what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-07-22

kmap-0.7.2.tar.gz
Posted Jul 22, 2000
Authored by KMap Development Team | Site edotorg.org

Kmap is a QT/KDE front-end to nmap, a popular and powerful console portscanner. Kmap allows quick and easy access to all of nmap's features, with much less hassle. Kmap also sorts the output from nmap into usable sections, so you easily extract the information you want.

Changes: Fixed bug in selecting a root level scan, added the window and ack scan options, and added the scan random IP's option.
tags | tool, nmap
systems | unix
SHA-256 | 13aa864a43d43e08b41aedb9d5b0a663fd6e9a9223d80430113fb11a959fe2ff
lrk-4.1.tar.gz
Posted Jul 22, 2000
Authored by Rolling

Linux Rootkit v4.1 is based on Lord Somers LRK4 but several things are fixed. Includes a better find patch, fixed install of pidof / killall, fixed rshd patch, compilation fixes, and more. Released 11-may-2000, tested on Linux kernel 2.2.6, Slackware 4.0.

tags | tool, kernel, rootkit
systems | linux, unix, slackware
SHA-256 | adecedb7ccb2d5c273f0825c00ea50190704d28a5ee05cde397452f6133b9549
tod.tar.gz
Posted Jul 22, 2000

Touch of Death is a TCP connection killer for linux which is designed to work with sniffit. When running sniffit in interactive mode, you can immediately kill any connection you can see.

tags | tool, sniffer, tcp
systems | linux
SHA-256 | 7ada2bc1a67bc67fc83014c84f0791097e39af05eccb4f2dc68b913ffb0a8b0b
cisco.00-07-11.tcpreset
Posted Jul 22, 2000
Site cisco.com

Cisco Secure PIX Firewall TCP Reset Vulnerability - The Cisco Secure PIX Firewall cannot distinguish between a forged TCP Reset (RST) packet and a genuine TCP RST packet because the sequence number is not checked. Any TCP/IP connection established through the Cisco Secure PIX Firewall can be terminated by a third party from the untrusted network if the connection can be uniquely determined. If only source ip / destination ip / destination port are known, a RST packet can be sent with each source port.

tags | tcp
systems | cisco
SHA-256 | b1f7eb96541775acb267d750a7136e421f2b6437fb5e1dadef4de9c99dc843d6
firestarter-0.3.1.tar.gz
Posted Jul 22, 2000
Authored by Tomas Junnonen | Site firestarter.sourceforge.net

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: Bug fixes and improvements, ability to do DNS lookups in firewall hits. Screenshot available here.
tags | tool, firewall
systems | linux
SHA-256 | 95f2a4e5466e3649db9dc3ecc82e2f37939c903d798d8efb780211d011bcca8f
twwwscan04.zip
Posted Jul 22, 2000
Authored by TSS | Site search.iland.co.kr

TWWWscan is a Windows based www vulnerability scanner which looks for 209 www/cgi vulnerabilities . Displays http header, server info, and tries for accurate results. Now features anti-IDS url encoding and passive mode scan. Tested on win95 osr2 win98,win98se,win nt4,win 2k.

Changes: Fixed bugs, added more information.
tags | web, cgi, vulnerability
systems | windows, unix
SHA-256 | e22757f754f09cec07ef92b15d7288a1bb562a9210beb649e6f3b972e9082ec0
freeswan-1.5.tar.gz
Posted Jul 22, 2000
Site freeswan.org

Linux FreeS/WAN provides IPSEC (IP Security, which is both encryption and authentication) kernel extensions and an IKE (Internet Key Exchange, keying and encrypted routing daemon) allowing you to build secure tunnels through untrusted networks. Compatible with with other IPSEC and IKE systems already deployed by other vendors such as OpenBSD.

Changes: Pluto's logging has been revised, Netlink device has been removed, bug fixes and documentation updates.
tags | tool, kernel, firewall
systems | linux, unix, openbsd
SHA-256 | 1c356c0db0bf695b0cfb1071cb663a74990de3ec263f22a6519bbff5cfffd444
gspy-0.1.2-src.tar.gz
Posted Jul 22, 2000
Authored by Lawrence P. Glaister | Site gspy.sourceforge.net

Gspy retrieves images from a video4linux device and processes these into a daily mpeg movie on the disk drive. Each image is recorded with a time stamp to insure accurate real world correlation. Special motion detection algorithms are used to reduce the size of the daily movies by eliminating pictures with similar content as well as the normal compression obtained via the mpeg process. The result is a time lapse video per day with nonlinear time compression using only the images of interest. Screenshot available here.

systems | linux
SHA-256 | 3a5d7fe8d9f47f7208c3de20c64ba67dcf4d1fd30c289ec26d47a46947ef6e5b
sara-3.1.5.tar.gz
Posted Jul 22, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Updated IAW with SANS guidance, Updated smb.sara to test for null logins, Updated rules to 'catch' all smb services, Added O'Reilly test to http.sara, Added source.asp test to http.sara (BID 1457), Fixed NFS/Mountd anamolies, and Tweaked login.sara for really slow targets.
tags | tool, cgi, scanner
systems | unix
SHA-256 | a19656b99be490cdd1cdac8f161f6660f073f3560b9ae87285ebd94e3c44856f
bind-8.2.2-P5-chaos1.diff
Posted Jul 22, 2000
Authored by Sean Trifero | Site innu.org

Bind-8.2.2P5 patch which logs all bind version requests to syslog.

tags | patch
systems | unix
SHA-256 | 8f2aee92d405daba443d0178423cc93d73c437944166a54146dfe95825fd2a6e
ms00-046
Posted Jul 22, 2000

Microsoft Security Bulletin (MS00-046) - Patch Available for "Cache Bypass" vulnerability. Microsoft has released a patch for a security vulnerability in all versions of Outlook and Outlook Express. This vulnerability would allow an HTML mail to bypass the cache mechanism and create a file in a known location on the recipient's disk. If an HTML mail created an HTML file outside the cache, it would run in the Local Computer Zone when opened, allowing it to open a file on the user's computer and send it a malicious user's web site. The vulnerability also can be used as a way of placing an executable file on the user's machine or a way of reading any file. Microsoft FAQ on this issue available here.

tags | web, local
SHA-256 | f1f37e4ddffca9b7352f96d857b4ae7065485b5ad61a97039870a80d1747a8e1
ms00-045
Posted Jul 22, 2000

Microsoft Security Bulletin (MS00-045) - Patch Available for "Persistent Mail-Browser Link" vulnerability. Microsoft has released a patch for a security vulnerability affecting Microsoft Outlook Express. The vulnerability allows a malicious user to send an email that will "read over the shoulder" of the recipient as he previews subsequent emails in Outlook Express by opening a browser window that links back to the Outlook Express windows which can read the HTML mail that is displayed in Outlook Express. Microsoft FAQ on this issue available here.

systems | windows
SHA-256 | 3b31ce131e7d9706a3f89d381201adeea41926edc44b27d96fae174da7b8298f
ms00-043
Posted Jul 22, 2000

Microsoft Security Bulletin (MS00-043) - Patch Available for "Malformed E-mail Header" Vulnerability. Outlook and Outlook Express allow a malicious user to cause code of his choice to execute on another user's computer. A component shared by Outlook and Outlook Express contains an unchecked buffer in the functionality that parses e-mail headers when downloading mail via either POP3 or IMAP4. Microsoft FAQ on this issue available here.

SHA-256 | 95d4a85d402cadf9ee7b36bc9aa351f788acc75f338ca40111407c9bf8a8dfe1
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close