what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 1999-10-13

pepsi.txt
Posted Oct 13, 1999

Sil of AntiOffline has discovered a disturbing bug in cans of Pepsi and Diet Pepsi. Apparently he has notified the vendors of this problem, yet they steadfastly refuse to release a patch. All known versions are affected. With Coke and Pepsi having most of the market share in cola drinks, surely this is an another argument for more soft drink diversity!

tags | exploit
SHA-256 | d269a0eb52cf0d0eab565a5afb0264fff9a992aef99a2ba9e47ea522849a6eee
lisapaper.ps
Posted Oct 13, 1999
Authored by Martin Roesch

PostScript version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.

tags | paper
SHA-256 | 07ce0af9507b3d59633a10839dec73e882872e79cab1fd4d98721ac7e992577d
lisapaper.txt
Posted Oct 13, 1999
Authored by Martin Roesch

Text version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.

tags | paper
SHA-256 | 4af7dd6373c07359980c03139c1927b168d13a6111720b6467405f02a2200192
hunt-1.4.tgz
Posted Oct 13, 1999
Authored by Pavel Krauz

Hunt is a program for intruding into a connection, watching it and resetting it. (source code package). It has several features, which I didn't find in any product like Juggernaut or T-sight that inspired me in my development. Note that hunt is operating on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. The hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Changes from 1.3: eth tap relay - transproxy support without my eth mac spoofing, support for spoofing range of IP addresses, relaying packets in arp-relayer that are sent from/to routers, support for arp-spoof of hosts that are currently down, tpserv/tpserv.c transproxy testing program tpsetup/transproxy script for setting transproxy support mode.

tags | tool, local, spoof, sniffer
SHA-256 | 67bf57a29fe9cba3fbf27789e5ca66a5b59eb00eccb4775058cd8013fdd2288c
hunt-1.4bin.tgz
Posted Oct 13, 1999
Authored by Pavel Krauz

Hunt is a program for intruding into a connection, watching it and resetting it. (linux binary distribution). It has several features, which I didn't find in any product like Juggernaut or T-sight that inspired me in my development. Note that hunt is operating on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. The hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Changes from 1.3: eth tap relay - transproxy support without my eth mac spoofing, support for spoofing range of IP addresses, relaying packets in arp-relayer that are sent from/to routers, support for arp-spoof of hosts that are currently down, tpserv/tpserv.c transproxy testing program tpsetup/transproxy script for setting transproxy support mode.

tags | tool, local, spoof, sniffer
systems | linux
SHA-256 | 4fbc536818885a42c005c10ae3f0bf335a07d693ae2b5626b127ad46db0f40b4
snort-1.3.1.tar.gz
Posted Oct 13, 1999
Authored by Martin Roesch

Version 1.3.1 of Snort, the lightweight network intrusion detection system. Version 1.3.1 fixes an annoying crash bug, plus enhances a number of features of the program. Invalid ICMP types/codes can now be filtered or monitored, the tcpdump file playback facility can use BPF filters, and the packet payload size check keyword now accepts greater than/less than modifiers.

tags | tool, sniffer
SHA-256 | 6a7e0f7ecefe5665e005a26a74d0f35b9b2e824811ed00eef81ffb1e6a9b589b
bo120p07.zip
Posted Oct 13, 1999
Authored by su1d sh3ll

Patched version of back oriface which is not detected by DrWeb 4.x,sPIDER, AVP 3.0, or Norton Antivirus 5.0 win (base 18.11.98). BO version 1.20 patch 7. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | fcf192e868551e1cd5a3215303ca93595b2992b105541f6e76633cfffacb16e1
ucgi1565.zip
Posted Oct 13, 1999
Authored by su1d sh3ll

CGI vulnerability scanner version 1.56. Checks for over 90 CGI vulnerabilities. Tested on slackware linux with kernel 2.0.35-2.2.5, Freebsd 2.2.1-3.2, IRIX 5.3, DOS, and windows.

tags | kernel, cgi, vulnerability
systems | linux, windows, unix, freebsd, irix, slackware
SHA-256 | d7b293de5c0726621fc1fb781af0ef65a2cb57ac2a7465b5520f3f022b7a4f76
winfingerprint-218.zip
Posted Oct 13, 1999
Authored by Vacuum

Winfingerprint 2 is a console based Win32 discovery tool. It is written in VC++ 6, and is currently in the process of being developed.

systems | windows
SHA-256 | c6a1d75b61c3aac9f360d6afc530bc566057e23afa408505e3b508f155f0b914
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close