what you don't know can hurt you
Showing 1 - 14 of 14 RSS Feed

Files Date: 2000-01-02

Posted Jan 2, 2000
Authored by Rick Collette | Site openshare.net

The SPIRO-Linux EZ-Way Firewall allows you to setup and maintain a firewall easily, and without much strain on resources. It can be set up on a 486 with 8MB RAM, although a much more robust system is recommended for larger networks. This is meant to be a drop in replacement for the expensive and restrictive Firewall products available on the commercial market today.

tags | tool, firewall
systems | linux
MD5 | 57665496809ca848f9c122351727b79c
Posted Jan 2, 2000
Authored by Rami Lehti | Site aide.github.io

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

Changes: MD5 sums are now correct. Users must update their databases; they have false sums. With hash library support, you can have many more hash algorithms, and many bugfixes have been made. Note that the author's PGP keys have changed.
tags | tool, intrusion detection
systems | unix
MD5 | 4615593338a1d860459f44a55b484dba
Posted Jan 2, 2000
Authored by Stefan Folkerts | Site trailer.linuxatwork.at

Squidtaild is a Squid log file monitoring program that will crosscheck new access.log entries with user-defined filters and report all hits (using HTML pages, email, or winpopups). It is ideal for schools and businesses that wish to monitor their Internet activity for policy violations (that can be custom generated).

Changes: This complete Perl rewrite of Trailer is faster, more flexible, and offers more options.
tags | system logging
systems | unix
MD5 | acb093fb1deb708a979e894d77166a1e
Posted Jan 2, 2000
Authored by Nadeem Riaz | Site nut.dhs.org

Psftp is an FTP client that uses ssh 1.x as its backend. Thus, all file transfers and communications using it are encyrpted and secure. It provides a command-line FTP interface on top of scp and ssh.

Changes: The ssh interface code has been rewritten (this should speed things up tremendously), auto-detection of the authentication method has been improved, history is now saved, remote file completion has been added, and some misc. bugs have been fixed.
tags | encryption
MD5 | 33888b508a2ea8c8c690289613d91362
Nmap Scanning Utility 2.3 BETA 12
Posted Jan 2, 2000
Authored by Fyodor | Site insecure.org

nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces and capabilities. Thus I incorporated virtually e very scanning technique I know into nmap.

Changes: Interactive mode which allows you easily launch multiple scans (either synchronously or in the background), random scanning order (to evade IDS), a option to scan random IPs, and rpm fixes. RPM available here.
tags | tool, udp, tcp, protocol, nmap
systems | unix
MD5 | c64ee1566c2f244042cc4a5fcdd7d6c4
Posted Jan 2, 2000
Authored by Christian Schulte | Site swrtec.de

Aps is a small tool for analyzing network traffic. It prints out a great deal of information about the relevant protocols including TCP, UDP, and ICMP. It allows you to filter IP addresses, hardware addresses, ports, and specific protocols.

Changes: now able to filter a port-range and able to print packet statistics at termination.
tags | tool, udp, sniffer, tcp, protocol
MD5 | fdb439dd8ed5e9f82a02301e774e260e
Posted Jan 2, 2000
Authored by Underground Security Systems Research

Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1. Windows 95 is confirmed vulnerable, possibly other platforms.

tags | exploit, remote, web, overflow, local
systems | windows, 9x
MD5 | bfcb87fe0f3a982d6ba231788b36c004
Posted Jan 2, 2000
Authored by Brock Tellier

A vulnerability in Netscape FastTrack 2.01a will allow any remote user to execute commands as the user running the httpd daemon (probably nobody). I've only tested the version of Netscape FastTrack that comes with SCO UnixWare 7.1, 2.01a. I'm not sure what other platforms, if any, are vulnerable. Unixware exploit included.

tags | exploit, remote
systems | unixware
MD5 | 090f287496ac4bceb7fdafcbe04396c6
Posted Jan 2, 2000
Authored by Jeremy Weatherford | Site filetraq.xidus.net

FileTraq is a shell script designed to be run periodically from the root crontab. Each time, it compares a list of system files with the copies that it keeps. Any changes are reported in diff or patchfile style, and dated backup copies are kept. It lets you keep an eye on intruders who might change system files, or other sysadmins who don't tell you about changes. It even helps you keep track of your own changes, along with dated backups.

tags | tool, shell, root, intrusion detection
systems | unix
MD5 | 80f29eda6ce691762a12d222dbd742d8
Posted Jan 2, 2000
Authored by JD Glaser | Site ntobjectives.com

Paper detailing a successful attack against a NT server running the avirt mail service. In powerpoint, html, and text format.

tags | paper
MD5 | 61a925ecb37fa72c1c76aac9c3717f76
Posted Jan 2, 2000
Authored by ndubee, plaguez

Linux WU-IMAPD 4.1 remote root exploit.

tags | exploit, remote, root
systems | linux
MD5 | 97c7a43cc9f94ced0f53a6730cc0b24f
Microsoft Office Converter Module Overflow
Posted Jan 2, 2000
Site oliver.efri.hr

Microsoft Office Converter Module Overflow - Using a hexadecimal editor to insert specially-malformed information into a document, a malicious user could cause Word to run code of his or her choice when the document was opened using an affected version of the converter.

tags | exploit, overflow
MD5 | 8c9b76d58be127125245cb3e67a883fc
Posted Jan 2, 2000

This program is a beefed up classic denial of service fork(). Tested on linux/sysv/bsd. Kills most boxes.

tags | denial of service
systems | linux, bsd
MD5 | 3eddc10dcffa346677e8e4b105dd07f5
Posted Jan 2, 2000
Authored by rain forest puppy | Site wiretrip.net

A look at whisker's anti-IDS tactics. Anti-Intrusion Detection System (IDS) tactics were one of the original key features of my whisker web scanner. The goal of any anti-IDS tactic is to mutate a request so much that the ID systems will get confused, but the web server will still be able to understand it, hence the subtitle "just how bad can we ruin a good thing?".

tags | paper, web
MD5 | 6e9e8b5619afc566d44fa31da9f45b34
Page 1 of 1

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    19 Files
  • 16
    Apr 16th
    7 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By