exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 1999-10-20

Posted Oct 20, 1999
Authored by Balazs Scheidler

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

tags | system logging
systems | unix
SHA-256 | 3268511ae9f1414e806b77721fc112e223e9a71148fa897a9aedc40efec4656b
Posted Oct 20, 1999
Authored by Olaf Selke

With FireWall-1 Version 4.0 Checkpoint introduced support for the Lightweight Directory Access Protocol (LDAP) for user authentication. It looks like there's a bug in Checkpoint's ldap code which under certain circumstances can lead to unauthorized access to protected systems behind the firewall.

tags | exploit, protocol
SHA-256 | 2f81200bc55676da2428f3831cedb8e4b15c6bd29aae46ce2333a5340e0d9e94
Posted Oct 20, 1999

CERT Advisory CA-99-13 Multiple Vulnerabilities in WU-FTPD. Vulnerability #1: MAPPING_CHDIR Buffer Overflow, Vulnerability #2: Message File Buffer Overflow, Vulnerability #3: SITE NEWER Consumes Memory. www.cert.org

tags | overflow, vulnerability
SHA-256 | 8e37e792d87e069816cd63ecc35070e30a0e66e731d2571e15c663018a86a90b
Posted Oct 20, 1999

Microsoft has released a patch for two vulnerabilities in Microsoft(r) Excel 97 and 2000 that could allow macros to run without warning under certain conditions.

tags | vulnerability
SHA-256 | ecc44f5e05ed73fd7b288d6277cb2e7e3446135ecdc65adc8f23dd1a3ea28117
Posted Oct 20, 1999
Authored by Vacuum, rhino9 | Site technotronic.com

Versioner 0.3: Binary distribution. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.

SHA-256 | 4d3685e18caa24a5c95cd176daad82fe0be1325f446208facfc5663b4879c916
Posted Oct 20, 1999
Authored by Rick Crelia | Site sherpa.lavamonkeys.com

sherpa is a tool for configuring and then checking system security via the console. Written in perl, it allows an admin to maintain a custom database of file and directory permissions and ownership attributes as local needs dictate. Any changes from the prescribed layout will be detected each time sherpa is run. Also, sherpa does some basic system checks (world-writable files, .rhosts and hosts.equiv files, etc.) that help the busy admin keep on top of a system.

tags | tool, local, perl, intrusion detection
systems | unix
SHA-256 | 7d9a5cdc6b941a0b37126d89ee9153a4a21c836a27c959ffff39bb272ea1fff5
Posted Oct 20, 1999
Authored by Joe Thielen

GNU Phantom.Security is a computer-controlled security system. Using the software and a simple circuit board (diagram included) that you build, you can create a good basic security system that is computer controlled. The system can use off-the-shelf security devices like motion sensors, door magnets, and fire/smoke detectors with little to moderate modification. You can have a total of 5 devices per port. And if the machine the system is running on is connected to a LAN/WAN or the Internet, you can have it send e-mail. If you have a pager or cell phone capable of receiving e-mail, then you will have around the clock intrusion/fire detection for your home or office.

systems | unix
SHA-256 | 18a11f794308e0c3cd1b04c90e7ea4d5df3b3467e9d5033d314fc8913f19399c
Posted Oct 20, 1999
Authored by Stefan Ondrejicka | Site idata.sk

nscache is a simple program to browse the Netscape cache directory with a GTK UI. It shows the contents of the browser cache in a three level hierarchy of files: protocols, servers and documents. nscache permits you to files to the cache, remove files or gather various information about specific files.

tags | tool, protocol
systems | unix
SHA-256 | 94fd5850936898c1b9ee751cad57564faed5413d721ca9d964aec4bf81beec4c
Posted Oct 20, 1999
Site cs.uni-potsdam.de

Powerfull low-level network library which allows you to send modified/spoofed packets over the network. USI++ runs on Linux and FreeBSD systems and supports 10MBit, 100MBit and PPP-devices. v1.63 comes with some bugfixes; it now works properly on FreeBSD. USI++ requires libpcap. All linux and BSD distributions should include libpcap.

tags | tool, spoof
systems | linux, unix, freebsd, bsd
SHA-256 | 9b7fcdc2d00a0542cb58f687ea44daa72bc9684523f7c0ee8866a71fedbab354
Posted Oct 20, 1999
Authored by Mike Gumienny | Site sites.netscape.net

FCHECK is a very stable PERL script written to generate and comparatively monitor a UNIX system against its baseline for any file alterations and report them through syslog, console, or any log monitoring interface. Monitoring events can be done in as little as one minute intervals if a system's drive space is small enough, making it very difficult to circumvent. This is a freely-available open-source alternative to 'tripwire' that is time tested, and is easier to configure and use.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | b496520b28cfcbbf5d352dfe9a9b74dfc01978e4a1988f2a59f9f2c6ef4cf28b
Posted Oct 20, 1999
Authored by Renaud Deraison | Site hsc.fr

nstreams is a program that analyzes the networks streams occuring on a network and prints them in a human readable form. This is useful when you want to set up a firewall but do not know your needs/the needs of your customers. nstreams can read tcpdump output files or directly listen on a given interface, and may even produce ipchains (Linux) or ipfw (BSD) firewall rules instead of printing the streams, letting you build your firewall automagically.

tags | tool, sniffer
systems | linux, bsd
SHA-256 | 77454cfc041218cab3a61f305cbd3fc002577171bbe4e7359df387f8082d2e35
Posted Oct 20, 1999
Authored by Id Est

uredir is a program to redirect UDP packets to a port on another host. It has been tested on Red Hat 5.2 (Kernel 2.0.36 and 2.2.12).

tags | tool, kernel, udp
systems | linux, redhat, unix
SHA-256 | 12a50a69053375a214ffb4b3e2d08d676c431db8a9b067f0090972847a072c69
Posted Oct 20, 1999
Authored by Christian Lorenz | Site pweb.de.uu.net

SPY is a LAN Protocol Analyzer running on UNIX platforms. It has a built-in interface to capture LAN traffic via a network interface. This capture facility supports Ethernet, FDDI, SLIP/CSLIP, PPP and PLIP. SPY also provides a so called User Capture Interface (UCI), where own programs can feed SPY with their packets. Of course, captured data can be stored to files in binary format for later analysis. The capture facility provides prefilters on the MAC and IP layer (this does not mean, that SPY only supports IP networks). i386 version.

tags | tool, sniffer, protocol
systems | unix
SHA-256 | 065ef77d7378ca060dc07d7987f65dcea90a55a37b1952bd0a6de892c7373dd5
Posted Oct 20, 1999

AMD (amd V1) Automountd tiny Scanner by Bjunk. Works on a single host or a class C network.

tags | tool, scanner
systems | unix
SHA-256 | 6404cfa6697f3e00093fb0804a55a148322bc4d05eea710f7bc4901e18e90eb5
Posted Oct 20, 1999
Authored by Bob Braun | Site synack.net

xinetd is a secure replacement for inetd, the internet services daemon. Anybody can use it to start servers that don't require privileged ports because xinetd does not require that the services in its configuration file be listed in /etc/services. It can do access control on all services based on the address of the remote host and time of access. Access control works on all services, whether multi-threaded or single-threaded and for both the TCP and UDP protocols.

tags | tool, remote, udp, tcp, protocol
systems | unix
SHA-256 | cc0bc6f59dc3fc7ceaef09ba8bef393a7a2705fb9c257abf7a38abde68f5a355
Posted Oct 20, 1999
Authored by Francis Lacoste

Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. I t supports multiple interfaces, masquerading and packet accounting. Fwctl doesn't replace a good security engineer, but it can make the job of the security engineer simpler.

tags | tool, firewall
systems | linux
SHA-256 | 51013fde14758c8830e101f025304ac8ab54377d744982083e83c58588d9d2d1
Page 1 of 1

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    0 Files
  • 7
    Mar 7th
    0 Files
  • 8
    Mar 8th
    0 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    0 Files
  • 14
    Mar 14th
    0 Files
  • 15
    Mar 15th
    0 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By