exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-08-01

tct-1.0.tar.gz
Posted Aug 1, 2000
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, and Solaris. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | fce955a06d118664ebcbb0d9360ef897a8c0150f57b63742153a2faa4d4d662b
netsec24.txt
Posted Aug 1, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 24 - 01.08.2000 - Covers weekly roundups of security related events. In this issue: Vulnerability in Netscape Browsers, IBM Websphere vulnerability, AnalogX Proxy dos, Netbios Name Server Protocol Spoofing, BEA's Weblogic show code vulnerability. Also includes articles on Macro Viruses, Digital Certificates and Encryption, Building a secure gateway system, Why people need Outlook, Defacements by Webserver - IIS had the biggest number of defacements, British version of carnivore is now law, How the FBI investigates Computer Crime, and ICMP Traceback Messages will be used to determine source of dos attacks.

tags | spoof, protocol
SHA-256 | 9543fa0d3720af592ef5771826c07e1a91c0b7c08635a6a7e7c90eb4e087ea4a
trinux-070.tgz
Posted Aug 1, 2000
Authored by Matthew Franz | Site trinux.sourceforge.net

Trinux transparently converts ordinary x86 PCs into a powerful network security workstations by combining Linux Slackware 7.1 with all of the most powerful precompiled Open Source security/monitoring tools. Trinux boots from a single floppy disk and runs entirely in RAM. Trinux is useful for Port scanning, packet sniffing, vulnerability scanning, sniffer detection, packet construction, active/passive OS fingerprinting, network monitoring, session hijacking, intrusion detection, and more. Trinux 0.70 is the most stable and compact Trinux release to date and is based on Busybox/glibc2.1.3 and kernel 2.2.16. Among the included packages are nmap2.54beta1, adm-smb, nbtstat, tcp_scan, cgichk, ddos-scan, dsniff, despoof, hunt, zodiac, netcat, openssh, hping2, sing, isic, p0f, fragrouter, tcpreplay, sentinel, ethereal 0.8.10, ngrep, nstreams, tcpdump, ntop, netwatch, and more.

tags | x86, kernel
systems | linux, slackware
SHA-256 | abf720b088d97a716c3a460f3cbc9309017e66fd5df498c0b0884026f067f04e
related.html
Posted Aug 1, 2000

Trinux related links.

systems | linux
SHA-256 | 8392bbb0e9f485ac4aa7e8beb7e7db6fd312eb0809f79962a79c8123f6ae7a72
faq.html
Posted Aug 1, 2000

A short FAQ on Trinux

systems | linux
SHA-256 | 6c8847332c7a955c9df193dd74580339aeb9b5612d3570f54763a477230583a1
rawrite3.doc
Posted Aug 1, 2000

Simple Rawrite Documentation.

systems | linux
SHA-256 | d54cb4809e173899c5f50cb91b1ca62cef0ae8a29cef3f5081fbd893852db40d
rawrite13.exe
Posted Aug 1, 2000

Rawrite v1.3 is the de-facto standard for writing kernel images to floppy disks.

tags | kernel
systems | linux
SHA-256 | 3b455434e13b3d1418fc53cc8651fe805e365068a5ac69df5032635d4f666309
trinux.gif
Posted Aug 1, 2000

The Trinux Logo

systems | linux
SHA-256 | d1609f93cb03dd689fd073dd58e4af537050cfa5d4ea8b794e910fc8c64d2ffa
Nmap Scanning Utility 2.54 BETA 2
Posted Aug 1, 2000
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: Added a shortcut which doubled the speed of single port SYN scans of a network, added -sL (List scan) which lets you see what hosts WOULD be scanned without actually doing it, added new fingerprints, and minor bug fixes.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | c16553be988fac76e668eac772d9fe460b708e13cb56697dbd5cbbe38933c553
sara-3.1.6.tar.gz
Posted Aug 1, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.

Changes: Improved smb.sara, added network.vbs test, fixed a problem in ftp.sara to eliminate false negatives, and updated to the latest perl.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 9935c0b05ab9ca9794e6b0b381ca1843471819a20a52597e8dfb56bb33350ce6
firestarter-0.4.0.tar.gz
Posted Aug 1, 2000
Authored by Tomas Junnonen | Site firestarter.sourceforge.net

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: Fixed DNS lookup crash, fixed the dynamic rules defaulting to TCP, fixed translations, and added autodection of masqueraded net. Screenshot available here.
tags | tool, firewall
systems | linux
SHA-256 | 691cae0188592bed1b25562c6f8b9b4f93ee20dd8f6a7f63c8e72e2a97691278
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close