Tool: PorkBind v1.3 Nameserver Security Scanner (New Version)

2008-08-18 Thread Derek Callaway
This program retrieves version information for the nameservers of a domain and produces a report that describes possible vulnerabilities of each. Vulnerability information is configurable through a configuration file; the default is porkbind.conf. Each nameserver is tested for recursive queries a

Re: Fwd: ircii-4.4 buffer overflow

2000-03-14 Thread Derek Callaway
I brought attention to this same vulnerability back in June of 1997. See http://www.dataguard.no/bugtraq/1997_2/0543.html. It's a shame the problem still exists. I wouldn't be suprised if other, somewhat newer clients had the same sort of trouble. -- /* Derek Callaway <[EM

(fwd) Dump/restore 0.4b15 released

2000-03-07 Thread Derek Callaway
c59KhNEj1nR9tyTBI4AMOjlf3lH00Zbrujnf/Aid Oh3UDmMabrwwx7mEQ1GsQ7AttXY+pwtyJJAhyTlr9NzAjS+lzsc+HAA6wKXttkj+ xKbotaLOXks= =6tgS -END PGP SIGNATURE- -- end of forwarded message -- -- /* Derek Callaway <[EMAIL PROTECTED]> : Programmer; CE Net, Inc. -- S@IRC */ char *sites[]={"http://www.freezersearch.

Re: [ Hackerslab bug_paper ] Linux dump buffer overflow

2000-03-03 Thread Derek Callaway
g code and the signal handler for SIGSEGV. -- /* Derek Callaway <[EMAIL PROTECTED]> char *sites[]={"http://www.geekwise.com", Programmer; CE Net, Inc. "http://www.freezersearch.com/index.cfm?aff=dhc", (302) 837-8769 "http://www.homeworkhelp.org",0}; S@IRC */

Re: [ Hackerslab bug_paper ] Linux dump buffer overflow

2000-03-01 Thread Derek Callaway
time.c:32 #5 0x804adde in main (argc=1094795585, argv=0x41414141) at main.c:355 (gdb) [super@white dump]$ >From this gdb session, it appears that there _could_ be a problem with the way that glibc's time functions behave. -- /* Derek Callaway <[EMAIL PROTECTED]> char *sites[]={"

userhelper/PAM exploit

2000-01-05 Thread Derek Callaway
ello-root.c rm /tmp/hello-root.c chmod 0700 /tmp/login /usr/sbin/userhelper -w ../../../tmp/login rm /tmp/pamper.so rm /tmp/login -- /* Derek Callaway <[EMAIL PROTECTED]> char *sites[]={"http://www.geekwise.com", Programmer; CE Net, Inc. "http://www.freezersearch.com/index.cfm?aff=dhc", (302) 854-5440 Ext. 206 "http://www.homeworkhelp.org",0}; */

Re: remote DoS against inetd and ssh

1999-09-10 Thread Derek Callaway
key: > * mailto:[EMAIL PROTECTED] * finger:[EMAIL PROTECTED] > * http://www.tenet.pl* 18 E9 5E 6D 78 F0 11 F2 > ** 45 CF CF 63 77 C0 A4 20 > strcpy(hostent->h_name,"jerry.garcia.rocked.com"); Derek Callaway <[EMAIL PROTECTED]> Programmer -- CE Net, Inc.