exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-04-06

nessus-1.0.0pre3.tar.gz
Posted Apr 6, 2000
Authored by Renaud Deraison | Site nessus.org

Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 330 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.

Changes: Added the utility nessus-update-plugins which can be used to keep the nessusd plugins set up-to-date. A dozen of new plugins have been added (piranha, uw imap overflow, Ken!, htimage.exe, lcdproc overflow, and real server DoS.
tags | tool, remote, scanner
systems | linux, unix, solaris, bsd
SHA-256 | d3d9e3c74e4221b60441b42bd858b53769da4a14446c74c64ecb7e3a8ed8abc7
overwrite-0.4.tar.gz
Posted Apr 6, 2000
Authored by Antirez | Site kyuzz.org

Overwrite is a UNIX utility for secure deletion, based on Peter Gutmann's paper "secure deletion of data from magnetic and solid state memory" and was created in order to make harder the data recovery process. It implements a built-in cryptographic prng and try to flush the SO and HD cache when possible.

Changes: Support for *BSD and Solaris support, the ability to overwrite block and char devices, and some minor bugfixes.
systems | unix
SHA-256 | 645eb887739f8ca1576eabc9a29b0604513f6cd18eb5d6f84e29efc5d7e2849c
winreal.6-7.txt
Posted Apr 6, 2000
Authored by Adam Muntner

There is a buffer overflow in the Win32 RealPlayer Basic client versions 6 and 7 which occurs when a long location to play string is entered. Using the HTML "EMBED" tag to embed RealPlayer in a webpage and setting the "AUTOSTART=true" flag, you can force RealPlayer to start automatically, triggering the overflow condition. It appears that arbitrary code could be exploited simply by *VISITING* a webpage with the malicious embedded RealPlayer tags. MacOS and linux versions appear not to be vulnerable.

tags | exploit, overflow, arbitrary
systems | linux, windows
SHA-256 | 37419905d1e37c015f0676d7c50395144408e6d018c7cd4c3400a0871bbd49fd
napalm-4.txt
Posted Apr 6, 2000
Authored by napalm, Kynik | Site napalm.firest0rm.org

Napalm Magazine issue #4 - In this issue: Editor's Comments, URL's, Securing Solaris 2.x, Music Review, and everything you ever wanted to know about Just Intonation.

tags | magazine
systems | solaris
SHA-256 | cafa960c5133d57cf2949d3e0b0002727f79650f23b625434d814466d34e1528
Nmap Scanning Utility 2.30 BETA 18
Posted Apr 6, 2000
Authored by Fyodor | Site insecure.org

Nmap is an advanced utility for network exploration or security auditing. It supports ping scanning, many port scanning techniques, TCP/IP fingerprinting (remote OS detection), advanced host enumeration, firewall bypassing, flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: Fixed a very important bug that occurred when SYN scanning localhost, added a #define to change vsnprintf to vsprintf on Solaris 2.5.1 and earlier, added support for "-vv".
tags | tool, remote, tcp, nmap
systems | unix
SHA-256 | 6837b204c5af1e4441e818f15a205ea1c748617529e62b85e932fe3c069e09e2
phpfwgen-0.94.tar.gz
Posted Apr 6, 2000
Authored by Del | Site phpfwgen.sourceforge.net

The PHP firewall generator is a simple PHP script that generates a firewall script for ipchains-based firewalls. The aim is to support an easily configurable rule set similar to those supported by commercial firewall systems.

Changes: A bugfix regarding forwarding packets between masqueraded networks, important for VPN and dialin users.
tags | tool, php, firewall
systems | linux
SHA-256 | 1aae0966158631fd10c92f18a526fa8ffda4b4db167899ea9d24dcff10ba022d
Bastille-1.0.5.pre1.tar.gz
Posted Apr 6, 2000
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1/6.2. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: New functions in the API for a cleaner, smarter backup scheme, minor tweaks to be ultra-careful in User Interface compatibility, and removed "root notify" from roots .bashrc.
systems | linux, redhat
SHA-256 | e624219f95c468cb2ebbb870f8521a099c735b63bca8b56de035c41d2cebe6c4
sentinel-0.09.tar.gz
Posted Apr 6, 2000
Authored by Bind | Site packetfactory.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 18806ab69e48a986029b36c10e8f6b0206d3907890b5838438dfe6f443e204f2
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close