what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 1999-12-15

nt.security.update.121599.txt
Posted Dec 15, 1999
Authored by winsd

Windows NT Magazene security update - December 15, 1999. Contains You Have the Right to Surf Anonymously, SQL Server 7.0 SA Password, NT Subject to Denial of Service, NT Help File Attack, News: Most Cybercrime Goes Unpunished, News: Microsoft Releases Smart Card Toolkit, Practical Recommendations for Post-Y2K, Enterprise Firewall with Security-Compliant VPN, and Monitor Data Before It Reaches the OS. NTsecurity homepage here.

tags | denial of service, magazine
systems | windows
SHA-256 | ff2a51b4aa6c31bd1316ffd02d7ca35e600d78e844b7b78b74b17c42d2a92ee4
lids-0.6.1-2.2.13.tar.gz
Posted Dec 15, 1999
Authored by Xie Hua Gang | Site soaring-bird.com.cn

Linux IDS Patch - Version 0.6.1 - Dec 15, 1999. Lids is an intrusion detection system in the Linux kernel. This patch (Version 0.6.1) is for the Linux kernel 2.2.13. LIDS 0.6 has a brand new design. When LIDS is in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.

Changes: A bugfix.
tags | kernel, root
systems | linux
SHA-256 | 8f3d6c23cf974e691bb4acd3e6b9334065f2817f6d687e7890389e174fcb2992
suse.wvdial.txt
Posted Dec 15, 1999

A security hole was found in wvdial which can allow regular users access to dialup passwords. SuSE security website here.

systems | linux, suse
SHA-256 | 6691e23fba7b944f3c30ec907d9f37340be3a0d009a6325713258f1fe960d70d
hir10.zip
Posted Dec 15, 1999
Authored by Axon, hir | Site hir.chewies.net

Hackers Information Report #10. Contains Defcon 7 in a nutshell, Flying Below The Radar: Avoiding IDS Systems, BeOS Revealed, RISC, CISC and The concept of the Power-PC, and Hacker News.

tags | risc, magazine
systems | beos
SHA-256 | 459b158b9f77b46da2f7d1e38a0f4641acadf6ff0ec6b6c27e325bdc8828808f
redir-2.2.tar.gz
Posted Dec 15, 1999
Authored by Sam Creasey | Site sammy.net

Redir is a port redirector. Its functionality basically consists of the ability to listen for TCP connections on a given port, and, when it recieves a connection, to then connect to a given destination address/port, and pass data between them. It finds most of its applications in traversing firewalls, but, of course, there are other uses. It can run under inetd or stand alone (in which case it handles multiple connections).

Changes: Enhanced support for redirection of FTP sessions, and minor bugfixes/improvements.
tags | tcp
systems | linux
SHA-256 | 92949cf1a5287eecd3e62720d93e1001301c2619ee74df07ba72119b66e20340
statd.pl
Posted Dec 15, 1999

SunOS 5.4-5.5 statd remote exploit - in perl.

tags | exploit, remote, perl
systems | solaris
SHA-256 | bd7ebae8ad5e5928d82da9b192e8e4a352c9277ff460e4561511c0ae7b227593
tryX.c
Posted Dec 15, 1999
Authored by Missinglnk | Site tribune.intranova.net

Some testing code I put together to try on a friend's old machine, it essentially tries to overflow the DISPLAY variable in X-based programs.

tags | exploit, overflow
SHA-256 | 7613d5b29ec47d7d33a9be662b0d6ff29d63ff54026a3473136af5f95fc5b577
logsurfer-1.5.tar.gz
Posted Dec 15, 1999
Site cert.dfn.de

logsurfer is a log checking/auditing tool similar to swatch and logcheck but with the capability of handling multi-line messages and dynamically adapting the ruleset. It is written in portable C, well documented, fast, and flexible. It works on any textfile or stdin, can be run at intervals or continuously, and has timeouts and resource limits.

tags | tool, intrusion detection
systems | unix
SHA-256 | 21fea4e03efe6f7b0246e5cbaf9b643e3c5d2c9a8e3c0eab39498b35004142a8
emf.zip
Posted Dec 15, 1999
Site pc-magic.com

Encrypted Magic Folders (EMF) gives you automated & transparent encryption! Select folders whose files you want encrypted and EMF not only makes those folders and files completely invisible to others but decrypts and encrypts the files automatically and transparently as you use them. You won't even know you're using encrypted files as EMF does all the work behind the scenes.

tags | encryption
SHA-256 | 458824b2a2162ff6b87ac0ac9c6ba0aa3e1f456231db0bef619b4ae0f2339f15
SPIRO-Bastille-1.0.tar.gz
Posted Dec 15, 1999
Authored by Rick Collette | Site openshare.net

SPIRO-Bastille is an adaption of the original Bastille-Linux product. This version checks the SPIRO-Linux website for security updates, and hardens the system from various attacks. It fixes permissions, ftpd, inetd, console security, and remote access, among other issues.

tags | remote
systems | linux
SHA-256 | 3079cff865e45a2caa315bb50c162f95c9a5f0f2f253732a97d8a71cecc48982
Page 1 of 1
Back1Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close