exploit the possibilities
Showing 1 - 16 of 16 RSS Feed

Files Date: 2000-12-12

Posted Dec 12, 2000
Site geocities.com

Distributed Port Scanner - The idea is that by having multiple systems from different classes of networks scan a host, detection of a portscan is more difficult by the target system. The user runs a central server which tells each client which port to scan next. Clients send the results to the server and are issued a new port to check.

tags | tool, scanner
systems | unix
MD5 | 75ecc374eba684aa3ceecf33e449cf11
Posted Dec 12, 2000
Site speakeasy.org

Firewall Log Daemon provides two programs, chaindaemon and tabledaemon, that you can choose between, depending on your firewall type (ipchains or iptables-netfilter). The program will start a small daemon process that parses and resolves firewall logs in real-time by reading a FIFO that syslog writes to. It will queue a batch of alerts and mail them to you. It features hostname, port, protocol, and ICMP type/code lookup, with formatted output for easy reading.

Changes: This release supports user-defined output templates to change output formatting, and adds many interface improvements and bugfixes.
tags | tool, firewall, protocol
systems | linux
MD5 | 7b44e8c2f97ac8d99dd84fed4df37971
Posted Dec 12, 2000
Site m-j-s.net

Kwatch is a graphical KDE 2.0 user interface for watching log files.

tags | system logging
systems | unix
MD5 | 64794646f4267860bfdfd96a924d29e2
Posted Dec 12, 2000
Authored by Michael A. Gumienny | Site sites.netscape.net

FCheck is a very stable perl script written to generate and comparatively monitor a UNIX system against its baseline for any file alterations and report them through syslog, console, or any log monitoring interface. Monitoring events can be done very frequently if a system's drive space is small enough, making it more difficult to circumvent. This is a freely-available open-source alternative to 'tripwire' that is time tested, and is easier to configure and use.

Changes: Fixed bugs in the "Exclude" routine.
tags | tool, perl, intrusion detection
systems | unix
MD5 | 9920799b580d5d729c561a7d69abdcc8
Posted Dec 12, 2000
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch analyzes the ipchains, netfilter, or iptables packet filter logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Solaris portability fixes and a new option to limit the output.
tags | tool, firewall
systems | unix
MD5 | ee70e657ffe571ff957b6ff2350a7a1f
Posted Dec 12, 2000
Authored by Balazs Scheidler | Site balabit.hu

Zorp is a new-generation modular proxy firewall suite to fine tune proxy decisions with its built in script language, fully analyze complex protocols (like SSH with several forwarded TCP connections), and utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol).

Changes: This is the first stable version, which incorporates many bug fixes from development.
tags | tool, tcp, firewall, protocol
systems | unix
MD5 | be5123cc6051c924ee98e4b5833ca4a6
Posted Dec 12, 2000
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: This version was ported to 2.4.0-test11. sys_mmap and sys_mprotect are now intercepted.
tags | kernel
systems | linux
MD5 | 3708122519a8dae5376bdaef92ba95cd
Posted Dec 12, 2000
Site pc-tools.net

RenAttach is an e-mail filter/processor which runs from a user's .forward file. It is designed to protect end users (particularly those using Windows) from malicious e-mail attachments. It does not scan specifically for viruses, but rather renames e-mail attachments so that they can not be accidentally executed. It handles both UUencoded and MIME-encoded attachments.

systems | windows, unix
MD5 | 0658b734ebe1faab8f379182ab05d691
Posted Dec 12, 2000
Authored by Dianne Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.10 / 8.11 and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Built in re_match functions are case-insensitive, fixes for problems with MS Outlook clients, integration with the H+BEDV virus-scanner, more flexible filter and action specifications, and a new requirement of Sendmail 8.11.
systems | windows, unix
MD5 | 6bd3e313a416aa65ac9265163a56253e
Posted Dec 12, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Inside the stages worm, and much more.

tags | worm
MD5 | 688b485faa7563757b066b3e86db878f
Posted Dec 12, 2000
Authored by JW Oh | Site hacksware.com

Pine v4.30 and below allows outgoing mail to be hijacked if the alternate editor is enabled. Exploit script included.

tags | exploit
MD5 | 443b7280f8a78155d5be2e6a46cd645d
Posted Dec 12, 2000
Authored by Sil | Site antioffline.com

Defile v.1 is a shell script which automates the secure removal of trivial files such as cookies, cache, etc., as well as old and unnecessary files such as core dumps, dead.letters, etc, it uses a package which ensures a pseudo random wiping compliant to U.S. Department of Defense standard and adds an hourly cron to ensure those files are wiped.

tags | shell
systems | unix
MD5 | ae527817dc18cabf981d956b1d8e9203
Posted Dec 12, 2000
Authored by The Itch

Apcupsd v3.7.2 local denial of service attack. Can kill any running daemon.

tags | exploit, denial of service, local
MD5 | 14c2f0d16762bece4ac4a435d2c13450
Posted Dec 12, 2000
Authored by Dotslash

Hassan Consulting's Shopping Cart Version 1.x (cgi-bin/shop.pl) contains remote vulnerabilities, including directory transversal with file read ability, listing files, and path disclosure. Exploit URL's included.

tags | exploit, remote, cgi, vulnerability
MD5 | 0799881fb1926a2ff142205bd3794cc8
Posted Dec 12, 2000
Authored by Mixter | Site members.tripod.com

aes-netcat is a patch with some includes for netcat 1.10 that adds an option to do password encrypted sessions using strong AES encryption. Doesn't include an AES algorithm but urls where to get them (15 candidates available).

tags | tool
systems | unix
MD5 | f1a97f61152d5b7bb39a2f7e3501eb29
Posted Dec 12, 2000
Authored by Cyrax | Site pkcrew.org

LBK is a local kernel based (kld) backdoor for FreeBSD 4.0 which provides a root shell if the TERM environment variable is set with the password.

tags | tool, shell, kernel, local, root, rootkit
systems | unix, freebsd
MD5 | 9c0ce7942d25d16b8b7571dc588039f0
Page 1 of 1

File Archive:

July 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    13 Files
  • 2
    Jul 2nd
    12 Files
  • 3
    Jul 3rd
    1 Files
  • 4
    Jul 4th
    2 Files
  • 5
    Jul 5th
    34 Files
  • 6
    Jul 6th
    21 Files
  • 7
    Jul 7th
    21 Files
  • 8
    Jul 8th
    13 Files
  • 9
    Jul 9th
    6 Files
  • 10
    Jul 10th
    1 Files
  • 11
    Jul 11th
    3 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    19 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    15 Files
  • 16
    Jul 16th
    9 Files
  • 17
    Jul 17th
    2 Files
  • 18
    Jul 18th
    2 Files
  • 19
    Jul 19th
    19 Files
  • 20
    Jul 20th
    21 Files
  • 21
    Jul 21st
    53 Files
  • 22
    Jul 22nd
    14 Files
  • 23
    Jul 23rd
    14 Files
  • 24
    Jul 24th
    1 Files
  • 25
    Jul 25th
    1 Files
  • 26
    Jul 26th
    21 Files
  • 27
    Jul 27th
    8 Files
  • 28
    Jul 28th
    9 Files
  • 29
    Jul 29th
    12 Files
  • 30
    Jul 30th
    9 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By