exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-12-12

Posted Dec 12, 2000
Site geocities.com

Distributed Port Scanner - The idea is that by having multiple systems from different classes of networks scan a host, detection of a portscan is more difficult by the target system. The user runs a central server which tells each client which port to scan next. Clients send the results to the server and are issued a new port to check.

tags | tool, scanner
systems | unix
SHA-256 | 36ddf2e4abf0e939d67f8fd5fdef91dd72f03d4d090dc9d239ed077690289da2
Posted Dec 12, 2000
Site speakeasy.org

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

Changes: This release supports user-defined output templates to change output formatting, and adds many interface improvements and bugfixes.
tags | tool, firewall, protocol
systems | linux
SHA-256 | 341608e80214c1d2d96ed9c1bc7701b9a9e3f9d63e7e327f0f6b47c5fa58ce2a
Posted Dec 12, 2000
Site m-j-s.net

Kwatch is a graphical KDE 2.0 user interface for watching log files.

tags | system logging
systems | unix
SHA-256 | ad5a5605541802caf57b63effdce220945ca86513872ae276bbb623bf603e0a4
Posted Dec 12, 2000
Authored by Michael A. Gumienny | Site sites.netscape.net

FCheck is a very stable perl script written to generate and comparatively monitor a UNIX system against its baseline for any file alterations and report them through syslog, console, or any log monitoring interface. Monitoring events can be done very frequently if a system's drive space is small enough, making it more difficult to circumvent. This is a freely-available open-source alternative to 'tripwire' that is time tested, and is easier to configure and use.

Changes: Fixed bugs in the "Exclude" routine.
tags | tool, perl, intrusion detection
systems | unix
SHA-256 | 3cc342bce5b50b9352eb5694dfa6a2051bb69bc67e76e94749595b623ed298da
Posted Dec 12, 2000
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch analyzes the ipchains, netfilter, or iptables packet filter logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Solaris portability fixes and a new option to limit the output.
tags | tool, firewall
systems | unix
SHA-256 | ff3d506294f8aa834cc638a4abe217428c3fd3bba6dd1eca456d9bc0c8415d00
Posted Dec 12, 2000
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: This is the first stable version, which incorporates many bug fixes from development.
tags | tool, tcp, firewall, protocol
systems | unix
SHA-256 | 82c05e2c8ca2d8fb361a1b7b3bb7094b57cceb060e1141c1d8d4aa3747aa6d49
Posted Dec 12, 2000
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: This version was ported to 2.4.0-test11. sys_mmap and sys_mprotect are now intercepted.
tags | kernel
systems | linux
SHA-256 | 993396c972f30ed1f501f5fcb3d6e8a5cee1329a82570ff9966855f96e613233
Posted Dec 12, 2000
Site pc-tools.net

RenAttach is an e-mail filter/processor which runs from a user's .forward file. It is designed to protect end users (particularly those using Windows) from malicious e-mail attachments. It does not scan specifically for viruses, but rather renames e-mail attachments so that they can not be accidentally executed. It handles both UUencoded and MIME-encoded attachments.

systems | windows, unix
SHA-256 | fe12d7efddcc66491ad34401500a9234c1a9d66219bf08054fc457020e033f36
Posted Dec 12, 2000
Authored by Dianne Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.10 / 8.11 and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Built in re_match functions are case-insensitive, fixes for problems with MS Outlook clients, integration with the H+BEDV virus-scanner, more flexible filter and action specifications, and a new requirement of Sendmail 8.11.
systems | windows, unix
SHA-256 | 5ed6d6f0a7c758eb46de1d8aaba60c3f61f648fb8330ea3a671fff22ff609220
Posted Dec 12, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Inside the stages worm, and much more.

tags | worm
SHA-256 | d33df037b5bd5e34fcc5c86655e07d22a901aaa9912c341aa4091f55b64e24f8
Posted Dec 12, 2000
Authored by JW Oh | Site hacksware.com

Pine v4.30 and below allows outgoing mail to be hijacked if the alternate editor is enabled. Exploit script included.

tags | exploit
SHA-256 | a697070970654ece18a16dfe44b4f7ffcf5b38cb5159bafae4e725f245de46ca
Posted Dec 12, 2000
Authored by Sil | Site antioffline.com

Defile v.1 is a shell script which automates the secure removal of trivial files such as cookies, cache, etc., as well as old and unnecessary files such as core dumps, dead.letters, etc, it uses a package which ensures a pseudo random wiping compliant to U.S. Department of Defense standard and adds an hourly cron to ensure those files are wiped.

tags | shell
systems | unix
SHA-256 | 8a1028f7870112336bfee6af6212ee0ab01d5eefc01696e64daa91885136d8ca
Posted Dec 12, 2000
Authored by The Itch

Apcupsd v3.7.2 local denial of service attack. Can kill any running daemon.

tags | exploit, denial of service, local
SHA-256 | 98d94708575e0137e9354e702878bc24ca1f6d27866f241f5fccddfd8e165f5b
Posted Dec 12, 2000
Authored by Dotslash

Hassan Consulting's Shopping Cart Version 1.x (cgi-bin/shop.pl) contains remote vulnerabilities, including directory transversal with file read ability, listing files, and path disclosure. Exploit URL's included.

tags | exploit, remote, cgi, vulnerability
SHA-256 | 85283352f70d94548d2b56de0d97bcf80906908ef932baf0b3a815cdc3e97361
Posted Dec 12, 2000
Authored by Mixter | Site members.tripod.com

aes-netcat is a patch with some includes for netcat 1.10 that adds an option to do password encrypted sessions using strong AES encryption. Doesn't include an AES algorithm but urls where to get them (15 candidates available).

tags | tool
systems | unix
SHA-256 | ed8bc2a6a4d5f9d88a1001545b97ad17846aaa75720ddca22d215d0a5062f8ef
Posted Dec 12, 2000
Authored by Cyrax | Site pkcrew.org

LBK is a local kernel based (kld) backdoor for FreeBSD 4.0 which provides a root shell if the TERM environment variable is set with the password.

tags | tool, shell, kernel, local, root, rootkit
systems | unix, freebsd
SHA-256 | 67eb8019ac71a6bb246354172fbecdca63ee8b7be894a6de42535cdbc08cc349
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By