exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-03-21

Posted Mar 21, 2000
Authored by Giampaolo Fresi Roglia | Site media.dsi.unimi.it

Shag simulates an additional ethernet device over an existing one. It is useful for testing the security of your switch, or if your machine is on a private VLAN and you want to see another VLAN without another ethernet card.

tags | tool
systems | unix
SHA-256 | 7ee510e4bce9e523c9758c513e500833529544f55659916fc3dcbb673b915c83
Linux IPTables Firewall
Posted Mar 21, 2000
Authored by Netfilter Core Team | Site iptables.org

Iptables is built on top of netfilter: the new packet alteration framework for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects.

tags | tool, firewall
systems | linux
SHA-256 | 1eaa9c5ee21455918fad19ee71cf9de7079abaac0e8f4807bf9f6223d6458b43
Posted Mar 21, 2000
Authored by Paulo Ribeiro

PAM/userhelper exploit - Ported to Mandrake 6.1. Also works on Red Hat 6.0 and 6.1, gives uid 0.

tags | exploit
systems | linux, redhat, mandrake
SHA-256 | 60f084b01a6b90f83d4afb30f04c2890fc63b2a6583017757d8572b289e798b3
Posted Mar 21, 2000
Authored by Marcin Marszalek

gp4pine is a script that automatically encrypts and decrypts mail under Pine using PGP. The user is not separated from things that PGP does. The program is compatible with PGP versions 2.6.3, 5.0, 6.5.1 and GNUPG 1.0, has support for an aliases file and signature-rotating programs, and can remember your passphrase for a session if you need.

Changes: Decoded messages can now be stored for faster access, temporary files are safely removed (wiped), the passphrase server was rewritten again, the GNUPG 1.0 mess should be finally fixed.
tags | encryption
SHA-256 | 10240e332b56baf1d913fcebd10027efc25e3eabff07f28476aaf4d7b0c1872f
Posted Mar 21, 2000
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 340 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.

Changes: CVE-compatible output has been added, dangerous plugins are now disabled by default, new vulnerability checks (shaft, fam, htdig, axis, infosrch, rpm_query, many more), HP/UX support, bug fixes.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
SHA-256 | f9f5973da2fae095fe2d786a297237838089fca47ab485ff736b56432d34c7c7
Posted Mar 21, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Fixed CUI/GUI problem with Lynx and Netscape 4.72, Fixed problem with multiple reports with SNMP, Updated hosttyping database, and working on search capability.
tags | tool, cgi, scanner
systems | unix
SHA-256 | d538800c967a63a4ed1ebc5d086124ac73eea401187ce93d55555b2a31379a2d
Posted Mar 21, 2000

Microsoft Security Bulletin (MS00-016) - Microsoft has released a patch for the "Malformed Media License Request" denial of service vulnerability within the Microsoft Media License Manager. The vulnerability allows a malicious user to prevent the license server from issuing further licenses to customers for protected digital content (music and video). Microsoft FAQ on this issue available here.

tags | denial of service
SHA-256 | 625a48c3d270bc6deaac511662ec6f28868be94a8605a42d1fcb909680f3a294
Posted Mar 21, 2000
Authored by Martin Roesch | Site clark.net

Snort is a libpcap-based packet sniffer/logger which can be used as a lightweight network intrusion detection system. It features rules based logging and can perform content searching/matching in addition to being used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, and much more. Snort has a real-time alerting capabilty, with alerts being sent to syslog, a seperate "alert" file, or as WinPopup messages via Samba's smbclient.

Changes: Added FlexResp (active response) plugin to fool OS fingerprinting, Added support for "stealthed" network interfaces, greatly improved the speed of the content pattern matcher, Token Ring and FDDI decoder support, Snort ported to Tru64/Alpha, IRIX 6.X, and AIX, Output plugins added (modular output system), and Snort man page now ships with the distribution.
tags | tool, overflow, cgi, sniffer
SHA-256 | d1197a62590c2b6dfc978fd3c4cf1e82d8e2fbbbd35a5c0f1887101311459725
Posted Mar 21, 2000
Authored by Obecian | Site celerity.bartoli.org

spoon.c - (ab)use dig.cgi to proxy DNS dig requests. Useful to request a zone transfer without revealing your IP.

tags | exploit, cgi
SHA-256 | bed34a7508213f2937d73bf1e00100537cc8f3ff8ce9ac45961c75bcec76988e
Posted Mar 21, 2000

Microsoft Security Bulletin (MS00-018) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server 4.0. The "Chunked Encoding Post" vulnerability allows a malicious user to consume all resources on a web server and prevent it from servicing other users. Microsoft FAQ on this issue here.

tags | web
SHA-256 | e67925cf162159a7b9d9bd43f6d24b7696a9b1cdb7a2174c33c929d14020faed
Posted Mar 21, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Interface improved by selecting Yes/No with Enter key also triggers "Next". Small interface bug fixed.
systems | linux, redhat
SHA-256 | 3a1cccf8b3cde63ff58053d86ea14e3095cec9af0b7a79363bea0f9deac27ebe
Page 1 of 1

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    37 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By