what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2000-05-16

ciscoDOS.c
Posted May 16, 2000
Authored by Tiz.Telesup

This is a denial of service attack against the Cisco 760 series router.

tags | denial of service
systems | cisco
SHA-256 | 7b539289067be68183f9e2ba49a7d42d2c60f672934f3a61c1dff757b84b6769
passfing.tar.gz
Posted May 16, 2000
Authored by Craig Smith

A perl script that passively fingerprints OSes based on signatures.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 442d7be25254eff7136ab3b7b09ea398f149d705e590c03f1095017b55f1771c
fingerprinting.txt
Posted May 16, 2000
Authored by Lance Spitzner | Site enteract.com

IDing remote hosts, without them knowing. This paper details the process of Passive Fingerprinting. Passive fingerprinting is based on sniffer traces from the remote system. Instead of actively querying the remote system, all you need to do is capture packets sent from the remote system. Based on the sniffer traces of these packets, you can determine the operating system of the remote host. Just like in active fingerprinting, passive fingerprinting is based on the principle that every operating system's IP stack has its own idiosyncrasies. By analyzing sniffer traces and identifying these differences, you may be able to determine the operating system of the remote host. Craig Smith has written a proof of concept tool called passfing.tar.gz.

tags | paper, remote, proof of concept
SHA-256 | a1f307232d25c3c33667a984bcfb4fee678e8e8d1ba6ef3f1c97fe30acfec9b9
011.txt
Posted May 16, 2000
Authored by Suid | Site suid.kg

SUID Advisory #11 - Matt Kruse Calandar Script. Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.

tags | remote, web, arbitrary
SHA-256 | 2102559bca4495f792b2ed6f732d45e082c0bb8bbe38bb9c97587966db74cc1c
TracePackage-0.9.2.tgz
Posted May 16, 2000
Authored by Karim Yaghmour | Site opersys.com

Linux Trace Toolkit is a tool used to reconstruct the dynamic behavior of a linux system. LTT fills the gap left by tools such as gprof, strace, ps and many others when attempting to know what is going on with your linux system at every moment by providing it's user with all the information required to reconstruct a system's behavior during a certain period of time. One can know exactly the dynamics of a system. Why do certain synchronization problems occur? What exactly happens to an application when a packet is received for it? Overall, where do all the applications that I use pass their time? Where are the I/O latencies in a given application? etc. Requires kernel patch.

Changes: Display changes to facilitate the display of traces, and the keyboard can now be used to scroll through a trace.
tags | kernel
systems | linux
SHA-256 | 756430cc2e180ac5b079c7c7b3cc0277f537c895a9c68b813c279d0d0e4ebc17
napalm-5.txt
Posted May 16, 2000
Authored by napalm

Napalm Magazine issue #5 - In this issue: Editor's Comments, URLs, Readers' Questions, Readers' Comments, Contemporary Telenet, Ethernet - The Bottom Two Layers, Music Reviews, Future Issues, Credits.

tags | magazine
SHA-256 | 815df5a342983be2cb2e80c9706b8e15348d7b2757a8896cd148ac7d36d12d90
asniff_advisory.txt
Posted May 16, 2000

asniff_advisory.txt

SHA-256 | 9c092b58aa07ac434aee0ef897f8615870dd2e5f792cc2145cd0351d1a1c40f5
as-102.zip
Posted May 16, 2000
Site l0pht.com

AntiSniff v1.02 - Antisniff is Windows software which will detect if any sniffers are running on the network.

Changes: This release fixes a security hole - all users should upgrade.
tags | tool, sniffer
systems | windows
SHA-256 | 7dec69ac86b9013738f9c2cce3154af19e8fd824dcec51d27945e1fda0d2d057
floppyfw-1.0.4.img
Posted May 16, 2000
Authored by Thomas Lundquist | Site zelow.no

floppyfw is a router and simple firewall on one single floppy. It uses Linux basic firewall capabilities and have a very simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It has a simple installation, mostly only needed to edit one file on the floppy.

Changes: Updated compatibility with 2.2.15 and added support for two new ethernet adapters.
tags | tool, firewall
systems | linux
SHA-256 | 1505e8749f436ee6d90b20ebebd04f21b2b0d8fdaf4f78c5d6a24e7075ead440
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close