Wap-nmap enables an nmap scan from a WAP enabled device and pumps the results back to the device.
d8873fde1460eb96c27139a769aad620cf12f9a064d26483016048fd2a4a8149
Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Guide to linux kernel compilation including iptables firewalling, and more.
e8c1b3d79a4c6a5a1ecf9f95bf1c318520410369a973bfd7797400b511a0348a
How to get free cellphone calls in Germany by using a free 800 number.
04f191ab63fa02fc6107a019de5729e2213250b5955684eb3be783e9a9239087
The WinU password cracker v0.7b decrypts WinU's stored passwords from the registry. Versions 2.0-5.2 are supported.
9746ad0ed4c5c32758e762506040a3f4ef76890e378a06d851019b50b440ff10
BSDI 3.0 /usr/contrib/mh/bin/inc local root exploit.
ed628d1321ba3d0225a71dc5d95a94974deec4e382e6feef884016cddda04dd0
Debian Security Advisory - ghostscript uses temporary files to do some of its work. Unfortunately the method used to create those files wasn't secure: mktemp was used to create a name for a temporary file, but the file was not opened safely. A second problem is that during build the LD_RUN_PATH environment variable was set to the empty string, which causes the dynamic linker to look in the current directory for shared libraries.
79e8f4b60426ccf8b03cea104e312f9beb7dcdab7ca25bfa2fa7e73c2e28d999
Microsoft Security Bulletin (MS00-090) - Microsoft has released a patch that eliminates two unrelated serious security vulnerabilities in Microsoft Windows Media Player. These vulnerabilities allow a malicious user to cause a program of his choice to run on another user's computer. Microsoft FAQ on this issue available here.
934f764d4f38872dc3f2e2e12f54c2625b72402a464b87892130c38de5fbcf2c
Anger v1.33 implements a PPTP challenge/response sniffer. These c/r can be input into L0phtcrack to obtain the password, and b) An active attack on PPTP logons via the MS-CHAP vulnerability to obtain the users password hashes. Notice that this also generates the password hashes of the new password the user wanted to use, which can be put into L0phtcrack to get passwords, into a modified smbclient to logon onto a SMB sever, or into a modified PPP client for use with the Linux PPTP client.
4c21a34d713b5921f0589ac3020b351e9fdcf9c71e20fa4f38ebe79c453e1dbb
syslog-ng is a multi-platform syslogd replacement, with lots of new functionality. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.
ec216cf108e34c7e925a05fec37ab299a14666a58b69e928bf42a81ee0ddd7ee
pakemon has been developed to share IDS components based on the open source model. Current version of pakemon monitors all traffic on a network, search given data patterns in the traffic and output session logs and summary logs of matched traffic. Tested on RedHat Linux 6.2j, OpenBSD2.7, FreeBSD 3.3, and NetBSD 1.4.
5992ae6ed8188ba3d71db6f55768563314f3c1fb07c7025082f68fc60549f9ef
Listsyscalls is a tool for listing contents of the syscall table on a running Solaris kernel. Has various uses, including being able to check if a syscall function has been patched or redirected.
837373505ebc89aa58cfe1ad3c257c9a6e836f110bacd8b996c00f45ccabfe33
Solpromisc is a kernel module which you can load to detect attempts to put devices into promiscuous mode from user space via DLPI (e.g. solsniff, tcpdump, anything pcap based). It dumps the cred struct for the process, and the driver responsible, to the dmesg output buffer for collection by syslog. You are advised to read the source.
06ceaf80c902b59cb0e84800cc98a0d5632f16a49b3bf362b701a539753cd066
SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, or raw IP packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.
7865cb20c74fdf1c1f62f25faec083b51f41a24373a9a6b38d9010f52b181453
Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.
e79d2a17c016c8e9e314b0e89edab00c78596ba7965386795a81833d47bee29e
Converts RPMs to tar files. Very useful archive tool!
7bb90cdd971eb6eda2369ed4605dbcb8ffa75b18caab6a69fbfeae874991983a
Microsoft IIS Unicode remote exploit which uses tftp to obtain code to run.
e0f403b11dab3aab5b3ee904e8e8bce6c11936552abdcf36a5b3990cd728aa32
Cryptdata.pl encrypts/decrypts files with Crypt::Blowfish perl module. It is useful to encrypt home directories.
b68cedfd65d4cc3b13b3fa396e71959cc57c62ff32879503ad41579cce297a58
Sinto.c is an interactive tty hijacker for Linux.
2545a9c0855c78b989ac5e2761936838dd95a63705a98662686aeed743282260
MMCrack is a Netbus 1.6 client installer. Attempts to avoid AV software. Archive password is set to p4ssw0rd. Use at your own risk.
84439652dd6bb045379985f5f8b47567778da67db948fb3b13896b6c530b24af