First public release of Q - a client / server backdoor with strong (256 bit AES) encryption for remote shell access. Also supports encrypted tcp relay/bouncer server that supports normal clients (with a local encryption tunneling daemon). Includes stealth features like activation via raw packets, syslog spoofing, and single-session servers that prevent it from appearing in netstat.
d7265225af4406ffa7e288ab5319b6ec454cdc37a2b202d271b4a02a5c08f0de
SuSE Security Announcement: bind8 here.
e9ff1adacc050405b9af047443d0fbd7e678cadfffa955f09d04d0898099bba3
The Vermillion ftp daemon (VFTPD) version 1.23 has a remote DOS attack. Example included.
364eb73941cc98cd5a2bce052f4c3f604902f79f987368276c4c0288d9a0028c
Hping is a software to do TCP/IP stack auditing, to uncover firewall policy, to scan TCP port in a lot of different modes, to transfer files accross a firewall, test network performance, test of TOS is handled, etc.
c19bda14665db021f54abe130046c9840e62b27b23c0ed336b2a606781558a42
CGI vulnerability found in meta.pl that allows a remote user.to view files on the system as the UID of the httpd server.
b7f7521aa7e1a5c8863f05860d8a9ccf5f935deae7fdd07e63ddbf8b161b997c
nmap 2.3beta8 staticly linked Linux/x86 rpm for Linux users without GTK.
b63cbf8a2897805023686f5d9da6af7ba9f43c9c5afec4ab449145b583cd204c
nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces and capabilities. Thus I incorporated virtually every scanning technique I know into nmap.
85d5167197de6b013ef0cd1cd1723f790818bc78888095caa6414a6a04156c68
ipaudit listens to a network link using promiscuous mode and gathers statistics on network usage. For every combination of host pair, port pair and protocol, it counts bytes and packets in both directions. After a fixed interval (30 minutes for example) ipaudit can be signaled (via kill command) to output its results. The text output can be processed into reports but the raw data can also be useful identifying heavy bandwidth consumers, intrusive telnet sessions, denial of service attacks, etc. There is also an option (like tcpdump) to save raw packets to specific ports for detailed subsequent analysis with packages such as tcpdump or ethereal.
982b4d7197acb8b92706652d9b2b43d7fd82be03e5ac8e480a7d688834cf94a8
A tutorial for a Unix newbie or semi-newbie who is interested in computer security and/or networking. Basic Local/Remote Unix Security: Change default configurations, basic packet filtering, how to secure your system's networking services (or completely remove them or some of them, in case you don't need them, in order to increate your computer's security), how to use, how to avoid trojans, what are sniffers, how to maintain local security between different users in your system (if you're not the only one using this system, whether it's locally or remotely), some stuff about SSH, how to protect yourself against computer viruses under the Unix system, what are security scanners and how to use them, why you should encrypt your important data and how etc'.
752f8d456cd2997c648ad6a15e70646527e51406f91a4e955ca9031248eac546