what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2008-05-30

kismet-2008-05-R1.tar.gz
Posted May 30, 2008
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

Changes: WRT54 fixes, multiple Darwin fixes, GPS rewrite and fixes, Nokia tweaks, and Imagemagick fixes.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | a298d44f8a6ec977021cd492a720987ded81b5c4baf5f68b36f1282a23c9f7d3
nebula-0.2.2.tar.gz
Posted May 30, 2008
Authored by Tillmann Werner | Site nebula.mwcollect.org

Nebula is a data analysis tool that automatically generates intrusion signatures from attack traces. It runs as a daemon that processes data submitted from honeypots. New signatures are published as Snort rules and can be used to defend a network from future intrusion attempts.

tags | tool, sniffer
SHA-256 | a72605776c17e6c7038972b6fcfa0d17f63a693b21e21701518d5f1e328aa4ed
nowsmsmms-overflow.txt
Posted May 30, 2008
Authored by Heretic2

Now SMS/MMS Gateway version 5.5 remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | fb10833a3ceda64288a1c504ea3f32181e19fd5494a383d7ac1447d494118766
mambomambads-sql.txt
Posted May 30, 2008
Authored by H-T Team | Site no-hack.fr

Remote SQL injection exploit for the Mambo mambads component version 1.0 RC1 Beta and 1.0 RC1.

tags | exploit, remote, sql injection
SHA-256 | 1371c22c9ff1adf3da246d12be00f789787487914587e621e5db10042902baf5
adv96-K-159-2008.txt
Posted May 30, 2008
Authored by M.Hasran Addahroni | Site advisories.echo.or.id

HiveMaker Professional versions 1.0.2 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | edecf2cabc9140694b7fe0545b10328ec7fe6f5e9483e279b9184bae6e318ab9
applemail-dos.txt
Posted May 30, 2008
Authored by David Wharton

Apple Mail versions 3.1 and 3.2 suffer from a denial of service vulnerability when reading a specially crafted e-mail.

tags | exploit, denial of service
systems | apple
SHA-256 | ee6c6052c1a8464b7f929eea3c3351ac59de5b64c5f6f924225eee4a43f255de
dotnetnuke-xss.txt
Posted May 30, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

Dot Net Nuke versions 4.8.3 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 86cd5f32cd7cd1c3674ce7d617eff9c9047049a44b5d05f092d43848ff71e81a
phpbook-upload.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

PHP Booking Calendar version 10d arbitrary file upload exploit.

tags | exploit, arbitrary, php, file upload
SHA-256 | 933684b5cca85e8930bf073739a60881ae9474d8a0eca85e813a587ee77c5b2b
cmsscratch-traverse.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

CMS from Scratch versions 1.1.3 and below suffer from a directory traversal vulnerability in image.php.

tags | exploit, php, file inclusion
SHA-256 | 3f4831f4fdb0ddc7de6a97e23e86dec24c92e7b468890d059ed9452891c221d8
phpbook-sql.txt
Posted May 30, 2008
Authored by Stack | Site v4-team.com

PHP Booking Calendar version 10d remote SQL injection exploit that retrieves the administrator login and password hash.

tags | exploit, remote, php, sql injection
SHA-256 | 262259f83a4516baf4c9357afa3f71292f7b19b03e75adcd312d3bc801df029a
asus-overflow.txt
Posted May 30, 2008
Authored by Heretic2

ASUS DPC proxy versions 2.0.0.16 and 2.0.0.19 remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | 95ad9e971e97b7a96c4d56b03b003adcba794f0811d9d05a78b73dd5d0e1c8ef
Secunia Security Advisory 30406
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in RockN Audio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 31bbed62d079085c932940b06b0727c26fad8c80a5e8b277b816edbe81b6fe56
Secunia Security Advisory 30413
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for kvm. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, fedora
SHA-256 | d65453f648ee2aab6c67431b793b4e19b09ff7a25c6ce05500ae782f3861199c
Secunia Security Advisory 30417
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in cbrPager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 24213dc66f50daf5f65733572602a764735d35fd4b52c987bd7c8e731ff991c6
Secunia Security Advisory 30437
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for evolution. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | dafb1543e61b3a1f40a74b4739a670722c03112e39f88520a5e796d243fc650d
Secunia Security Advisory 30446
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Gold Wave Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2947d335e991d9e3e2957d1c9814bf761bf9f8127ac37c4430099438d50444d2
Secunia Security Advisory 30447
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in various HiFi products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 894b9968873837b644432f9ac1fd927a52429f99bbfa9eca5fd803b33c4ad8c2
Secunia Security Advisory 30459
Posted May 30, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in various Color7 Technology products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 740ab8393f2b72a0afb7e2247b30e656cbeeba69587095d2fab42dbf23ac3248
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close