exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Wietse Venema

Email addresswietse at porcupine.org
First Active2000-08-01
Last Active2011-05-10
Postfix SMTP Server Memory Corruption
Posted May 10, 2011
Authored by Wietse Venema

The Postfix SMTP server has a memory corruption error when the Cyrus SASL library is used with authentication mechanisms other than PLAIN and LOGIN (the ANONYMOUS mechanism is unaffected but should not be enabled for different reasons).

tags | advisory
advisories | CVE-2011-1720
SHA-256 | 701d670361d261d971bf5cb536af214e19dc67b4b2410370bfd209a2bf95cc86
STARTTLS Plaintext Injection
Posted Mar 7, 2011
Authored by Wietse Venema

Multiple SMTP implementations suffer from a plaintext injection vulnerability with STARTTLS.

tags | advisory
advisories | CVE-2011-0411
SHA-256 | 9f712fa40e77ec9b23f56ccf53d3c72849e5a9e1a7738c614836c68c8b9595c8
postfix24-dos.txt
Posted Sep 3, 2008
Authored by Wietse Venema

Postfix versions 2.4 and above when used on the Linux 2.6 kernel suffer from a denial of service vulnerability.

tags | advisory, denial of service, kernel
systems | linux
SHA-256 | f320271050cde8f2437f06d2143b83f4409ae88a25a2a4ad510f5208a72c5243
postfix-ruhroh.txt
Posted Aug 14, 2008
Authored by Wietse Venema

Postfix on modern Solaris and Linux filesystems can be leveraged for privilege escalation via hardlinks.

tags | advisory
systems | linux, solaris
SHA-256 | 12bd88e815295c4074d5be5793c2360cccc6140d32920eac7f6cedbfc4da9357
tct-1.15.tar.gz
Posted Nov 19, 2004
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, Solaris, and SunOS. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

Changes: Big bug fixes, and really cool new features. Everyone needs to download and use this, right now. Do not delay.
tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | 4c8e343453332bd1fdf0627f9b888e2a4f597e70b367f124cc7f2562558213a1
tct-1.09.tar.gz
Posted Dec 18, 2001
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, Solaris, and SunOS. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

Changes: Added large file support for linux. Fixed a bad off by one bug in unrm. New grave-robber -I option for better control of icat/pcat. Fixed lots of bugs. Updated documentation.
tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | 40c43f9dd527192a2d17123c639020ca7431eb4a2af3dc31432c14373fcc0856
tct-1.05.tar.gz
Posted Jan 26, 2001
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, Solaris, and SunOS. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

Changes: Fixes for the grave robber, added more switches, SunOS support added, and lots more misc fixes!
tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | e4438d2f382400b4536a7defbae70fd2a6c1e333051c013b1c5bebb0630a46cd
tct-1.0.tar.gz
Posted Aug 1, 2000
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, and Solaris. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | fce955a06d118664ebcbb0d9360ef897a8c0150f57b63742153a2faa4d4d662b
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close