what you don't know can hurt you
Showing 1 - 18 of 18 RSS Feed

Files Date: 1999-12-13

Posted Dec 13, 1999
Authored by Mixter

spidernet uses a network of host-based IDS and a logging monitor that allows to watch a large amount of remote systems for file changes of a defined list of files and for promisc network interfaces. Sessions are strongly encrypted with cast, and checksums are generated using the reliable md5 algorithm.

tags | remote
MD5 | 9311defcab11fa8616c55df11f9272af
Posted Dec 13, 1999
Authored by synnergy, elux | Site synnergy.net

Synnergy Networks msadc scanner - This is just a basic string scanner that happens to scan for the msadc module string.

MD5 | 848292758ce51eeecb718dea80503411
Posted Dec 13, 1999
Authored by Robert Osterlund | Site pikt.uchicago.edu

PIKT, an innovative new paradigm for administering heterogeneous networked workstations, is a multi-functional tool for monitoring systems, reporting and fixing problems, and managing system configurations. PIKT is quickly gathering potential as a serious security management system. PIKT comprises an embedded scripting language with unique, labor-saving features.

Changes: Ported to AIX & IRIX. Added several security enhancements, and a number of other fixes and improvements.
tags | tool
systems | unix
MD5 | 697877d848b89ba32928527e45372bd2
Posted Dec 13, 1999
Authored by Erik Iverson | Site dragonmount.net

Dragonmount Networks Advisory - DNA1999-002 Fictional Daemon (an FTP and telnet server) contains several security problems including possible DOS attacks, probably remote execution of code, and poor logging practices. In addition, any user with write permission can retrieve or delete any file on the system, even above the root directory.

tags | remote, root
MD5 | 3a3e9fa343f2f073618efe2afd019522
Posted Dec 13, 1999
Authored by Vladimir Lohov

Cgichk CGI scanner written in perl, modified to scan class C networks.

tags | cgi, perl
systems | unix
MD5 | 929968e1e8050915f9d9bcca41166b1d
Posted Dec 13, 1999
Authored by Xphere

Msadc scanner written in C.

tags | tool, scanner
systems | unix
MD5 | df2996c69d1b18baf3370a6e0e65e5e7
Posted Dec 13, 1999
Authored by abloke

It was found that few of IRCnet's ircd's with +topic module can be rebooted remotely. This has already been abused in the ircnet community, and ircd has been patched, however some ircnet servers are still vulnerable.

MD5 | de8697bde33abd508c36c1d33bf94c41
Posted Dec 13, 1999
Authored by spoon

LCAP allows a system administrator to remove specific capabilities from the kernel in order to make the system more secure. LCAP modifies the value in the sysctl file /proc/sys/kernel/cap-bound. "Capabilities" are a form of kernel-based access control. Linux kernel versions 2.2.11 and greater include the idea of a "capability bounding set," a list of capabilities that can be held by any process on the system. If a capability is removed from the bounding set, the capability may not be used by any process on the system (even processes owned by root).

tags | kernel, root
systems | linux
MD5 | 493ce52b90c52e189c99dfe8f2bcbff5
Posted Dec 13, 1999
Authored by Drago

lidentd is an identd replacement with many features including fake users, random fake users, restricted fake user responses, matching against the passwd file for fake responses and more.

systems | unix
MD5 | c526bf4214bce5e0cb6977d59cbf725c
Posted Dec 13, 1999
Authored by CyberPsychotic

Network Promiscuous Ethernet Detector, rewriten with Libnet/libpcap so it works on FreeBSD, OpenBSD, and linux, possibly more. neped scans your subnet and detects promiscuous boxes that might be running sniffers or similar applications, using hacked ARPs (non broadcast), only listened by promiscuous ethernets.

tags | tool, intrusion detection
systems | linux, unix, freebsd, openbsd
MD5 | ee928946f9d5187fe8a5c6224ad7ebf4
Posted Dec 13, 1999
Authored by CyberPsychotic

Based on my neped-libnet source, just figures out what boxens in your lan run IP stack and are in the same subnet with you.

systems | unix
MD5 | e1dbafbd87c7a076abc08ef5c3f09e67
Nmap Scanning Utility 2.3 BETA 10
Posted Dec 13, 1999
Authored by Fyodor | Site insecure.org

nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces and capabilities. Thus I incorporated virtually every scanning technique I know into nmap. Added about 70 new OS fingerprints so that Nmap can detect more systems. The most important new fingerprints are probably: The new SP5+ NT boxes, Solaris 8, Sega Dreamcast, Latest Windows 2000 builds, OpenBSD 2.6. RPM available here.

tags | tool, udp, tcp, protocol, nmap
systems | windows, 2k, unix, solaris, openbsd
MD5 | 5276f7ac4b94d1bff8d1300b05183acf
Posted Dec 13, 1999
Site jammed.com

logarp is a small perl script which uses tcpdump to grab ethernet and source IP addresses. It runs on the system "learning" these addresses, and logging ether/ip address mismatches. It monitors ethernet/IP address mapping and generates a list of mismatches to stdout. Useful for seeing if users on your subnet are "stealing" IP addresses. Alpha code! Requires perl and tcpdump.

tags | perl, system logging
systems | unix
MD5 | e9ed31d5c644062ac9a6fff357bb147e
Posted Dec 13, 1999
Site jammed.com

Analyze your syslogs for security or system problems by creating a list of normal behaviour to ignore; everything else is something you should be aware of. Requires perl 5.

tags | tool, perl, intrusion detection
systems | unix
MD5 | d4f7effb572e634a7af623ea4e6a99db
Posted Dec 13, 1999
Site tildeslash.org

nullidentd is a minimal identd server. All identd requests are responded to with the same (false) answer. It is intended as a very small (possibly secure) daemon to run on a firewall for connections to servers that use identd responses.

systems | unix
MD5 | 80afbac3c40e12a1ee7a0b55922bf439
Posted Dec 13, 1999
Authored by synnergy, Headflux

Sends message to everyone on unix system via syslog().

systems | unix
MD5 | 03de4874a8f333ee6918dd99448e08b1
Posted Dec 13, 1999
Authored by synnergy, elux

Sadmind exploit stack pointer brute forcer, just ./sadmindex-brute-lux [arch] <host> and it will brute force the stack pointer, it'll output a message on success and open ingreslock (1524) on the remote computer. This brute forcer requires sadmind exploit by Cheez Whiz.

tags | remote, cracker
MD5 | 7588b1cbff18bd6bcdb5fe10b4e85ada
Posted Dec 13, 1999

Arpwatch is a tool that monitors ethernet activity and keeps a database of ethernet/ip address pairings. It also reports certain changes via email. Arpwatch requires tcpdump and libpcap. Includes FDDI support, updated ethercodes, uses autoconf.

tags | system logging
systems | unix
MD5 | 8ed0f0b05f98978e4c8fcf73bd4a685a
Page 1 of 1

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    2 Files
  • 10
    Aug 10th
    9 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By