what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 67 RSS Feed

Files

ncpquery-1.3.tar.gz
Posted Oct 21, 2003
Authored by Simple Nomad | Site razor.bindview.com

NCPQuery is an open source tool that allows probing of a Novell Netware 5.0/5.1 server running IP. It uses TCP port 524 to enumerate objects with public read access, disclosing such information as account names, server services, and other various objects. A remote attacker can gather the equivalent information provided by the console command "display servers" and the DOS client command "cx /t /a /r" without authentication. Includes a Win32 port.

tags | remote, tcp
systems | windows
SHA-256 | 354012e902e80df46b1bf28adfc90559ba18f2db45bf019a1b8745c756211795
adv_novellleak.txt
Posted Nov 14, 2000
Authored by Simple Nomad | Site razor.bindview.com

Object Enumeration in Novell Environments - Due to a combination of legacy support and default settings, Novell Netware servers using native IP will leak system information via TCP port 524 when properly queried. In mixed Novell/Microsoft environments, information regarding Microsoft devices is leaked via the Service Advertising Protocol (SAP) table. Third party products, such as those used to synchronize directory services between environments can further the problem. Essentially, a remote attacker can gather the equivalent information provided by the console command "display servers" and the DOS client command "cx /t /a /r" without authentication.

tags | remote, tcp, protocol
SHA-256 | f09861f9843c17db74e28912eb8310b10f91156447711890837c68c8aac45b4e
ncpquery-1.2.tgz
Posted Nov 13, 2000
Authored by Simple Nomad | Site razor.bindview.com

NCPQuery is an open source tool that allows probing of a Novell Netware 5.0/5.1 server running IP. It uses TCP port 524 to enumerate objects with public read access, disclosing such information as account names, server services, and other various objects. A remote attacker can gather the equivalent information provided by the console command "display servers" and the DOS client command "cx /t /a /r" without authentication.

tags | remote, tcp
SHA-256 | 97f05208a1c028a90715780ea2c8dea387e4888c2aff9bf2d8ce53286f2f65ce
netware-qloop.tgz
Posted Feb 15, 2000
Authored by Marty Frasier

Several previously unreleased utilities for hacking Netware 3. Qloop and Qloop 2 take superviser privileges if the superuser prints something. Addobj allows user to add objects specifying name, type and whether it's a login account. Qlogin users to login to accounts which are not user type. Lstpsrv lists print servers on target server.

SHA-256 | 03043d45b63bd48add549e98ca0ca468d8c94adc18c851ada3b0bdc6ed071090
pandora_linux_v4.0_b2.1.tgz
Posted Dec 2, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2.1 Netware Attack tool for Linux - Offline password auditing and Online attack for the X Windows platform on Linux. The Online software requires an IPX-aware kernel and root.

Changes: Jitsu-Disk finished moving the Pandora Linux code so that Pandora Linux uses libpcap and libnet. A number of problems have been corrected from the beta release on November 19th, including several problems involving spoofing and sniffing. Libnet helped Jitsu fix all that. We've updated the documentation, included all the code we used to do the builds, pre-compiled binaries, and wrapped it up in a nice big tarball for your hacking needs.
tags | kernel, root
systems | linux, windows
SHA-256 | 04176a26ae4765b00ef4e4f75faf0e72600d8e13e260d89cfd33ce9a9697bc98
pan_linux_src_b2.tgz
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 Full Source Code for Linux.

systems | linux
SHA-256 | 6289c497b8bcdbb15790b35262f4b9178a0cb00e7ffac4bf3b561bb7a96ab924
pan_docs_b2.zip
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

BETA - Documentation on using Pandora v4, with updated white papers, tips, and tricks. Included with the regular software, download this if you just wish to read the docs.

SHA-256 | 44e204f97e6c01e95f171dedd42e4589b8b55ec79a6b5d9d7868521bb2ed6bce
pan_src_b2.zip
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 Full Source Code for Windows.

systems | windows
SHA-256 | db40217fe9c204f517fc1c297739c59110cd3db27f3c17085c141a05c0c4c1fa
pan_linux_b2.tgz
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 for Linux BETA 2 - Offline password auditing and Online attack for the X Windows platform on Linux. The Online software requires an IPX-aware kernel and root. THIS SOFTWARE IS SUBJECT TO CHANGE FAIRLY QUICKLY, SO CHECK BACK OFTEN. Tar xvzf in your fave dirctory and build an icon to online/Pan-on in your fave X Windows manager. Hack Netware 4 and 5 from Linux!

tags | kernel, root
systems | linux, windows
SHA-256 | 59c80875d872f13fe9e905a9994b46635800ae3a01f1accd3a63d809ba9ebd59
pan_online_NT_b2.zip
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 Online for Windows NT BETA 2 - Online point and click attacking of Novell Netware from Windows NT. Currently spoofing works but lots of crashes on SP3 (we're working on it). Unzip and run the setup.exe program. DO NOT FORGET TO INSTALL THE PACKET DRIVER OR THIS PROGRAM WILL NOT WORK!

tags | spoof
systems | windows
SHA-256 | d91c583bef20173ab5fc33a5877053eaa74ce5b7eb172fab7b4db670614c764d
pan_online_95_b2.zip
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 Online for Windows 95/98 BETA 2 - Online point and click attacking of Novell Netware from Windows 95/98. Unzip and run the setup.exe program. DO NOT FORGET TO INSTALL THE PACKET DRIVER OR THIS PROGRAM WILL NOT WORK!

systems | windows
SHA-256 | 36c2d370416cc675506924ffe914c39de77ba897ac6e9152960d99152ccfd8e3
pan_offline_pentium_b2.zip
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 Offline for Windows 95/98/NT BETA 2 - Offline Novell password auditing for the Windows platform. Unzip and run the setup.exe program. Fully optimized for Pentium platforms to maximize password cracking.

systems | windows
SHA-256 | be5edd61749ef0a35dd50d9a007f8fe9b8e55331a82504bdb76d99e71a1b07ea
LOGINW32.zip
Posted Oct 26, 1999
Authored by Eliptic Curve

A simple GUI trojan that when added to the autostart *see regedit* registry will log the passwords of the Novell NetWare School Vista user to c:\windows\samples .txt. Loginw31.exe is an exact duplicate of the login while Login31(2).exe is a system confirmation tricking the user to re-enter their password.

tags | trojan, registry
systems | windows
SHA-256 | 58d1a61a0dad0a8bd9fdf8856cb55f06ea965f5b92b98a29653c46aae61937c7
ShadowNWCrack.zip
Posted Sep 25, 1999

Code for breakings Novell NetWare 4.x.

SHA-256 | cbd05859bbddf1c5d3c5acf3389bad1ff92379e7e211163ca83bddf8cd568205
pandora2.zip
Posted Aug 17, 1999

Pandora 2 for DOS.

SHA-256 | e3e0aaaa65217d2bbda0ec6605d1257a192eedccf8ab9433d3d3518c6288b14e
imp21-auto.exe
Posted Aug 17, 1999
Authored by Wastelands Technologies

imp v2.1 (self-extracting) - Imp is a NetWare password cracking utility with a GUI (Win95/NT). It loads account information directly from NDS or Bindery files and and allows the user to attempt to compromise the account passwords with various attack methods. It is based heavily on (and in fact "borrows" all the crypto code from) the Simple Nomad and NMRC. New features in this release: bindery support, template attack, passwords saved between sessions, optional installation utility, plus many, many bug fixes and code optimizations.

tags | cryptography
systems | windows
SHA-256 | 3513eb1060c5b109e0eb39667a341d0d3d96f3aacb996ca9ee89e1b0515bc713
imp211-auto.exe
Posted Aug 17, 1999
Authored by Wastelands Technologies

Imp v2.11 (self-extracting archives) is a NetWare password cracking utility with a GUI (Win95/NT). It loads account information directly from NDS or Bindery files and and allows the user to attempt to compromise the account passwords with various attack methods. It is based heavily on (and in fact "borrows" all the crypto code from) the "Pandora" project by Simple Nomad and the team at http://www.nmrc.org. Check out the Unofficial NetWare Hack FAQ for full details. Too many new features and bugfixes to list.

tags | web, cryptography
systems | windows
SHA-256 | d7db05f28ce797a47b5435d77fd7b5c14910f0a0a00804d82807d323c7f3c83a
helppandora.html
Posted Aug 17, 1999

FAQ for Pandora3.

SHA-256 | 601001e2e6e570c50754717d5ae3e72c365062e3ed1949f2e22590459227b91e
imp21.zip
Posted Aug 17, 1999
Authored by Wastelands Technologies

imp v2.1 (zipped) - Imp is a NetWare password cracking utility with a GUI (Win95/NT). It loads account information directly from NDS or Bindery files and and allows the user to attempt to compromise the account passwords with various attack methods. It is based heavily on (and in fact "borrows" all the crypto code from) the Simple Nomad and NMRC. New features in this release: bindery support, template attack, passwords saved between sessions, optional installation utility, plus many, many bug fixes and code optimizations.

tags | cryptography
systems | windows
SHA-256 | af9ba17c4959cd7df70ba15060fb092439d7b18b92312c1738dd42a6d7387e41
pandora3-api.txt
Posted Aug 17, 1999

Pandora3 API.

SHA-256 | 8030942efcff25071ce70e4fae35b641d00477059eea10000242a30c56db48af
pandora3-src.zip
Posted Aug 17, 1999

Pandora 3 source code for DOS.

SHA-256 | e44d75f944ca82eb3ac7aa1af8b56e8478f27e799213cd32da9b52704b0e4cd4
pandora3.zip
Posted Aug 17, 1999

Pandora v3.01 binary for DOS.

SHA-256 | baac8c4d3e99f8b8752f2789cb64a6b3bb515b04b5a3e48ad7634c71a6cb78e2
Csdpmi3b.zip
Posted Aug 17, 1999

Charles Sandmann's DPMI provider, binaries.

SHA-256 | e1dae4feb639ebf3384501de35eaeef1478d1f8f91286dfd803d8422d8452432
imp20.zip
Posted Aug 17, 1999

GUI interface for Pandora.

SHA-256 | e53713d7868faa141246bda25044d4ec0093b3fe1fefb5bba9b606dd99dbacd9
imp211.zip
Posted Aug 17, 1999
Authored by Wastelands Technologies

Imp v2.11 (non self-extracting archives) - Imp is a NetWare password cracking utility with a GUI (Win95/NT). It loads account information directly from NDS or Bindery files and and allows the user to attempt to compromise the account passwords with various attack methods. It is based heavily on (and in fact "borrows" all the crypto code from) the Simple Nomad and NMRC. New features in this release: bindery support, template attack, passwords saved between sessions, optional installation utility, plus many, many bug fixes and code optimizations.

tags | cryptography
systems | windows
SHA-256 | 0d9d2ea0fc9ef8969485df8c0e06fb2d2f21b53bf5e3e0d79a8415662a2eb3d5
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Power Pages Misconfigurations Exposing Sensitive Data
Posted Nov 15, 2024

tags | headline, privacy, microsoft, data loss
Man Gets 5 Years For Laundering Crypto From Bitfinex Hack
Posted Nov 15, 2024

tags | headline, hacker, data loss, fraud, cryptography
Five Eyes Infosec Agencies List 2024's Most Exploited Software Flaws
Posted Nov 14, 2024

tags | headline, government, usa, canada, britain, australia, flaw, new zealand
CISA, FBI Confirm China Hacked Telecoms To Spy
Posted Nov 14, 2024

tags | headline, government, privacy, usa, phone, china, data loss, cyberwar, spyware, backdoor
Two Men Charged For Hacking US Tax Preparation Firms
Posted Nov 14, 2024

tags | headline, hacker, privacy, usa, fraud, identity theft
Iranian Threat Group Targets Aerospace Workers With Fake Job Lures
Posted Nov 14, 2024

tags | headline, hacker, fraud, phish, iran
Air National Guardsman Gets 15 Years For Leaking Docs On Discord
Posted Nov 13, 2024

tags | headline, government, usa, data loss, military
Citrix, Cisco, Fortinet Zero-Days Among 2023's Most Exploited Vulnerabilities
Posted Nov 13, 2024

tags | headline, hacker, flaw, cisco, zero day
Ivanti Patches 50 Vulnerabilities Across Several Products
Posted Nov 13, 2024

tags | headline, flaw, patch
Intel And AMD Have Released Many Advisories
Posted Nov 13, 2024

tags | headline, flaw, patch, intel
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close