what you don't know can hurt you
Showing 1 - 17 of 17 RSS Feed

Files Date: 2000-04-25

Posted Apr 25, 2000
Site opensourcefirewall.com

T.REX Open Source Firewall - The T.Rex Firewall is a highly integrated enterprise security suite that combines functions that normally require the installation of multiple products. Features stateful packet inspection, content filtering, NAT, authentication, VPN, Workload Balancing, high availability, Real-time performance monitor, Network scanning and intrusion detection tools, and Extensive auditing and reporting tools that can produce more than 52 unique reports.

Changes: Improved documentation, admin guide, and config examples, Sockd support added to hoplite and padminsvr, better mail relay blocking, better compilation support, Solaris 7 support.
tags | tool, firewall
systems | unix
MD5 | c88fb78b1a8768557bd413c0aa8edc0c
Posted Apr 25, 2000
Authored by Solar Designer | Site openwall.com

Scanlogd v2.1 is a TCP port scan detection tool for linux, originally designed to illustrate various attacks an IDS developer has to deal with, for a here.

tags | tcp
systems | linux, unix
MD5 | 63ffab643c61f932faabed8c6aa2b68e
Posted Apr 25, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Added Search to SARA, Added sgi_pmcd vulnerability test, Added Solaris nisd vulnerability test, Added Compaq CIM server vulnerability test, Added numerous new cgi vulnerability tests, fixed bugs.
tags | tool, cgi, scanner
systems | unix
MD5 | 9949f53709cea38044ea97328418b382
Posted Apr 25, 2000
Authored by Bart Cichosz | Site barrrt.tripod.com

E-LogMonitor is an Enlightenment epplet that monitors various log files for the occurence of specified keywords. It supports up to 20 file/keyword combinations and provides various ways of alerting the user if a keyword has been detected.

tags | system logging
systems | unix
MD5 | dab88b35217ca262194540c1ae86dc50
Posted Apr 25, 2000
Authored by Juan Toledo | Site etherape.sourceforge.net

Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.

Changes: Memprof reports no more memory leaks, a new Stack Level setting ("Topmost Recognized Protocol", recommended as default), reading of TCP and UDP protocols from a configuration file (services), new start and stop buttons, a new -l option to limit the nodes displayed only to the N most active, and a fix to stop hogging the CPU in offline mode anymore so that node size is zero again when the average traffic is zero.
tags | tool, sniffer
MD5 | 004893e4a168882f42ff11155d231f3b
Posted Apr 25, 2000
Site caspian.dotconf.net

LogDog is a very easy to configure and install system log monitor for watching system log files and emailing administrators when problems are found. Note that LogDog sends email to REAL email addresses, and does not require sendmail to be installed, it uses SendEmail which is also written by me and is included with the LogDog package as of v0.94.4. LogDog has a single configuration file which allows you to easily specify a list of key words to watch for, a list of words to ignore, a list of administrators to email when problems are found.

tags | system logging
systems | unix
MD5 | ef78d409fb2bc7ab18f4cf69ca825d1a
Posted Apr 25, 2000
Authored by Ambient Empire

Grout is the geographical tracerouter for unix. It combines the fastest tracerouter with the ability to display the location of intermediate machines. Developed for openbsd.

Changes: First release - no longer in beta.
tags | tool
systems | unix, openbsd
MD5 | 62766abaec240937a7bd4d005ddd66f6
Posted Apr 25, 2000
Authored by Anathema | Site hack.co.za

dig v2.2 local buffer overflow exploit for x86 linux. Note that dig isn't suid/sgid on some platforms, yet on some it is.

tags | exploit, overflow, x86, local
systems | linux
MD5 | 64d48db2681ea2a2b39db0e4c5ed0534
Posted Apr 25, 2000
Authored by Anathema | Site hack.co.za

imapd IMAP4rev1 v10.205 remote root exploit, solaris x86. Exploits the AUTHENTICATE overflow, yielding a remote root shell.

tags | exploit, remote, overflow, shell, x86, root
systems | solaris
MD5 | 17dccafa4023b4e90eca4080fb7fb349
Posted Apr 25, 2000
Authored by Anathema | Site hack.co.za

rpc.nisd remote root overflow, solaris 2.4 x86. Solaris 2.5.0 and 2.5.1 work with different offset.

tags | exploit, remote, overflow, x86, root
systems | solaris
MD5 | 1e55d0eb740d2466af259ef2a0568bb1
Posted Apr 25, 2000
Authored by Anathema | Site hack.co.za

/usr/bin/lpset local root stack overflow for Solaris 7, x86.

tags | exploit, overflow, x86, local, root
systems | solaris
MD5 | 93e3c382eb49fce68e2608335d7a11ec
Posted Apr 25, 2000
Authored by Anathema | Site hack.co.za

xsun.c is a Solaris 7 x86 local root stack overflow for /usr/openwin/bin/Xsun.

tags | exploit, overflow, x86, local, root
systems | solaris
MD5 | bd086d8cbf97cd7d1167f0621b4bd3c4
Posted Apr 25, 2000
Authored by L. Lizerman | Site members.xoom.com

Broadcast Internet String Search Engine (BISSE) is a windows based scanner which searches your network for servives who have banners which match a user specified string.

systems | windows
MD5 | 26d91263d31131695ec63da33c53cffe
FreeBSD Security Advisory 2000.15
Posted Apr 25, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:15 - The imap-uw port supplies a "libc-client" library which provides various functionality common to mail servers. The algorithm used for locking of mailbox files contains a weakness which allows an unprivileged local user to lock an arbitrary local mailbox.

tags | arbitrary, local, imap
systems | freebsd
MD5 | b16f4783d7a4c96ca780a1e05bd8f879
FreeBSD Security Advisory 2000.14
Posted Apr 25, 2000
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-00:14 - imap-uw contains security vulnerabilities for "closed" mail servers. There are numerous buffer overflows available to an imap user after they have successfully logged into their mail account. Thus, the vulnerability is only relevant on a "closed" mail server, i.e. one which does not normally allow interactive logins by mail users.

tags | overflow, vulnerability, imap
systems | freebsd
MD5 | a4690203293f3e292bf0241444c792e8
Posted Apr 25, 2000
Authored by Freddy Laplaine | Site Asmbeginer.com

Crazy Scan is a unix based scanner which scans for NT web vulnerabilties. Checks for about 30 cold fusion files, some cgi's, IIS / iisadmin scripts, msadc, and many other url's that indicate a remote vulnerability. Checks for 140 paths in all. Bug list available here.

tags | remote, web, cgi
systems | unix
MD5 | e4f788eff0b68c911dd8992fa4c4f4df
Posted Apr 25, 2000
Authored by Drunken Monkey Style

The mio-star distributed multihosted unix password cracker v0.1 runs on all platforms where perl is installed. Comments and documentation is in German.

tags | denial of service, perl
systems | unix
MD5 | 38125314bcf691a20a4acf5974f43e02
Page 1 of 1

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By