what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-05-02

secureworx0_7-B1.sh
Posted May 2, 2000
Authored by Secure Worx | Site secureworx.homestead.com

Secure Worx (TM) Network Intrusion Detection System - The intrusion detection system is a network based system that performs high-speed traffic analysis of the content and context of a network packet to detect unauthorized traffic in real-time. It has inexpensive hardware and OS requirements. The intrusion detection system runs on a Intel Pentium class compatible processor with a 10/100 Ethernet card running the Linux OS with kernel 2.2 and above with a configured TCP/IP stack. The installation process involves running an installation script that asks a few simple questions. It is then a simple matter of starting the software and your network is then searched for anomalous activity.

tags | tool, kernel, tcp, intrusion detection
systems | linux, unix
SHA-256 | faea89ee797f3f11988cce474a14e1abb795054d5e4a03ec5804ff43884cdee8
CA-2000-05.dns
Posted May 2, 2000
Site ciac.org

There are continuing compromises of machines running the Domain Name System (DNS) server software that is part of BIND ("named"), including compromises of machines that are not being used as DNS Servers.

SHA-256 | 963aadc711ddd0cc32b45275239100e6619d5dfd74f8b0a52fa29b8b8ef0e9d5
cart32scan.pl
Posted May 2, 2000

Script used to scan for the Cart32 vulnerability. Anonymously Submitted.

tags | exploit
SHA-256 | b1b84ce54d1dc264e9ddddb9c86e0ad712ed73384db9127f9030cd4e819e3e83
sf.tar.gz
Posted May 2, 2000
Authored by Anthraxx | Site datacomm.ch

Switch Fucker is a frontend to Arptool, to easily sniff connections in a switched network. And it has some goodies, like automated mac sniffing from the target and easy DoS Attacks.

tags | tool
systems | unix
SHA-256 | 9d683254f20858b6e61f12e8cc48eb735eaf026d97d419ad5c1f7a95aefd43ba
suse.aaabase.txt
Posted May 2, 2000
Authored by SuSE Security | Site suse.de

SuSE Security Advisory - aaa_base is the basic package which comes with any SuSE Linux installation. Two vulnerabilities have been found: 1) The cron job /etc/cron.daily/aaa_base does a daily checking of files in /tmp and /var/tmp, where old files will be deleted if configured to do so. Please note that this feature is NOT activated by default. 2) Some system accounts have their homedirectories set to /tmp by default. These are the users games, firewall, wwwrun and nobody on a SuSE 6.4.

tags | vulnerability
systems | linux, suse
SHA-256 | 5a3e2e3231a4460b85f1219b5ea705fbcc5e0ff1be6878fc5be1742a41f15b0a
Turner.mstream
Posted May 2, 2000
Authored by Elliot Turner

In response to the surfacing of the mstream attack tool and the published analysis of its inner workings, a set of SNP-L scripts and attack signatures has been developed which allow one to detect and decode "mstream" network activity.

tags | denial of service
SHA-256 | 7d599172d8cb0bff081b92cc56b96669bc4b1a244c78ad849b823846dd543336
saint-2.0.2.beta2.tar.gz
Posted May 2, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 46761eef129f31c072ac46eb5837adcec548df2fffc8b5e023df425a622b1e79
ISS.txt
Posted May 2, 2000

Internet Scanner and the Real Secure products can both be used for bad. Submitted Anonymously.

tags | exploit
SHA-256 | df9bfc9f99bf0383ee7387fedbd24255d38196a8e92216724058308703f15a4f
iss.00-05-02.mstream
Posted May 2, 2000
Site xforce.iss.net

Internet Security Systems Security Alert - A new Distributed Denial of Service tool, mstream, has been discovered at the University of Washington. It has also been seen on networks at Penn State and Indiana University. A Distributed Denial of Service attack is designed to bring a network down by flooding target machines with large amounts of traffic.

tags | denial of service
SHA-256 | 831b88ac1fc976e9564f7cfad9d681900d7de2682423dab9dddec3575ad0743e
sara-3.0.2.tar.gz
Posted May 2, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. This release addresses the pirahna attack and the mstream DDOS detection. Added pirahna test (password vulnerability in Linux Web server), Updated http.sara to reduce false alarms on non 404 servers, updated sara.cf to avoid answerbook2 inadvertent denial of service, Added test for pcanywhere, Added test for mstream DDOS agents.

tags | tool, web, denial of service, scanner
systems | linux, unix
SHA-256 | b9a2c7095c6caeb70b3168bb283941e4326fe98c4629e23efe781d4e162e3548
crypto-06.tgz
Posted May 2, 2000
Authored by PepsiCrew

This is crypto version 0.06. This is a beta release with very limited functionality. It was written completely from scratch in C. It started out as joke about the NSA, and one hour later, crypto 0.01 was born. Now it is very useful to protect your personal information.

tags | encryption, crypto
SHA-256 | ee88a6ccecb4c6ec792bc373f777c4054c4376606a8ad00dce1de6a304f5d6f2
labs39.txt
Posted May 2, 2000
Site ussrback.com

USSR Advisory #39 - Remote DoS attack in CASSANDRA NNTPServer v1.10 from ATRIUM SOFTWARE Vulnerability. The Ussr Labs Team has recently discovered a buffer overflow problem in the CASSANDRA NNTPServer v1.0. Performing an attack, with excessive login information on Port 119, can cause the process containg the services to stop responding.

tags | remote, overflow
SHA-256 | 17a506747b2a9826304107dde7d83dac57c212fd345197f859dcc3e40633fb0b
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    11 Files
  • 8
    Dec 8th
    45 Files
  • 9
    Dec 9th
    9 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close