what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2000-01-02

Posted Jan 2, 2000
Authored by Rick Collette | Site openshare.net

The SPIRO-Linux EZ-Way Firewall allows you to setup and maintain a firewall easily, and without much strain on resources. It can be set up on a 486 with 8MB RAM, although a much more robust system is recommended for larger networks. This is meant to be a drop in replacement for the expensive and restrictive Firewall products available on the commercial market today.

tags | tool, firewall
systems | linux
SHA-256 | 8d6d1966bba150a3e05cf9d920d1e66b8925c4f538115995f91ff8983dc5898f
AIDE 0.5
Posted Jan 2, 2000
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: MD5 sums are now correct. Users must update their databases; they have false sums. With hash library support, you can have many more hash algorithms, and many bugfixes have been made. Note that the author's PGP keys have changed.
tags | tool, intrusion detection
systems | unix
SHA-256 | af2ff14b1282eb4eec684527efc80a5eed6d6aa593bc1deaf750c53c7e858ecf
Posted Jan 2, 2000
Authored by Stefan Folkerts | Site trailer.linuxatwork.at

Squidtaild is a Squid log file monitoring program that will crosscheck new access.log entries with user-defined filters and report all hits (using HTML pages, email, or winpopups). It is ideal for schools and businesses that wish to monitor their Internet activity for policy violations (that can be custom generated).

Changes: This complete Perl rewrite of Trailer is faster, more flexible, and offers more options.
tags | system logging
systems | unix
SHA-256 | 69ea94c4f4114ae4b6794ebd25342ec938a49dec6a24b2ba3d886d16b7ed466f
Posted Jan 2, 2000
Authored by Nadeem Riaz | Site nut.dhs.org

Psftp is an FTP client that uses ssh 1.x as its backend. Thus, all file transfers and communications using it are encyrpted and secure. It provides a command-line FTP interface on top of scp and ssh.

Changes: The ssh interface code has been rewritten (this should speed things up tremendously), auto-detection of the authentication method has been improved, history is now saved, remote file completion has been added, and some misc. bugs have been fixed.
tags | encryption
SHA-256 | 3119e5c2dbad3d22bc9bf19a9a2ac0cd79f382efe8bf4f597e7e344560a7c654
Nmap Scanning Utility 2.3 BETA 12
Posted Jan 2, 2000
Authored by Fyodor | Site insecure.org

nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces and capabilities. Thus I incorporated virtually e very scanning technique I know into nmap.

Changes: Interactive mode which allows you easily launch multiple scans (either synchronously or in the background), random scanning order (to evade IDS), a option to scan random IPs, and rpm fixes. RPM available here.
tags | tool, udp, tcp, protocol, nmap
systems | unix
SHA-256 | f695161b7ac460fa16af3e2d2a8122155e8de4b0dc70f421d473dda550e86134
Posted Jan 2, 2000
Authored by Christian Schulte | Site swrtec.de

Aps is a small tool for analyzing network traffic. It prints out a great deal of information about the relevant protocols including TCP, UDP, and ICMP. It allows you to filter IP addresses, hardware addresses, ports, and specific protocols.

Changes: now able to filter a port-range and able to print packet statistics at termination.
tags | tool, udp, sniffer, tcp, protocol
SHA-256 | ca484204bc0d4fd84ac6bf60f06addabd8ea75f3f95464ab50cbb7ee99c40707
Posted Jan 2, 2000
Authored by Underground Security Systems Research

Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1. Windows 95 is confirmed vulnerable, possibly other platforms.

tags | exploit, remote, web, overflow, local
systems | windows
SHA-256 | f32cc26c35f248387c89abcf98c9b455c102dc43abfc74dc606030682ad55800
Posted Jan 2, 2000
Authored by Brock Tellier

A vulnerability in Netscape FastTrack 2.01a will allow any remote user to execute commands as the user running the httpd daemon (probably nobody). I've only tested the version of Netscape FastTrack that comes with SCO UnixWare 7.1, 2.01a. I'm not sure what other platforms, if any, are vulnerable. Unixware exploit included.

tags | exploit, remote
systems | unixware
SHA-256 | d75d7676e9ba884cae00eb12d442f7c46825fe70ae4746948d00b7756b541383
Posted Jan 2, 2000
Authored by Jeremy Weatherford | Site filetraq.xidus.net

FileTraq is a shell script designed to be run periodically from the root crontab. Each time, it compares a list of system files with the copies that it keeps. Any changes are reported in diff or patchfile style, and dated backup copies are kept. It lets you keep an eye on intruders who might change system files, or other sysadmins who don't tell you about changes. It even helps you keep track of your own changes, along with dated backups.

tags | tool, shell, root, intrusion detection
systems | unix
SHA-256 | 6856dbdfc8208286cc43ff7ed8143c73d86748f7c47c64198df95e456d77758a
Posted Jan 2, 2000
Authored by JD Glaser | Site ntobjectives.com

Paper detailing a successful attack against a NT server running the avirt mail service. In powerpoint, html, and text format.

tags | paper
SHA-256 | 05dd4f84800e47a958684354f2cdd13df2ce3b91bf48643d83f12d755dae7c78
Posted Jan 2, 2000
Authored by ndubee, plaguez

Linux WU-IMAPD 4.1 remote root exploit.

tags | exploit, remote, root
systems | linux
SHA-256 | e3a218fa16e6fb76980fa8726376f11d499254027a11f1359b7f1cbf6682251b
Microsoft Office Converter Module Overflow
Posted Jan 2, 2000
Site oliver.efri.hr

Microsoft Office Converter Module Overflow - Using a hexadecimal editor to insert specially-malformed information into a document, a malicious user could cause Word to run code of his or her choice when the document was opened using an affected version of the converter.

tags | exploit, overflow
SHA-256 | 38680ce05f6c7c9ba1cb735183c3398d03f5bfb18e93dc6d8644303fe0d9615a
Posted Jan 2, 2000

This program is a beefed up classic denial of service fork(). Tested on linux/sysv/bsd. Kills most boxes.

tags | denial of service
systems | linux, bsd
SHA-256 | f78da6be7c31526b15fc3c5a990b184941051070650b25a4d1f52bf94063adea
Posted Jan 2, 2000
Authored by rain forest puppy | Site wiretrip.net

A look at whisker's anti-IDS tactics. Anti-Intrusion Detection System (IDS) tactics were one of the original key features of my whisker web scanner. The goal of any anti-IDS tactic is to mutate a request so much that the ID systems will get confused, but the web server will still be able to understand it, hence the subtitle "just how bad can we ruin a good thing?".

tags | paper, web
SHA-256 | f9e654a0fc127dcf27a1beb7e8a32d1157b5138bca0b71216771555c32113361
Page 1 of 1

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    23 Files
  • 8
    Dec 8th
    19 Files
  • 9
    Dec 9th
    1 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    11 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By