Sscan2k is a remote auditing tool which scans for more than 200 known vulnerabilities that are able to be found remotely. Features remote OS detection to prevent unecessary bandwidth usage, a scripting language, modules, improved multiple host scanning, and easy configuration.
3523683cf6c1ec13cc211610d4c5467915a0ef2f6ce1ec789979c6fd67fc545c
sscan2k-pre5, Remote Auditing Tool that scans for more than 200 known vulnerabilities that are able to be found remotely, It depends on the operating system that the target host is running on to check for the vulnerabilities to prevent unecessary bandwidth to be used. Now comes with an easy to use configuration program much like xf86config, it also brings the option to use NMAP to guess operating system or to use sscan2k's scripted modules which are very updatable by the user. Multiple host scanning was improved.
142651be5ebe17ddb59e411574ccb8d9778eb8ce60349d3c16584cafead65519
sscan was given to buffer0verfl0w security by jsbach for the project to be continued for jsbach. From now on sscan will go as sscan2k. sscan2k now has updated vulnerability checks and the code has also been cleaned up. This scanner is now a release of HWA.
67bbe3fc726dad8001a1316048e0168304b62884accaa1d0ccdd859f189155a9
HWA-warpcrash - Systems Affected: OS/2 Warp 4.5 FTP server V4.0/4.2, OS/2 Warp 4.5 FTP server V4.3, Probably other versions of the software as well. Problem: The FTP server that comes with OS/2 Warp 4.5 TCP/IP can be brought down by a malicious connection attempt.
cf8fada37f8c1613e87c090555684cc0f5c51d3e63815104a2e3e47aeb5420ca
sscan2k is a remote auditing/vulnerability scanner which determines remote OS, and scans the host for applicable vulnerabilities. Features updated vulnerability checks, a scripting language, support for plugins and addons, configureable OS fingerprints, dns zone and subnet scans. Based off sscan by jsbach.
e2be5ced88ce06701e0d2a7db26865443180d8781bcf73eb59d9ca6eba9ccc71
sscan was given to buffer0verfl0w security by jsbach for the project to be continued for jsbach. From now on sscan will go as sscan2k. sscan2k now has updated vulnerability checks along with all the other great features it had before, improved OS detection (user can update the fingerprints by editing Osdefs.ms [which comes in sscan2k scripting language]), etc.
a6f61002b67b260dd9f801c9a629380896d815e51bf747ee8b98e09a42b77705
Timbuktu Pro 2.0b650 denial of service exploit.
57c923b60dc99c9f00bd5df5a3490c3875a21a218befdfb11e7d5e49b5bd8ac6
WarFtpd dos attack - The buffer overflow seems to occur because the bound check of the command of MKD/CWD is imperfect. War FTPd 1.70-1 does fix this problem, but it contains other vulnerabilities.
75f5fa10bdcb027b11108ada9ad43286eb50f3575be3fbcb51715841603aff32
The following userspace code will locally hang recent linux machines. The send system call immediately puts the kernel in a loop spewing kmalloc: Size (131076) too large. Linux 2.2.14 and 2.3.99-pre2 are vulnerable.
45b0fb037bd3274c47ba26f3c0a580d1dddbc4ee423482056d3cda35938d40b1
Pirch98 irc client ident/fserve daemon DoS overflow attack.
a51683485dd5235a1ce5acee72a775e40b0a4252d1745c90c283550c164014c7
A sample ipchains firewall script, featuring many options you can uncomment.
c73bf8b50e6482f94f2b58e1d0d9d22ff9f47189b62981413f8451f53b316756