what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-04-10

hns.pl
Posted Apr 10, 2000
Authored by MerXorcist

hns.pl grabs current news only from www.net-security.org.

tags | web
SHA-256 | 145d7c7865b2bcf83ec22266a65aaea6635ac330454bd1e793f9f8434f2a6709
sara-2.1.13.tar.gz
Posted Apr 10, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Added daemon mode of SARA, Improved SMB analysis (fewer false positives), Added basic Shaft DDoS detection, Improved http.sara, fixed IRIX makefile problem, Added test for IRIX 5.x - 6.2 objectserver exploit.
tags | tool, cgi, scanner
systems | unix
SHA-256 | a518302aedb9fba4a040f690ec5857c4f04fd565819329c928fc297f5e21b89e
Nmap Scanning Utility 2.30 BETA 19
Posted Apr 10, 2000
Authored by Fyodor | Site insecure.org

Nmap is an advanced utility for network exploration or security auditing. It supports ping scanning, many port scanning techniques, TCP/IP fingerprinting (remote OS detection), advanced host enumeration, firewall bypassing, flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: Tweaked the output so that it now tells how many ports are not shown and what state the ignored ports are in, Added a new attribute "Ignored State: xxx" to the machine parseable logs, openbsd and linux fixes, and minor bug fixes.
tags | tool, remote, tcp, nmap
systems | unix
SHA-256 | 81b964ec3afd970885a257e54d74775e338c2000a401610d1204360f9e98709b
cattscanner-0.61.tar.gz
Posted Apr 10, 2000

No information is available for this file.

tags | tool, scanner
systems | unix
SHA-256 | 42b7ad06bfae7780a9a123979eb073203e428629dd16db19cc5c922b626d59ab
IRIX.Login.Security.txt
Posted Apr 10, 2000
Authored by Prizm

IRIX Login Security - In this paper you will learn a bit about logins, and the seriousness of what could happen if you don't take certain precautions. You will have found out some options you can take with your logins, certain restrictions, and a lot more.

tags | paper
systems | unix, irix
SHA-256 | 35daa4e31eadc2e9835852cb680f16c18c3d63d83c32a3c93afa078dcdfd4718
hnn.pl
Posted Apr 10, 2000
Authored by MerXorcist

hnn.pl grabs current or archived news from hackernews.com.

tags | web
SHA-256 | 4aa74e156b28e47e67ebd2f0773cbd2892e57ab0845795c9fce896c00ee121b6
NTsec.doc
Posted Apr 10, 2000
Authored by Neon-Lenz | Site ellicit.org

NTsec.doc is a Microsoft Word document concerning Remote NT-security, contains information about SMB, NetBIOS, NT-TCP/IP, and major IIS vulnerabilities. The current version is 1.0, updates are coming very soon.

tags | paper, remote, tcp, vulnerability
SHA-256 | 2a9088874be5b5f5b4ad405f727eb289264350261f9fe88962bf3ba4d59ea695
freenet-0.1beta.tgz
Posted Apr 10, 2000
Authored by The Freenet Development Team | Site freenet.sourceforge.net

Freenet is a peer-to-peer network designed to allow the distribution of information over the Internet in an efficient manner, without fear of censorship. It is completely decentralized (there is no person or computer essential to its operation), meaning that Freenet cannot be attacked like centralized peer-to-peer systems such as Napster. Freenet also employs intelligent routing and caching to learn to route requests more efficiently, automatically mirror popular data, make network flooding almost impossible, and move data to where it is in greatest demand.

tags | tool
systems | unix
SHA-256 | 8c90b7a1ca29f9982d4550a9106c7c19a6acd7cbe0dac4a0b44ed9d04087e11c
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close