exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2000-04-26

lids-0.9-2.2.14.tar.gz
Posted Apr 26, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: Compilation problem fixed.
tags | kernel, root
systems | linux
SHA-256 | a38234b0d2c4e880c840258cb326cbd8662e5de7675c99bef86ba7bd995e4db3
saint-2.0.2.beta1.tar.gz
Posted Apr 26, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 38521416792f575bafdfe43774831ce1de923f0bf7c637433a82e0c2069a9b85
ISS Security Advisory April 26, 2000
Posted Apr 26, 2000
Site xforce.iss.net

Internet Security Systems (ISS) X-Force has discovered a vulnerability in the AIX frcactrl program. The Fast Response Cache Accelerator (FRCA) is a kernel module that can be used with the IBM HTTP server to improve the performance of a web server. If the FRCA module is loaded, a local attacker could use frcactrl, a program used to manage FRCA configuration, to modify files.

tags | web, kernel, local, root
systems | aix
SHA-256 | 4c52418fd006161d9742422a2bf61974cc7390397b5bdafb2ad32a6aba05f961
ip-fil3.3.13.tar.gz
Posted Apr 26, 2000
Authored by Darren Reed | Site coombs.anu.edu.au

IP Filter is a TCP/IP packet filter suitable for use in a firewall environment. To use, it can either be run as a loadable kernel module (recommended) or incorporated into your UNIX kernel. Scripts are provided to install and patch system files as required.

Changes: Fixes for parsing of range with portmap and NAT timeouts for ICMP packets, somewhat relaxed checking of FTP replies, and SunOS4 patches for ICMP redirects.
tags | tool, kernel, tcp, firewall
systems | unix
SHA-256 | 441a6f73c241eb24222aa49e707efe700b07b96d28b867319c5bf5a79b506cbb
pwdump2.zip
Posted Apr 26, 2000
Authored by Todd Sabin | Site razor.bindview.com

pwdump2 - This is an application which dumps the password hashes (OWFs) from NT's SAM database, whether or not SYSKEY is enabled on the system.

Changes: It can now dump password hashes on W2K domain controllers. The previous version was unable to get the hashes from Active Directory.
tags | cracker
SHA-256 | 16a77e246b28114635e53ac29ced3bab37b377719626d78e44fb26f7ff6499d4
ircii-dcc.tgz
Posted Apr 26, 2000
Authored by S

irii-dcc is a set of perl scripts which exploits a dos vulnerability in ircii-4.4 when sending and receiving a dcc chat request from/to a vulnerable client.

tags | denial of service, perl
SHA-256 | 480639cea435396e89c11b39f8dea3c9b7d5cc7feb64de1783c33a07eca4a819
sqlsyslogd.c
Posted Apr 26, 2000
Authored by Venglin | Site freebsd.lublin.pl

syslogd-to-MySQL wrapper v0.1 prebeta. Stores syslog messages in a MySQL database. Written for FreeBSD.

systems | freebsd
SHA-256 | b44da69a92c3350c4053b05fab764bff3d6940f5eb010c5337cd82acb8578da7
plogd2.c
Posted Apr 26, 2000
Authored by Venglin | Site freebsd.lublin.pl

Plogd v2 (Revision 1.5) is a syn/udp/icmp packet logger for freebsd.

Changes: Fixed fd leak, misc bugfixes.
tags | udp
systems | freebsd
SHA-256 | c8063e2434da5fb556ad35fc5af1b0a42d30521cf23bede1da4f7da952df83df
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close