what you don't know can hurt you
Showing 1 - 9 of 9 RSS Feed

Files Date: 2000-05-16

ciscoDOS.c
Posted May 16, 2000
Authored by Tiz.Telesup

This is a denial of service attack against the Cisco 760 series router.

tags | denial of service
systems | cisco
MD5 | 0da671f3b179a2e7354d420db7afdabe
passfing.tar.gz
Posted May 16, 2000
Authored by Craig Smith

A perl script that passively fingerprints OSes based on signatures.

tags | tool, perl, intrusion detection
systems | unix
MD5 | 6021a9992e1d522783d586f3b60780f5
fingerprinting.txt
Posted May 16, 2000
Authored by Lance Spitzner | Site enteract.com

IDing remote hosts, without them knowing. This paper details the process of Passive Fingerprinting. Passive fingerprinting is based on sniffer traces from the remote system. Instead of actively querying the remote system, all you need to do is capture packets sent from the remote system. Based on the sniffer traces of these packets, you can determine the operating system of the remote host. Just like in active fingerprinting, passive fingerprinting is based on the principle that every operating system's IP stack has its own idiosyncrasies. By analyzing sniffer traces and identifying these differences, you may be able to determine the operating system of the remote host. Craig Smith has written a proof of concept tool called passfing.tar.gz.

tags | paper, remote, proof of concept
MD5 | 2aa7b3dc1c6b55b5165fe2debf6d98a4
011.txt
Posted May 16, 2000
Authored by Suid | Site suid.kg

SUID Advisory #11 - Matt Kruse Calandar Script. Remote users can execute arbitrary commands on the web server with the priviledge level of the httpd process.

tags | remote, web, arbitrary
MD5 | 79083a3db1338a98dc5d8d72515be04b
TracePackage-0.9.2.tgz
Posted May 16, 2000
Authored by Karim Yaghmour | Site opersys.com

Linux Trace Toolkit is a tool used to reconstruct the dynamic behavior of a linux system. LTT fills the gap left by tools such as gprof, strace, ps and many others when attempting to know what is going on with your linux system at every moment by providing it's user with all the information required to reconstruct a system's behavior during a certain period of time. One can know exactly the dynamics of a system. Why do certain synchronization problems occur? What exactly happens to an application when a packet is received for it? Overall, where do all the applications that I use pass their time? Where are the I/O latencies in a given application? etc. Requires kernel patch.

Changes: Display changes to facilitate the display of traces, and the keyboard can now be used to scroll through a trace.
tags | kernel
systems | linux
MD5 | ffd0b6d1a5c5526c296bf37f9ff91dc0
napalm-5.txt
Posted May 16, 2000
Authored by napalm

Napalm Magazine issue #5 - In this issue: Editor's Comments, URLs, Readers' Questions, Readers' Comments, Contemporary Telenet, Ethernet - The Bottom Two Layers, Music Reviews, Future Issues, Credits.

tags | magazine
MD5 | facea9f8691217572e78cc955f911cb3
asniff_advisory.txt
Posted May 16, 2000

asniff_advisory.txt

MD5 | b61f0af94f258db4dc2bfa38dc6925a5
as-102.zip
Posted May 16, 2000
Site l0pht.com

AntiSniff v1.02 - Antisniff is Windows software which will detect if any sniffers are running on the network.

Changes: This release fixes a security hole - all users should upgrade.
tags | tool, sniffer
systems | windows
MD5 | bf435131f8998dd3c8248b2379546eaf
floppyfw-1.0.4.img
Posted May 16, 2000
Authored by Thomas Lundquist | Site zelow.no

floppyfw is a router and simple firewall on one single floppy. It uses Linux basic firewall capabilities and have a very simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It has a simple installation, mostly only needed to edit one file on the floppy.

Changes: Updated compatibility with 2.2.15 and added support for two new ethernet adapters.
tags | tool, firewall
systems | linux
MD5 | c76db5fa47d1c02ec3b4e36a9e824739
Page 1 of 1
Back1Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    12 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close