exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-02-07

find_ddos_v31_intel.tar.Z
Posted Feb 7, 2000
Site fbi.gov

Find_ddos Version 3.1 (solaris intel) - In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the NPIC has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The tool will detect several known denial-of-service attack tools including tfn2k client, tfn2k daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht master, stacheldraht client, stachelddraht demon and tfn-rush client.

tags | denial of service, local
systems | solaris
SHA-256 | 9faf64c8b6739303cc2dc2b4152896361bdf70c5807908afbaadd586a0ae20c1
find_ddos_v31_linux.tar.Z
Posted Feb 7, 2000
Site fbi.gov

Find_ddos Version 3.1 (linux) - In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the NPIC has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The tool will detect several known denial-of-service attack tools including tfn2k client, tfn2k daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht master, stacheldraht client, stachelddraht demon and tfn-rush client.

tags | denial of service, local
systems | linux, solaris
SHA-256 | 555d7ce8aff713ccf10f2d9cf13bf78dae04c68345ffffcf5cd52f591896a466
find_ddos_v31_sparc.tar.Z
Posted Feb 7, 2000
Site fbi.gov

Find_ddos Version 3.1 (sparc) - In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the NPIC has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The tool will detect several known denial-of-service attack tools including tfn2k client, tfn2k daemon, trinoo daemon, trinoo master, tfn daemon, tfn client, stacheldraht master, stacheldraht client, stachelddraht demon and tfn-rush client.

tags | denial of service, local
systems | solaris
SHA-256 | 862b19352d79f9875321d98f6bbf6571a9ba8799ac5008189740bfedfd987b0d
CrackDate.zip
Posted Feb 7, 2000
Authored by Samyn

CrackDate will "crack" any Windows time limited program by changing the system date when the program is run / exits.

systems | windows
SHA-256 | c50b6c75f5997d2000448826ef8f2c65aeca7714521ce891dc2f3d91ab5fc8f7
cgiS.c
Posted Feb 7, 2000
Authored by Zinc_Sh

Simple CGI scanner which works on Linux, OpenBSD, and others. Updated to fix y2k problem.

tags | cgi
systems | linux, unix, openbsd
SHA-256 | 67283afef975011510958b99f1bfc3a7059b81d45720412147d8ce0cd3d535ee
utrojan.c
Posted Feb 7, 2000
Authored by Axess

Universal remote unix trojan - This wrapper can backdoor nearly any service on any platform. Tested on login / imapd / qpopd.

tags | tool, remote, trojan, rootkit
systems | unix
SHA-256 | 885fba40e10573bdedddaf334427dedeca14c2d38df6c931e2a697af2a02b6b8
poorman.txt
Posted Feb 7, 2000
Authored by Jonathan Provencher

It is possible to cause the BeOS PoorMan webserver to crash (remotly) by sending a given URL to the server.

tags | exploit
systems | beos
SHA-256 | c7a561452597163b2603b347de43d34eabbf8faadb4f6ddceba795ffbb450b77
malicious_code_FAQ.html
Posted Feb 7, 2000
Site cert.org

CERT/CC Malicious Web Scripts FAQ - A problem has recently been identified that can be found on a wide variety of web sites: what you receive from a web site may not be what that site meant to send. If you click on a specially designed link, the site may unknowingly send you bad data, unwanted pictures, and programs (malicious scripts) to compromise your data. The problem is not with web browsers themselves but with how web pages are constructed and how data entering and leaving web sites is validated. "Validate" means ensuring no "unintended" characters are sent back to the client.

tags | web
SHA-256 | 7f117a7af59e1b84cb8ed09ed23e3b31fe0155ce6f43016ad6c28ee3d1892a12
packet_filtering.htm
Posted Feb 7, 2000
Site cert.org

CERT FAQ on which ports you should block at your firewall / router.

SHA-256 | 41aca7079c158408c3be8306274e0f2c91fcecaa2777d7b5100a185f8130e76b
lids-0.8-2.2.14.tar.gz
Posted Feb 7, 2000
Authored by Xie Hua Gang | Site soaring-bird.com.cn

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace on your system. LIDS can also provide raw device and I/O access protection.

Changes: An even better design - Use of the kernel capabilities, Hot switching capabilities, Allow unmount when shutdown (for UPS), New behaviour for interpretation of lids.conf, Buffers containing passwd are cleaned, and a 2-level encryption password.
tags | kernel, root
systems | linux
SHA-256 | d5af7ad334e17414e17804f66d1aabf9e75a571121f63998dad19b0021229ebd
syslog-ng-1.3.14.tar.gz
Posted Feb 7, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Fixes for 2.3.x kernels, and permission fixes.
tags | system logging
systems | unix
SHA-256 | c66267e1f2fb86f4acd260388673bd986a5481deceafe784fd77053840ca8a25
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close