ip Microsoft Workstation Service NetpManageIPCConnect Overflow By packetstormsecurity.com Published On :: Thu, 31 Dec 2009 03:20:56 GMT This Metasploit module exploits a stack overflow in the NetApi32 NetpManageIPCConnect function using the Workstation service in Windows 2000 SP4 and Windows XP SP2. In order to exploit this vulnerability, you must specify a the name of a valid Windows DOMAIN. It may be possible to satisfy this condition by using a custom dns and ldap setup, however that method is not covered here. Although Windows XP SP2 is vulnerable, Microsoft reports that Administrator credentials are required to reach the vulnerable code. Windows XP SP1 only requires valid user credentials. Also, testing shows that a machine already joined to a domain is not exploitable. Full Article
ip ECLIPSEDWING 1.5.2 Windows 2000 / 2003 / XP MS08-67 SMB Exploit By packetstormsecurity.com Published On :: Sat, 15 Apr 2017 01:44:59 GMT ECLIPSEDWING exploits the SMB vulnerability patched by MS08-67. It affects Microsoft Windows 2000, 2003, and XP. Note that this exploit is part of the recent public disclosure from the "Shadow Brokers" who claim to have compromised data from a team known as the "Equation Group", however, there is no author data available in this content. Consider this exploit hostile and unverified. For research purposes only. Description has been referenced from http://medium.com/@networksecurity. Full Article
ip hir10.zip By packetstormsecurity.com Published On :: Wed, 15 Dec 1999 19:05:05 GMT Hackers Information Report #10. Contains Defcon 7 in a nutshell, Flying Below The Radar: Avoiding IDS Systems, BeOS Revealed, RISC, CISC and The concept of the Power-PC, and Hacker News. Full Article
ip zipcrkpw.zip By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 16:56:13 GMT Gets the password out of encrypted ZIP files Full Article
ip John The Ripper 1.7.3.4 By packetstormsecurity.com Published On :: Mon, 21 Sep 2009 17:26:16 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
ip John The Ripper 1.7.4 By packetstormsecurity.com Published On :: Wed, 30 Dec 2009 06:00:36 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
ip John The Ripper 1.7.5 By packetstormsecurity.com Published On :: Fri, 26 Feb 2010 19:07:15 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well. Full Article
ip John The Ripper 1.7.6 By packetstormsecurity.com Published On :: Wed, 16 Jun 2010 01:48:44 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.6 Jumbo 11 By packetstormsecurity.com Published On :: Tue, 08 Feb 2011 04:49:46 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
ip John The Ripper 1.7.6 Jumbo 12 By packetstormsecurity.com Published On :: Wed, 16 Feb 2011 19:22:11 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
ip John The Ripper 1.7.7 By packetstormsecurity.com Published On :: Thu, 28 Apr 2011 12:12:12 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
ip John The Ripper 1.7.7 By packetstormsecurity.com Published On :: Fri, 29 Apr 2011 03:51:02 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
ip John The Ripper 1.7.7 Jumbo 5 By packetstormsecurity.com Published On :: Fri, 03 Jun 2011 20:22:22 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
ip John The Ripper 1.7.7 Jumbo 6 By packetstormsecurity.com Published On :: Thu, 09 Jun 2011 15:46:26 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. This is the community enhanced version. Full Article
ip John The Ripper 1.7.8 By packetstormsecurity.com Published On :: Fri, 24 Jun 2011 09:05:49 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.8 Jumbo 2 By packetstormsecurity.com Published On :: Tue, 05 Jul 2011 00:27:53 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.8 Jumbo 4 By packetstormsecurity.com Published On :: Sun, 24 Jul 2011 15:32:20 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.8 Jumbo 5 By packetstormsecurity.com Published On :: Thu, 04 Aug 2011 00:04:00 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.8 Jumbo 7 By packetstormsecurity.com Published On :: Thu, 22 Sep 2011 05:56:59 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.8 Jumbo 8 By packetstormsecurity.com Published On :: Thu, 10 Nov 2011 02:42:41 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.9 By packetstormsecurity.com Published On :: Sun, 27 Nov 2011 18:09:38 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.9 Jumbo 5 By packetstormsecurity.com Published On :: Mon, 19 Dec 2011 02:25:02 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.9 Jumbo 6 By packetstormsecurity.com Published On :: Mon, 02 Jul 2012 23:53:25 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.7.9 Jumbo 7 By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 06:17:27 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip John The Ripper 1.8.0 By packetstormsecurity.com Published On :: Fri, 31 May 2013 02:49:42 GMT John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes. On top of this, many other hash types are added with contributed patches, and some are added in John the Ripper Pro. Full Article
ip xdial.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
ip wdial20.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
ip wdial.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
ip vex_war.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
ip ultra.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
ip ultra-d3.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
ip bbeep010.zip By packetstormsecurity.com Published On :: Tue, 17 Aug 1999 00:14:22 GMT No information is available for this file. Full Article
ip Kalimba.zip By packetstormsecurity.com Published On :: Sun, 02 Jan 2005 20:56:47 GMT Win32 based wardialer called Kalimba. Included Blue Box capabilities, such as 0 - 9 dialing, quarter, dime, nickel tones, Operator tones, conference capabilities. Source included. Full Article
ip iwar-0.06-DOS.zip By packetstormsecurity.com Published On :: Sat, 03 Dec 2005 07:20:10 GMT Iwar is a war dialer written for Unix type (Linux/OpenBSD/etc) operating systems. It supports a nice curses based front end, ASCII/MySQL logging, system identification, multiple modems support, random/sequential dialing, key stroke logging, and more. Note: this is the Cygwin version. Full Article
ip Top 10 Data Breach Survival Tips After eBay, Spotify, And Office Breaches By packetstormsecurity.com Published On :: Mon, 02 Jun 2014 02:31:54 GMT Full Article headline hacker privacy data loss ebay
ip Lazy Sysadmins Rooted In Looming Mozilla Cert Wipeout By packetstormsecurity.com Published On :: Wed, 20 Aug 2014 15:06:42 GMT Full Article headline flaw ssl mozilla cryptography
ip SUSE/Portus 2.2 Cross Site Scripting By packetstormsecurity.com Published On :: Tue, 19 Sep 2017 15:23:59 GMT SUSE/Portus version 2.2 suffers from a persistent cross site scripting vulnerability. Full Article
ip Microsoft Cites BBC, Wikipedia In Error-Filled DMCA Takedown By packetstormsecurity.com Published On :: Mon, 08 Oct 2012 17:12:00 GMT Full Article headline microsoft dmca
ip Gaddafi Death Reports Likely To Spawn Multiple Scams By packetstormsecurity.com Published On :: Thu, 20 Oct 2011 23:22:09 GMT Full Article headline scam libya
ip prott_packV01A.zip By packetstormsecurity.com Published On :: Fri, 23 Sep 2005 07:32:28 GMT Protty is a ring 3 library developed to protect against shellcode execution on Windows NT based systems. Full Article
ip lbrute.zip By packetstormsecurity.com Published On :: Wed, 12 Apr 2006 04:22:52 GMT lbture is a local Windows account password brute forcer. It supports dictionary attacks and resume. Works on Windows NT/2K/XP/2K3. Full Article
ip NBTEnum33.zip By packetstormsecurity.com Published On :: Wed, 29 Nov 2006 02:41:50 GMT NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. The enumerated information includes the network transports, NetBIOS name, account lockout threshold, logged on users, local groups and users, global groups and users, and shares. If run under the context of a valid user account additional information is enumerated including operating system information, services, installed programs, Auto Admin Logon information and encrypted WinVNC/RealVNC passwords. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP/2003. PERL source included. Full Article
ip Microgrid Economics: It Takes a Village, a University, and a Ship By feedproxy.google.com Published On :: 2014-09-30T13:55:00Z As a businessman exploring investments, I need simple answers, however complicated the problem. I wish to know: Are microgrids economical? How much investment is needed and for what? What are the factors that principally affect profitability, within the system and in the environment? If microgrids are not profitable at the present, when will they be? I recognize that understanding microgrids as a system requires complicated mathematics and modeling. I’m sympathetic to and respect those who do that. Full Article Microgrids Energy Efficiency Microgrids Hydropower Storage Bioenergy Wind Power Baseload Grid Scale Energy Efficiency Opinion & Commentary Solar Geothermal
ip Halifax Water Generates Power from a 32-kW In-pipe Small Hydroelectric System By feedproxy.google.com Published On :: 2014-11-18T14:43:00Z Halifax Regional Municipality of Nova Scotia, Canada, is the first Canadian city to use an in-pipe hydroelectric generation system within a pressurized water distribution pipeline, according to Halifax Water. On Nov. 13, a 32-kW generating system within a drinking water distribution control chamber for Halifax Water began providing power. Full Article Energy Efficiency Energy Efficiency Policy Hydropower Baseload
ip Want to Buy a Used German Power Plant? Shipping Is Included By feedproxy.google.com Published On :: 2015-02-02T16:17:00Z Germany’s utilities, battered by the country’s shift to wind turbines and solar panels, would be glad to sell you a power plant on the cheap. They’ll even pack it up and ship it to another country. Full Article Storage Wind Power Solar
ip Japan Anticipates Clean Energy Will Edge Out Nuclear Power By feedproxy.google.com Published On :: 2015-04-28T18:12:00Z Japan anticipates that by 2030 clean energy such as solar and hydro will generate slightly more of the nation’s electricity than nuclear power plants. Full Article Storage Energy Efficiency Wind Power Solar
ip Tidal energy company tests prototype in Canadian archipelago, Haida Gwaii By feedproxy.google.com Published On :: 2016-08-17T18:41:00Z British Columbia-based tidal developer, Yourbrook Energy Systems Ltd., is testing what it calls a prototype of a shallow water tidal-powered generator pump that could one day be used as part of a pumped storage hydroelectric project. Full Article Baseload Storage
ip International Geothermal Industry Developing Strong Partnerships, Robust Market By feedproxy.google.com Published On :: 2013-10-14T16:23:00Z This year’s Geothermal Energy Association (GEA)’s Geothermal Energy Expo and Geothermal Resources Council’s Annual Meeting incorporated a wide range of meetings on international development. U.S. interest in exporting geothermal goods and services is ever-increasingly met with outside interest in U.S. knowledge and materials, particularly from developing countries. Full Article Baseload
ip Four Green Dividend Stocks that IPO'd In 2013 By feedproxy.google.com Published On :: 2013-11-11T10:02:00Z Canada’s stock exchanges have long had the lead as the place for energy infrastructure companies to list. This includes green energy, as well as the fossil fueled sort. Because Canada’s reporting rules are somewhat less stringent, and its markets less liquid than those in the U.S., the large number of offerings trade at lower valuations and higher yields than do their (few) U.S.-listed equivalents. Full Article Wind Power Baseload Solar
ip Global Renewable Energy Should Triple to Save Climate, UN Panel Says By feedproxy.google.com Published On :: 2014-04-14T13:45:00Z The world needs to triple the energy it gets from renewables, nuclear reactors and power plants that use emissions-capture technology to avoid dangerous levels of global warming, United Nations scientists said. Full Article Wind Power Storage Solar