what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-02-07

find_ddos_v31_intel.tar.Z
Posted Feb 7, 2000
Site fbi.gov

Find_ddos Version 3.1 (solaris intel) - In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the NPIC has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The tool will detect several known denial-of-service attack tools including tfn2k client, tfn2k daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht master, stacheldraht client, stachelddraht demon and tfn-rush client.

tags | denial of service, local
systems | solaris
SHA-256 | 9faf64c8b6739303cc2dc2b4152896361bdf70c5807908afbaadd586a0ae20c1
find_ddos_v31_linux.tar.Z
Posted Feb 7, 2000
Site fbi.gov

Find_ddos Version 3.1 (linux) - In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the NPIC has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The tool will detect several known denial-of-service attack tools including tfn2k client, tfn2k daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht master, stacheldraht client, stachelddraht demon and tfn-rush client.

tags | denial of service, local
systems | linux, solaris
SHA-256 | 555d7ce8aff713ccf10f2d9cf13bf78dae04c68345ffffcf5cd52f591896a466
find_ddos_v31_sparc.tar.Z
Posted Feb 7, 2000
Site fbi.gov

Find_ddos Version 3.1 (sparc) - In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the NPIC has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The tool will detect several known denial-of-service attack tools including tfn2k client, tfn2k daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht master, stacheldraht client, stachelddraht demon and tfn-rush client.

tags | denial of service, local
systems | solaris
SHA-256 | 862b19352d79f9875321d98f6bbf6571a9ba8799ac5008189740bfedfd987b0d
CrackDate.zip
Posted Feb 7, 2000
Authored by Samyn

CrackDate will "crack" any Windows time limited program by changing the system date when the program is run / exits.

systems | windows
SHA-256 | c50b6c75f5997d2000448826ef8f2c65aeca7714521ce891dc2f3d91ab5fc8f7
cgiS.c
Posted Feb 7, 2000
Authored by Zinc_Sh

Simple CGI scanner which works on Linux, OpenBSD, and others. Updated to fix y2k problem.

tags | cgi
systems | linux, unix, openbsd
SHA-256 | 67283afef975011510958b99f1bfc3a7059b81d45720412147d8ce0cd3d535ee
utrojan.c
Posted Feb 7, 2000
Authored by Axess

Universal remote unix trojan - This wrapper can backdoor nearly any service on any platform. Tested on login / imapd / qpopd.

tags | tool, remote, trojan, rootkit
systems | unix
SHA-256 | 885fba40e10573bdedddaf334427dedeca14c2d38df6c931e2a697af2a02b6b8
poorman.txt
Posted Feb 7, 2000
Authored by Jonathan Provencher

It is possible to cause the BeOS PoorMan webserver to crash (remotly) by sending a given URL to the server.

tags | exploit
systems | beos
SHA-256 | c7a561452597163b2603b347de43d34eabbf8faadb4f6ddceba795ffbb450b77
malicious_code_FAQ.html
Posted Feb 7, 2000
Site cert.org

CERT/CC Malicious Web Scripts FAQ - A problem has recently been identified that can be found on a wide variety of web sites: what you receive from a web site may not be what that site meant to send. If you click on a specially designed link, the site may unknowingly send you bad data, unwanted pictures, and programs (malicious scripts) to compromise your data. The problem is not with web browsers themselves but with how web pages are constructed and how data entering and leaving web sites is validated. "Validate" means ensuring no "unintended" characters are sent back to the client.

tags | web
SHA-256 | 7f117a7af59e1b84cb8ed09ed23e3b31fe0155ce6f43016ad6c28ee3d1892a12
packet_filtering.htm
Posted Feb 7, 2000
Site cert.org

CERT FAQ on which ports you should block at your firewall / router.

SHA-256 | 41aca7079c158408c3be8306274e0f2c91fcecaa2777d7b5100a185f8130e76b
lids-0.8-2.2.14.tar.gz
Posted Feb 7, 2000
Authored by Xie Hua Gang | Site soaring-bird.com.cn

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace on your system. LIDS can also provide raw device and I/O access protection.

Changes: An even better design - Use of the kernel capabilities, Hot switching capabilities, Allow unmount when shutdown (for UPS), New behaviour for interpretation of lids.conf, Buffers containing passwd are cleaned, and a 2-level encryption password.
tags | kernel, root
systems | linux
SHA-256 | d5af7ad334e17414e17804f66d1aabf9e75a571121f63998dad19b0021229ebd
syslog-ng-1.3.14.tar.gz
Posted Feb 7, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Fixes for 2.3.x kernels, and permission fixes.
tags | system logging
systems | unix
SHA-256 | c66267e1f2fb86f4acd260388673bd986a5481deceafe784fd77053840ca8a25
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close