The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.
2cd16fc73298f7e8afd0d598f603787e2efc0a1a70a3a80ffad4df48fa992f3a
XOR-analyze is a program for cryptoanalyzing one of the most easily-breakable and commonly used ciphers. Works with variable key length and includes an encryption/decryption program.
43700e7f6735f4eea6e561121f344b4c68a41c40c6ee2cbb7fb1deb47ce630c3
ISS Security Alert Summary 5.3 - Summary of vulnerabilities discovered in March, 2000. Contains 33 reported vulnerabilities - windmail-pipe-command, windmail-fileread, simpleserver-exception-dos, linux-domain-socket-dos, linux-gpm-root, outlook-manipulate-hidden-drives, vqserver-dir-traverse, vqserver-passwd-plaintext, iis-chunked-encoding-dos, nav-email-gateway-dos, netscape-server-directory-indexing, mercur-webview-get-dos, officescan-admin-pw-plaintext, officescan-admin-access, linux-kreatecd-path, win-dos-devicename-dos, wmcdplay-bo, nt-registry-permissions, staroffice-scheduler-fileread, staroffice-scheduler-bo, iis-root-enum, mssql-query-abuse, clipart-cil-bo, oracle-installer, linux-rpm-query, thebat-mua-attach, irix-infosrch-fname, linux-dosemu-config, coldfusion-reveal-pathname, netscape-enterprise-command-bo, nmh-execute-code, htdig-remote-read, and ie-html-shortcut.
73a4d14101964f3e30048066a698907d3a3a447cd3fd69d5e08ddd23f575d71c
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
61d639a9f1038fc54fb7bfdcb2f44a0fee9e12fc773a9d966891b5fe1b27c868
Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.
e7562c10bffe69d06d4b0a17e76b30bc94a9c6b8a69b192ae29378d428802246
Cattscanner v0.6 - CATTscanner or Configurable Autonomous Threaded Topography scanner is a compilation of common networking tools rewritten into one massively configurable, massively portable, independent, fast package. CATTscanner is also written in 100% ANSI C and uses no external libraries so it will compile on most every operating system and platform. Features support for RPC, NFS, and NBT mapping, and support for version queries, extremely readable code, and output to interlinked HTML files.
8a9ff148d70c04876ae884c76ad54c5b99c881c6a756c5b4d8d6146ca3c11f4c
XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.
edb78d577c0007b76173b610abc6948d5eacb59b108e0021470a94ef23379ebc
Auto NetBIOS Hacker for Windows 95/98/NT v1.2 - Gets the target's NetBIOS name-table, connects to the IPC$ hidden null share and gives you the available shares of the target with one single command.
d5ac027d7e443a64c99c38242be6797cde475d6b152f1f010b431156474133aa
The Design, Implementation and Operation of an Email Pseudonym Server - Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. This paper describes the design, implementation, and operation of nym. alias. net, a server providing untraceable email aliases.
0c099b336055f09c9351fc9c1f4348ed952daddd46f6257773bb376358b5bfab
Iptables is built on top of netfilter: the new packet alteration framework for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects.
8d2c272e5916a9c69aaf9784650db87d2d1fecdc746f9717db5cc5944bf9f7f5
BUTTSniff v0.9.2: Standalone packet sniffer for Windows or back oriface sniffer plugin.
4702553e27b485e2298513c63801148a641d7afed7303bba42efae3572128d20
BUTTSniff v0.9.3 - Standalone packet sniffer for Windows or back oriface sniffer plugin.
470de5c56d27da9ec20c977ffe0e6f5dd08fd4ba2fabe5ab97d1cd02d9412891
TFAK v2.0 is a client for 19 remote access trojans, and removes 141 remote access trojans. This is the first and only trojan scanner which is able to find new, unknown trojans. Archive password is set to p4ssw0rd. Use at your own risk.
c3c02b238c7c77aef15e42dcae79afd5f0221802d9043f069e40cae12df95e2c
b0flogo.jpg
a9f00c653041051e21a406b73dfc4b6968275b0952c384bfaa8558ba2712517f
Linux 2.2.x IP Masquerading allows UDP packets in from the outside until the firewall times out. Under certain rare conditions, a UDP based service could be exploited from the outside.
19b4d2af4973b99c732c740c021e43f8fd08b524f19e5360b962ea66bf11b0b1
SGI IRIX objectserver remote exploit - Remotely adds account to the IRIX system. Patched February, 1998. Tested on IRIX 5.2, 5.3, 6.0.1, 6.1 and even 6.2.
50cc9680c224be9e0219d599f01be7fd1deae2ff3856942ef92ade8bb1049054
SGI Security Advisory - A remote vulnerability in the objectserver(1M) daemon has been discovered which can lead to unauthorized non-privileged user accounts being created. IRIX operating systems versions 5.1 through 6.2 are vulnerable. SGI Security page here.
62bd2d1d51a462ebca4fd8887d85a6f4a333ec705b12f8d65fdd2ccbeaaecfbf
HTTP cache-control headers such as If-Modified-Since allow servers to track individual users in a manner similar to cookies, but with less constraints. This is a problem for user privacy against which browsers currently provide little protection.
6c0889a369f0094da2a486100eb292664da60e19b64393c51e565ab036c0676d
Red Hat Security Advisory - A buffer overflow exists in ircii 4.4M dcc chat capability, an attacker could use this overflow to execute code as the user of ircii.
8ccdb5086a1c0a46f3c94cb97d4f70cee2b1e0dc5f27731bed18e2b8150b6438
mars_nwe 0.99pl14 root exploit (linux).
1db24f34aca77024b88baaacbf9a1854e0ff4717e6afdfe44e406ecb090e7ea4
Seclog (security logger) is a log auditing tool written in Perl. It will watch /var/log/messages for suspicious information and notify you via email.
409e621c83ac8b2026f4e2d0140e0b0918baa58a851e5bcce19f32ce0b1942dd