exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-10-03

Posted Oct 3, 2000
Authored by Sam Carter | Site linux.rice.edu

Claymore v0.3 is an intrusion detection and integrity monitoring system. To accomplish its task, it runs from cron and reads in a list of files stored in flat ASCII, and uses md5sum to check their integrity against that recorded earlier in a database. If the database is placed on a read-only medium such as a write-protected floppy, then it should provide an infallible record against remotely installed trojan horses.

Changes: This release adds ownership / permission tracking and switches to the Digest::MD5 instead of md5sum.
tags | tool, trojan, intrusion detection
systems | unix
SHA-256 | 06701ba8c09c935d0edafbc748a756d38164c63e1a93ae9b4b8fbc2a558da32b
Posted Oct 3, 2000
Authored by teso, Sebastian Krahmer | Site team-teso.net

Openssh-Reverse is a patched OpenSSH which goes in reverse, allowing outside users to connect to machines behind NAT firewalls. In reverse mode, sshd acts as a client and brings the connection to a modified ssh server.

SHA-256 | c83bf07ed61053f6c369bd3bd2c8252548532e232e27ee4365928a0691d9ff64
Posted Oct 3, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: New stable release - Fixes memory leaks. Requires libol-0.2.17.
tags | system logging
systems | unix
SHA-256 | 3206d8d58deacf795b7364226adf6d2753d91319fadfccbc88ec09ed6cc1818e
Posted Oct 3, 2000
Authored by Caddis | Site team-teso.net

/usr/bin/chpass local EDITOR variable format string exploit for *BSD. Tested on OpenBSD, FreeBSD, and NetBSD.

tags | exploit, local
systems | netbsd, freebsd, bsd, openbsd
SHA-256 | 97b3137f4851f097d02215919feb794baf8bc78203a4d676704fcda9229e4198
Posted Oct 3, 2000
Authored by Neon-Lenz

Pcanyscan.exe is a windows tool which uses nc.exe to scan for PC Anywhere hosts.

systems | windows
SHA-256 | 7119259f3b686900d20800e719be09c2a2eba006c0396f343ea9a98126f063d1
Posted Oct 3, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: SCP file transfer hole, Exploitable Netscape Navigator buffer overflow, Local linux traceroute vulnerabilities, Remote horde and imp vulnerabilities, Nmap dos against OpenBSD ipsec, remote format string bug in lprng, Media Player 7 "OCX Attachment" vulnerability, IE5.5/Outlook allows local reading of files, How Slashdot was hacked, Rijndael chosen as new US encryption standard, What are Digital Signatures, Hardening the BIND DNS Server, Carnivore review team exposed, Linux virus scanner placement, Firewall protection against macro viruses, FreeBSD 4.1.1 release, six headed spam monster, Online security breahes increase, and more.

tags | remote, overflow, local, vulnerability, virus
systems | linux, freebsd, openbsd
SHA-256 | e96c5be4d2ea6985e42e8eef575b1be4ed91ebca96d3da59e8b502514a4cdfef
Posted Oct 3, 2000
Authored by synnergy, Scrippie | Site synnergy.net

Inebriation.c is a local linux/x86 /bin/su + locale libc functions exploit which has been written in response to previous unreliable exploits for this vulnerability. It includes a perl wrapper to find the correct offset, can use GOT overwrites to evade stackguard, stackshield, and libsafe, uses clean overflow string creation, and has documentation and several other usability improvements.

tags | exploit, overflow, x86, local, perl
systems | linux
SHA-256 | 79c94c5fa03623a02f4886cf1b9049e8f2ca654b18f436c51d3c88a2c462c274
Posted Oct 3, 2000
Authored by synnergy, Dethy | Site synnergy.net

The Importance of Bug Testing - Includes discussion of alpha / beta releases, the importance of bug testing, software development goals, software testing strategies, functional prototypes, designing test sets, defect testing, acceptance testing, and structural prototypes.

SHA-256 | 8bc6adbc535cfdd7f4e996480e70c7cd1a8990ed92f93b47763a32b051f2ba6e
Posted Oct 3, 2000
Authored by Laurent Riesterer | Site laurent.riesterer.free.fr

GASP stands for 'Generator and Analyzer System for Protocols'. It allows you to decode and encode any protocols you specify. The main use is to test network applications : you can construct packets by hand and test the behavior of your program when faced with strange packets.

Changes: The network part was fully rewritten to add support for multiple interfaces and asynchronous capture.
tags | tool, protocol
systems | unix
SHA-256 | 13e1b5049da58ff8ed1115506076ee3f2984ba8633933c95304020bbfce0bb8e
Posted Oct 3, 2000
Authored by Provos | Site monkey.org

scanssh scans a list of addresses and networks for running SSH servers and their version numbers. scanssh supports random selection of IP addresses from large network ranges and is useful for gathering statistics on the deployment of SSH servers in a company or the Internet as whole.

Changes: Random address generation now always tries to generate as many addresses as requested even if exludes have been encountered, and bug fixes.
tags | tool, scanner
systems | unix
SHA-256 | edbb7c4484e2d2b3417c86764297d7831da440414803bc4a7d535178b7f4b628
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By