what you don't know can hurt you
Showing 1 - 9 of 9 RSS Feed

Files Date: 2000-05-16

Posted May 16, 2000
Authored by Tiz.Telesup

This is a denial of service attack against the Cisco 760 series router.

tags | denial of service
systems | cisco
MD5 | 0da671f3b179a2e7354d420db7afdabe
Posted May 16, 2000
Authored by Craig Smith

A perl script that passively fingerprints OSes based on signatures.

tags | tool, perl, intrusion detection
systems | unix
MD5 | 6021a9992e1d522783d586f3b60780f5
Posted May 16, 2000
Authored by Lance Spitzner | Site enteract.com

IDing remote hosts, without them knowing. This paper details the process of Passive Fingerprinting. Passive fingerprinting is based on sniffer traces from the remote system. Instead of actively querying the remote system, all you need to do is capture packets sent from the remote system. Based on the sniffer traces of these packets, you can determine the operating system of the remote host. Just like in active fingerprinting, passive fingerprinting is based on the principle that every operating system's IP stack has its own idiosyncrasies. By analyzing sniffer traces and identifying these differences, you may be able to determine the operating system of the remote host. Craig Smith has written a proof of concept tool called passfing.tar.gz.

tags | paper, remote, proof of concept
MD5 | 2aa7b3dc1c6b55b5165fe2debf6d98a4
Posted May 16, 2000
Authored by Suid | Site suid.kg

SUID Advisory #11 - Matt Kruse Calandar Script. Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.

tags | remote, web, arbitrary
MD5 | 79083a3db1338a98dc5d8d72515be04b
Posted May 16, 2000
Authored by Karim Yaghmour | Site opersys.com

Linux Trace Toolkit is a tool used to reconstruct the dynamic behavior of a linux system. LTT fills the gap left by tools such as gprof, strace, ps and many others when attempting to know what is going on with your linux system at every moment by providing it's user with all the information required to reconstruct a system's behavior during a certain period of time. One can know exactly the dynamics of a system. Why do certain synchronization problems occur? What exactly happens to an application when a packet is received for it? Overall, where do all the applications that I use pass their time? Where are the I/O latencies in a given application? etc. Requires kernel patch.

Changes: Display changes to facilitate the display of traces, and the keyboard can now be used to scroll through a trace.
tags | kernel
systems | linux
MD5 | ffd0b6d1a5c5526c296bf37f9ff91dc0
Posted May 16, 2000
Authored by napalm

Napalm Magazine issue #5 - In this issue: Editor's Comments, URLs, Readers' Questions, Readers' Comments, Contemporary Telenet, Ethernet - The Bottom Two Layers, Music Reviews, Future Issues, Credits.

tags | magazine
MD5 | facea9f8691217572e78cc955f911cb3
Posted May 16, 2000


MD5 | b61f0af94f258db4dc2bfa38dc6925a5
Posted May 16, 2000
Site l0pht.com

AntiSniff v1.02 - Antisniff is Windows software which will detect if any sniffers are running on the network.

Changes: This release fixes a security hole - all users should upgrade.
tags | tool, sniffer
systems | windows
MD5 | bf435131f8998dd3c8248b2379546eaf
Posted May 16, 2000
Authored by Thomas Lundquist | Site zelow.no

floppyfw is a router and simple firewall on one single floppy. It uses Linux basic firewall capabilities and have a very simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It has a simple installation, mostly only needed to edit one file on the floppy.

Changes: Updated compatibility with 2.2.15 and added support for two new ethernet adapters.
tags | tool, firewall
systems | linux
MD5 | c76db5fa47d1c02ec3b4e36a9e824739
Page 1 of 1

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By