exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-03-11

Posted Mar 11, 2000
Site languard.com

LANguard Internet Access Control monitors all Internet traffic to prevent unproductive use of the Internet. Its rules engine allows you to specify which sites are allowed, and what type of content your users can search for or read. LANguard has extensive internet usage reporting tools. Because LANguard uses a sniffer engine, it is easy to install and does not affect Internet performance or require you to reconfigure your network clients. It also protects against; External threats (hackers), Internal threats (users accessing shares they are not authorized).

MD5 | 1106d8ff30114479d14721a57d966703
Posted Mar 11, 2000
Authored by Andrew R. Siverly

In the deployment of the Cayman-DSL router and many others, technitions are failing to reset the default password which in many cases default to no password at all. A malicious user could scan for such devices and on a DSL providers network. Worst case scenerio, the static routing tables can be altered to permit remote sniffing.

tags | exploit, remote
MD5 | 2a6e0c7da07d20e13506e9e129337688
Posted Mar 11, 2000
Authored by S

TCPDecode accomplishes about the same thing the tcpdump2ascii, but it does so with much less code and provides an easier to read output.

tags | tool, sniffer
MD5 | a7234fb4a0bdf851e5a285804a978853
Posted Mar 11, 2000
Authored by Eric Knight | Site securityparadigm.com

Online copy of the book "Computer Vulnerabilities" covers a complete description of how vulnerabilities can be catagoried, adding great detail to previous works on vulnerability taxonomies. This book is a draft, but because of the dynamic nature of network publications, can be revised at any time.

tags | paper, vulnerability
MD5 | c0bbb76448c755c0f05135d0f9e7297d
Posted Mar 11, 2000
Authored by Cerebus Artifact

IRC Crack is a Win98/2000 brute force password cracker for IRC channel keys. Connects directly to an IRC server and uses a wordlist.

systems | windows
MD5 | 796eb656ff8867a18d3df64defccec45
Posted Mar 11, 2000
Authored by Shane Kerr | Site time-travellers.org

oftpd is designed to be as secure as an anonymous FTP server can possibly be. It runs as non-root for most of the time, and uses the Unix chroot() command to hide most of the systems directories from external users--they cannot change into them even if the server is totally compromised. It also contains its own directory-change and directory-listing code (most FTP servers execute the system "ls" command to list files).

tags | root
systems | unix
MD5 | 58b24908c5e9f4ac1073fcd610071771
Posted Mar 11, 2000
Authored by Stefan Karrmann | Site mathematik.uni-ulm.de

Sharesecret splits a secret into parts, such that at least all of the parts are needed to reconstruct the secret. If you have fewer parts you know only the length of the secret.

tags | encryption
MD5 | 008f6e5e9469719951e075b387ae43b6
Posted Mar 11, 2000
Authored by Joe Thielen | Site joethielen.com

GNU Phantom.Security is a computer-controlled security system. Using the software and a simple circuit board (schematics included) that you build, you can create a good basic security system that is computer controlled. The system can use off-the-shelf security devices like motion sensors, door magnets, and fire/smoke detectors with little to moderate modification. And if the machine the system is running on is connected to a LAN/WAN or the Internet, you can have it send e-mail. If you have a pager or cell phone capable of receiving e-mail, then you will have around the clock intrusion/fire detection for your home or office.

systems | linux
MD5 | b540be03dd45ee1f463bfc42490b1079
Posted Mar 11, 2000
Authored by Mr.Mojo | Site dis.org

Extracts .reg files from user and system.dat.

MD5 | 98b479f31876c5eb2244205296fd1a22
Posted Mar 11, 2000
Authored by Mr.Mojo | Site dis.org

This text file which will explain to you how to decrypt win9X paswords stored in the registry. In doc,ascii,and palmpilot formats.

tags | registry
systems | windows
MD5 | 4be8f4bedcef71c2186757c68df585ec
Page 1 of 1

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By