what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 21 of 21 RSS Feed

Files Date: 2000-04-04

Posted Apr 4, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Kernel based portscan detection, disconnects a user automatically that violates the rules, and messsage logging when user binds to a port lower than 1024.
tags | kernel, root
systems | linux
SHA-256 | 2cd16fc73298f7e8afd0d598f603787e2efc0a1a70a3a80ffad4df48fa992f3a
Posted Apr 4, 2000
Authored by Marvin | Site synscan.nss.nu

XOR-analyze is a program for cryptoanalyzing one of the most easily-breakable and commonly used ciphers. Works with variable key length and includes an encryption/decryption program.

tags | encryption
SHA-256 | 43700e7f6735f4eea6e561121f344b4c68a41c40c6ee2cbb7fb1deb47ce630c3
Posted Apr 4, 2000
Site xforce.iss.net

ISS Security Alert Summary 5.3 - Summary of vulnerabilities discovered in March, 2000. Contains 33 reported vulnerabilities - windmail-pipe-command, windmail-fileread, simpleserver-exception-dos, linux-domain-socket-dos, linux-gpm-root, outlook-manipulate-hidden-drives, vqserver-dir-traverse, vqserver-passwd-plaintext, iis-chunked-encoding-dos, nav-email-gateway-dos, netscape-server-directory-indexing, mercur-webview-get-dos, officescan-admin-pw-plaintext, officescan-admin-access, linux-kreatecd-path, win-dos-devicename-dos, wmcdplay-bo, nt-registry-permissions, staroffice-scheduler-fileread, staroffice-scheduler-bo, iis-root-enum, mssql-query-abuse, clipart-cil-bo, oracle-installer, linux-rpm-query, thebat-mua-attach, irix-infosrch-fname, linux-dosemu-config, coldfusion-reveal-pathname, netscape-enterprise-command-bo, nmh-execute-code, htdig-remote-read, and ie-html-shortcut.

tags | remote, root, registry, vulnerability
systems | linux, irix
SHA-256 | 73a4d14101964f3e30048066a698907d3a3a447cd3fd69d5e08ddd23f575d71c
Posted Apr 4, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 61d639a9f1038fc54fb7bfdcb2f44a0fee9e12fc773a9d966891b5fe1b27c868
Posted Apr 4, 2000
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.

Changes: The hiding legend works again, and link directions have been reversed in ethernet mode.
tags | tool, sniffer
SHA-256 | e7562c10bffe69d06d4b0a17e76b30bc94a9c6b8a69b192ae29378d428802246
Posted Apr 4, 2000
Authored by Optyx | Site uberhax0r.net

Cattscanner v0.6 - CATTscanner or Configurable Autonomous Threaded Topography scanner is a compilation of common networking tools rewritten into one massively configurable, massively portable, independent, fast package. CATTscanner is also written in 100% ANSI C and uses no external libraries so it will compile on most every operating system and platform. Features support for RPC, NFS, and NBT mapping, and support for version queries, extremely readable code, and output to interlinked HTML files.

tags | tool, scanner
systems | unix
SHA-256 | 8a9ff148d70c04876ae884c76ad54c5b99c881c6a756c5b4d8d6146ca3c11f4c
Posted Apr 4, 2000
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock.

Changes: Updates to critical, bsod, xflame, maze, and flow hacks, Webcollage updated to handle recent Altavista URL format changes, bug fixes.
tags | root
systems | unix
SHA-256 | edb78d577c0007b76173b610abc6948d5eacb59b108e0021470a94ef23379ebc
Posted Apr 4, 2000
Authored by Neon-Lenz | Site security.ellicit.org

Auto NetBIOS Hacker for Windows 95/98/NT v1.2 - Gets the target's NetBIOS name-table, connects to the IPC$ hidden null share and gives you the available shares of the target with one single command.

Changes: Command line operation!
systems | windows
SHA-256 | d5ac027d7e443a64c99c38242be6797cde475d6b152f1f010b431156474133aa
Posted Apr 4, 2000
Authored by David Mazi, M. Frans Kaashoek

The Design, Implementation and Operation of an Email Pseudonym Server - Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. This paper describes the design, implementation, and operation of nym. alias. net, a server providing untraceable email aliases.

tags | paper, protocol
SHA-256 | 0c099b336055f09c9351fc9c1f4348ed952daddd46f6257773bb376358b5bfab
Linux IPTables Firewall
Posted Apr 4, 2000
Authored by Netfilter Core Team | Site iptables.org

Iptables is built on top of netfilter: the new packet alteration framework for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects.

Changes: Segfaults fixed, --help flag fixed, --protocol accepted, and future file times fixed.
tags | tool, firewall
systems | linux
SHA-256 | 8d2c272e5916a9c69aaf9784650db87d2d1fecdc746f9717db5cc5944bf9f7f5
Posted Apr 4, 2000
Authored by Dildog

BUTTSniff v0.9.2: Standalone packet sniffer for Windows or back oriface sniffer plugin.

Changes: Upgraded to work with Windows NT! Also added IP and port filtering for direct disk dump.
tags | tool, sniffer
systems | windows
SHA-256 | 4702553e27b485e2298513c63801148a641d7afed7303bba42efae3572128d20
Posted Apr 4, 2000

BUTTSniff v0.9.3 - Standalone packet sniffer for Windows or back oriface sniffer plugin.

tags | tool, sniffer
systems | windows
SHA-256 | 470de5c56d27da9ec20c977ffe0e6f5dd08fd4ba2fabe5ab97d1cd02d9412891
Posted Apr 4, 2000
Authored by SnakeByte | Site coderz.net

TFAK v2.0 is a client for 19 remote access trojans, and removes 141 remote access trojans. This is the first and only trojan scanner which is able to find new, unknown trojans. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
SHA-256 | c3c02b238c7c77aef15e42dcae79afd5f0221802d9043f069e40cae12df95e2c
Posted Apr 4, 2000


SHA-256 | a9f00c653041051e21a406b73dfc4b6968275b0952c384bfaa8558ba2712517f
Posted Apr 4, 2000
Authored by H D Moore

Linux 2.2.x IP Masquerading allows UDP packets in from the outside until the firewall times out. Under certain rare conditions, a UDP based service could be exploited from the outside.

tags | exploit, udp
systems | linux
SHA-256 | 19b4d2af4973b99c732c740c021e43f8fd08b524f19e5360b962ea66bf11b0b1
Posted Apr 4, 2000
Authored by Marcy

SGI IRIX objectserver remote exploit - Remotely adds account to the IRIX system. Patched February, 1998. Tested on IRIX 5.2, 5.3, 6.0.1, 6.1 and even 6.2.

tags | exploit, remote
systems | irix
SHA-256 | 50cc9680c224be9e0219d599f01be7fd1deae2ff3856942ef92ade8bb1049054
SGI Security Advisory 20000328
Posted Apr 4, 2000

SGI Security Advisory - A remote vulnerability in the objectserver(1M) daemon has been discovered which can lead to unauthorized non-privileged user accounts being created. IRIX operating systems versions 5.1 through 6.2 are vulnerable. SGI Security page here.

tags | remote
systems | irix
SHA-256 | 62bd2d1d51a462ebca4fd8887d85a6f4a333ec705b12f8d65fdd2ccbeaaecfbf
Posted Apr 4, 2000
Authored by Martin Pool

HTTP cache-control headers such as If-Modified-Since allow servers to track individual users in a manner similar to cookies, but with less constraints. This is a problem for user privacy against which browsers currently provide little protection.

tags | exploit, web
SHA-256 | 6c0889a369f0094da2a486100eb292664da60e19b64393c51e565ab036c0676d
Posted Apr 4, 2000

Red Hat Security Advisory - A buffer overflow exists in ircii 4.4M dcc chat capability, an attacker could use this overflow to execute code as the user of ircii.

tags | overflow
systems | linux, redhat
SHA-256 | 8ccdb5086a1c0a46f3c94cb97d4f70cee2b1e0dc5f27731bed18e2b8150b6438
Posted Apr 4, 2000
Authored by Venglin | Site b0f.freebsd.lublin.pl

mars_nwe 0.99pl14 root exploit (linux).

tags | root
systems | linux
SHA-256 | 1db24f34aca77024b88baaacbf9a1854e0ff4717e6afdfe44e406ecb090e7ea4
Posted Apr 4, 2000
Authored by Dilusi0n | Site gotr00t.com

Seclog (security logger) is a log auditing tool written in Perl. It will watch /var/log/messages for suspicious information and notify you via email.

Changes: Major rewrite, all system calls have been removed, works much faster now, more secure, saves backups of the reports/mails it creates.
tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 409e621c83ac8b2026f4e2d0140e0b0918baa58a851e5bcce19f32ce0b1942dd
Page 1 of 1

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By