Re: Ports vulnerability database

From: Bush, Donald (Donald.Bushat_private)
Date: Fri Apr 13 2001 - 13:10:01 PDT

  • Next message: Mindspring E-Mail: "Re: Hack / take down new Windows XP beta server http://www.testwindowsxp.com/"

    this one has a stockpile of exploit scripts arranged by port number - it is
    a start but not all inclusive
    
    http://www.technotronic.com/tcpudp.html
    
    
    Donald Bush, CISA, CIA
    Information Systems Audit Supervisor
    Corporate Management Audit
    donald.bushat_private <mailto:donald.bushat_private>
    
    -----Original Message-----
    From: Nelson Brito [mailto:nelsonat_private]
    Sent: Monday, April 09, 2001 11:48 AM
    To: VULN-DEVat_private
    Subject: Re: Ports vulnerability database
    
    
    "Robert G. Ferrell" wrote:
    >
    > >Does anybody know about a database where one can find
    > >for any port, i.e. 25 SMTP, the possible
    > >vulnerabilities or exploits?
    >
    > Hi Zar,
    >
    > There are several such databases.  Here's the URL for mine:
    >
    > http://rgfsparc.cr.usgs.gov:8090/sysadmin/ports.html
    
    I don't think that Zar's question is about TROJANS.
    
    What he wants is a completely list about BUG for PORT NUMBER, example:
    25 TCP - Sendmail mime overflow, Lotus MAIL FROM overflow, CMail's MAIL FROM
    overflow, NTMail3 spam feature, etc...
    
    Unfortunately, I can't point out a database whit this approach, but you can
    try
    to get Nessus Plugins and search for service name. I don't know, may be what
    Zar
    wants:
    http://cgi.nessus.org/plugins/dump.php3?viewby=family
    
    >
    > Cheers,
    >
    > RGF
    >
    > Robert G. Ferrell, CISSP
    > ========================================
    >  Who goeth without humor goeth unarmed.
    > ========================================
    
    Sem mais,
    --
    # Nelson Brito <nelsonat_private>
    # Security Analyst and Penetration Tester
    # Security Networks AG - The trust Company!
    #
    # Usage: cat <file> | perl signature.pl
    foreach(<STDIN>){chop;split(//,$_);print reverse @_;print "\n";}
    



    This archive was generated by hypermail 2b30 : Sat Apr 14 2001 - 00:06:28 PDT