what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2000-02-18

slipwire
Posted Feb 18, 2000
Authored by James Quinby, Google Security Research | Site packet.node.to

slipwire.pl v1.1 is the first iteration of a filesystem integrity checker. It compares the MD5 hashes of files to an initial state and alerts the user of any changes.

Changes: The dependency on the md5 command has been removed by using the Digest:: modules for Perl, and SHA-1 hashes are now used instead of MD5.
tags | tool, intrusion detection
systems | unix
SHA-256 | dc845bdc2c286c64e4e25ef76ed2d31d286b284b13dafc146ad73c3ba66ee6e6
slipwire.1-2.tar.gz
Posted Feb 18, 2000
Authored by James Quinby | Site packet.node.to

slipwire.pl is a simple filesystem integrity checker. It compares the SHA-1 hashes of files to an initial state and alerts the user of any changes.

Changes: A fix for a bug in the iteration count when comparing files to hashes, a quick reader script for dumping the contents of the DBM file, an example file list, and a tidied-up README.
tags | tool, intrusion detection
systems | unix
SHA-256 | daaae031940c7c22dd5e6516ffd418ec4e9210a88aa495f534346ff76d915c43
nai.00-arcserve.txt
Posted Feb 18, 2000
Site nai.com

Network Associates Security Advisory - A vulnerability in the ARCserve agent script allows local attackers to obtain root privileges and overwrite/insert data into arbitrary files.

tags | arbitrary, local, root
SHA-256 | fc4a12c72a4a1e54e091198085a56de890639e906f761c3922f184b0a5144490
frontpage.doubledot.txt
Posted Feb 18, 2000
Authored by Jan van de Rijt

Frontpage-PWS32/3.0.2.926 (probably others) allows reading of any file on the system by putting /.../ into the url.

tags | exploit
SHA-256 | 137d1427da44a3a1678c34f2c5e6d18c442d4b292586eb2186b4a6d260aca401
aix-snmp.txt
Posted Feb 18, 2000
Authored by Harikiri

On AIX 4.2 and 4.3, the SNMP daemon is enabled by default and two community names are enabled with read/write privileges. The community names are "private" and "system", but are only allowed from localhost connections. Nevertheless, a local user may install an SNMP client, and modify sensitive variables.

tags | exploit, local
systems | aix
SHA-256 | fca6ebe0cf09746cd05366bd5c1a1506252c063978e36c0e845128326548d809
win2k.install.txt
Posted Feb 18, 2000
Authored by Stephane Aubert

During the installation process of Windows 2000 professionnal anyone can connect to the ADMIN$ share as ADMINISTRATOR whithout any password.

tags | exploit
systems | windows
SHA-256 | 28171d26faf3930c1a79b869e75aa51800e46d3d335d294936646c2ceee5982c
snmp.writable.txt
Posted Feb 18, 2000
Authored by Michal Zalewski

Many devices come from the manufacturer configured with snmp enabled and unlimited access with *write* privledges. It allows attacker to modify routing tables, status of network interfaces and other vital system data, and seems to be extermely dangerous. To make things even worse, some devices seems to tell that write permission for given community is disabled, but you can still successfully write to it. This is a list of devices with default writable configurations.

tags | exploit
SHA-256 | 64b8dfa2a60e46777335afd3866fb129ffab8f3f3c77ea49b736b92fb1b23445
ipchains.patch.txt
Posted Feb 18, 2000
Authored by Jens Hektor

Patch for the Linux ipchains firewall to log source MAC address and TCP flags for all packets that get logged.

tags | tool, tcp, firewall
systems | linux, unix
SHA-256 | 17bfd672bb0d3f6422803d89a8b47d00776cc840c1048f0d170cac34268fe89c
md-webscan-1.0.0.tar.gz
Posted Feb 18, 2000
Authored by mordrian | Site internettrash.com

md-webscan is a high quality CGI vulnerability scanner. It is well written, easily extensible, and has a few nifty options.

tags | cgi
SHA-256 | 4f436b5fe5116f0a5cf4116654ebdadc92d8a10ebd99c1569e9c3ce2d00d02b1
md-webscan-1.0.1.tar.gz
Posted Feb 18, 2000
Authored by mordrian | Site internettrash.com

md-webscan is a high quality CGI vulnerability scanner. It is well written, easily extensible, and has a few nifty options.

Changes: 106 new checks.
tags | cgi
systems | unix
SHA-256 | 92e28833b15ad0ce6b9339a83e8b994deb37e1f6eba383e5fdfc64907ec4c28e
vanish2.tgz
Posted Feb 18, 2000
Authored by Neo

Vanish is a log wiper that cleans WTMP, UTMP, lastlog, messages, secure, xferlog, maillog, warn, mail, httpd.access_log, and httpd.error_log. Tested under SuSE.

Changes: Now uses the rootkit fix program to preserve ctimes and log ownership/permissions.
tags | tool, rootkit
systems | linux, unix, suse
SHA-256 | 2fabe2b5a6c22520710726c13fac0311577cbc303f7d2a6dc078df36af4e65ac
decss.tar.gz
Posted Feb 18, 2000
Site pigdog.org

DeCSS is a handy Perl script which removes CSS tags from HTML pages.

tags | web, perl
SHA-256 | af863c73e060f195d1e618e1dc2acb77e380c52919b6075c0108c2e2f7bfb9f2
nessus-0.99.5-1.tgz
Posted Feb 18, 2000
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 320 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.

Changes: Pies and graphs have been added to the HTML report, Nessus now behaves well when the same service is running more than once (i.e.: two Web servers are running on the same host), a better report GUI is now used, bug fixes have been made, and new security checks are available.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
SHA-256 | 8888891aec58ed227d88c863beaa2571d0125a10e020edc2fcceaa3a521cd294
hk2000.exe
Posted Feb 18, 2000
Authored by Swanksoft | Site swanksoft.com

History Kill 2000 for Windows removes all traces of history in both Netscape and IE by removing URL drop-list history, detailed history file, cache, and cookies. 21 day evaluation.

systems | windows
SHA-256 | 49a94b1becb5e12ee9f6babd8f857ef6cbaf4be0d9fbbab3f8656055dddd8e39
Fwctl-0.25.tar.gz
Posted Feb 18, 2000
Authored by Francis J. Lacoste | Site indev.insu.com

Fwctl is a program that intends to make it easier to configure a tight firewall. It provides a configuration syntax that is easier to use and more expressive than the low-level primitives offered by ipchains. It supports multiple interfaces, masquerading and packet accounting. Fwctl doesn't replace a good security engineer, but it can make the job of the security engineer simpler.

Changes: It's now possible to change the default policy, changes have been made to name_service for better interoperability with some name servers, and small bugfixes have been applied.
tags | tool, firewall
systems | linux
SHA-256 | 3a41caf6e736dcf2018b27cd203759d9a48d5e1e797e7312d502c25ab1e673b5
syslog-ng-1.3.17.tar.gz
Posted Feb 18, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: This is release candidate 1 for the stable 1.4.0 version.
tags | system logging
systems | unix
SHA-256 | 8febeac3a3fc42944a890455ccea5b7faf7ea2d39675da8150d4d1ed5b9ae50e
switched.htm
Posted Feb 18, 2000
Authored by Scott | Site sans.org

FAQ on implementing a Network Based IDS in a heavily switched environment.

tags | paper
SHA-256 | cc66b70318c7efd394059454a0d70109b701ba98a36ee39ee4fb3c3150644b34
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close