jerome Nokin | Site firewall-jay.sourceforge.net

Jay's Iptables Firewall is a bash script that allows one to easily install and configure a firewall on a Linux system. It features support for multiple interfaces, TCP/UDP/ICMP control, masquerading, synflood control, spoofing control, port forwarding from specific interfaces, VPNs, ToS, denying hosts by IP or MAC address, ZorbIPTraffic, Spyware list IP, Pre/Post scripts, log options, and more. The firewall is able to launch custom iptables rules, and the configuration of the firewall is assisted by an optional, interactive, curses-based Perl script.

tags | tool, udp, perl, spoof, tcp, firewall, bash
systems | linux
SHA-256 | 7cebbf7fd1aa9923bb8d2fa34d7818752a7195080fb0c036e19ab4e96350b332
init_rpi.txt
Posted Dec 30, 2003
Authored by Christophe Devine

Whitepaper detailing how to successfully patch the linux kernel in order to allow ptracing /sbin/init, and subsequently inject a connect-back shellcode into the target process. Patch code included.

tags | paper, kernel, shellcode
systems | linux, unix
SHA-256 | 8f53ec04bcff41e9accc09e517f1377b092c491fe8ae8d1ad5bb913474b9c162
showexp.txt
Posted Dec 30, 2003
Authored by Arman Nayyeri

Exploit code that makes use of the showHelp() vulnerability found in Microsoft Explorer versions 5.x-6.0. This file must be renamed with a .html extension to work.

tags | exploit
SHA-256 | df1ca6fa1d9d5d0313b50e8210ed14c64f175b0dd2ee7b9c9100c8e99159e329
ie_showHelp.txt
Posted Dec 30, 2003
Authored by Arman Nayyeri

A flaw exists in Microsoft Internet Explorer 5.x-6.0 that allows a remote attacker to execute a file using chm in showHelp().

tags | advisory, remote
SHA-256 | 74dacbfe84a67a971cd82b2d9a84831f67dbb9786abc754990bc01ccd23a36b1
gallery133.txt
Posted Dec 30, 2003
Authored by The-Insider | Site theinsider.deep-ice.com

Gallery versions 1.3.3 and below suffer from a cross-site scripting vulnerability in its searching functionality.

tags | exploit, xss
SHA-256 | 3b40870b0304d5f379e4c14f009bb9a9df94a16511285d52a426f305dbde5f76
phpping.txt
Posted Dec 30, 2003
Authored by ppp-design | Site ppp-design.de

php-ping improperly filters user inputs, allowing for a malicious remote attacker to execute arbitrary commands as the webserver uid.

tags | exploit, remote, arbitrary, php
SHA-256 | eb4c1e1ec0ead88df0513af866db209a8221dfe268483b81a69311c05b77cf3a
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close