Secure Worx (TM) Network Intrusion Detection System - The intrusion detection system is a network based system that performs high-speed traffic analysis of the content and context of a network packet to detect unauthorized traffic in real-time. It has inexpensive hardware and OS requirements. The intrusion detection system runs on a Intel Pentium class compatible processor with a 10/100 Ethernet card running the Linux OS with kernel 2.2 and above with a configured TCP/IP stack. The installation process involves running an installation script that asks a few simple questions. It is then a simple matter of starting the software and your network is then searched for anomalous activity.
faea89ee797f3f11988cce474a14e1abb795054d5e4a03ec5804ff43884cdee8
There are continuing compromises of machines running the Domain Name System (DNS) server software that is part of BIND ("named"), including compromises of machines that are not being used as DNS Servers.
963aadc711ddd0cc32b45275239100e6619d5dfd74f8b0a52fa29b8b8ef0e9d5
Script used to scan for the Cart32 vulnerability. Anonymously Submitted.
b1b84ce54d1dc264e9ddddb9c86e0ad712ed73384db9127f9030cd4e819e3e83
Switch Fucker is a frontend to Arptool, to easily sniff connections in a switched network. And it has some goodies, like automated mac sniffing from the target and easy DoS Attacks.
9d683254f20858b6e61f12e8cc48eb735eaf026d97d419ad5c1f7a95aefd43ba
SuSE Security Advisory - aaa_base is the basic package which comes with any SuSE Linux installation. Two vulnerabilities have been found: 1) The cron job /etc/cron.daily/aaa_base does a daily checking of files in /tmp and /var/tmp, where old files will be deleted if configured to do so. Please note that this feature is NOT activated by default. 2) Some system accounts have their homedirectories set to /tmp by default. These are the users games, firewall, wwwrun and nobody on a SuSE 6.4.
5a3e2e3231a4460b85f1219b5ea705fbcc5e0ff1be6878fc5be1742a41f15b0a
In response to the surfacing of the mstream attack tool and the published analysis of its inner workings, a set of SNP-L scripts and attack signatures has been developed which allow one to detect and decode "mstream" network activity.
7d599172d8cb0bff081b92cc56b96669bc4b1a244c78ad849b823846dd543336
SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.
46761eef129f31c072ac46eb5837adcec548df2fffc8b5e023df425a622b1e79
Internet Scanner and the Real Secure products can both be used for bad. Submitted Anonymously.
df9bfc9f99bf0383ee7387fedbd24255d38196a8e92216724058308703f15a4f
A new Distributed Denial of Service tool, mstream, has been discovered at the University of Washington. It has also been seen on networks at Penn State and Indiana University. A Distributed Denial of Service attack is designed to bring a network down by flooding target machines with large amounts of traffic. The source code for a version of the program was recently posted anonymously to the BugTraq and VULN-DEV e-mail lists hosted by SecurityFocus. This tool includes a master controller and a zombie. The master controller is the portion of the tool that controls all of the zombie agents. An attacker connects to the master controller using telnet to control the zombies.
831b88ac1fc976e9564f7cfad9d681900d7de2682423dab9dddec3575ad0743e
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. This release addresses the pirahna attack and the mstream DDOS detection. Added pirahna test (password vulnerability in Linux Web server), Updated http.sara to reduce false alarms on non 404 servers, updated sara.cf to avoid answerbook2 inadvertent denial of service, Added test for pcanywhere, Added test for mstream DDOS agents.
b9a2c7095c6caeb70b3168bb283941e4326fe98c4629e23efe781d4e162e3548
This is crypto version 0.06. This is a beta release with very limited functionality. It was written completely from scratch in C. It started out as joke about the NSA, and one hour later, crypto 0.01 was born. Now it is very useful to protect your personal information.
ee88a6ccecb4c6ec792bc373f777c4054c4376606a8ad00dce1de6a304f5d6f2
USSR Advisory #39 - Remote DoS attack in CASSANDRA NNTPServer v1.10 from ATRIUM SOFTWARE Vulnerability. The Ussr Labs Team has recently discovered a buffer overflow problem in the CASSANDRA NNTPServer v1.0. Performing an attack, with excessive login information on Port 119, can cause the process containg the services to stop responding.
17a506747b2a9826304107dde7d83dac57c212fd345197f859dcc3e40633fb0b