what you don't know can hurt you
Showing 1 - 18 of 18 RSS Feed

Files Date: 2001-01-15

host-detection.doc
Posted Jan 15, 2001
Authored by synnergy, Dethy | Site synnergy.net

Advanced Host Detection - Techniques To Validate Host-Connectivity. Security Engineers spend a tireless amount of effort to block and filter packet anomalies in an internetwork connected environment. Advanced host mapping bypasses many forms of intrusion detection systems, filters, and routers, essentially enabling an attacker to map and discover previously unknown firewalled hosts. Also available in TXT form.

tags | paper, protocol
MD5 | 938010bc0d9b99eb9b35830b0f7a13e7
host-detection.pdf
Posted Jan 15, 2001
Authored by synnergy, Dethy | Site synnergy.net

Advanced Host Detection - Techniques To Validate Host-Connectivity. (PDF) Security Engineers spend a tireless amount of effort to block and filter packet anomalies in an internetwork connected environment. Advanced host mapping bypasses many forms of intrusion detection systems, filters, and routers, essentially enabling an attacker to map and discover previously unknown firewalled hosts. Also available in DOC form.

tags | paper, protocol
MD5 | 2866b8e06c2e023af6d2353b6ac6c628
host-detection.txt
Posted Jan 15, 2001
Authored by synnergy, Dethy | Site synnergy.net

Advanced Host Detection - Techniques To Validate Host-Connectivity. Security Engineers spend a tireless amount of effort to block and filter packet anomalies in an internetwork connected environment. Advanced host mapping bypasses many forms of intrusion detection systems, filters, and routers, essentially enabling an attacker to map and discover previously unknown firewalled hosts. Also available in DOC form.

tags | paper, protocol
MD5 | 29e1aa57dd7594aeb700b3e563f4579a
netsec46.txt
Posted Jan 15, 2001
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the News the past week. In this issue: New Guidelines for Prosecuting Computer Crimes.

MD5 | c013ab20b25952a33d5fcb6102e29d4a
swiftsurf.tar.gz
Posted Jan 15, 2001
Site pauillac.inria.fr

SwiftSurf v1.01 is an HTTP proxy that lets you do a lot of things. You can spy, filter, and modify the HTTP requests that your browser sends, as well as the answers it receives. Some of its possible uses include filtering ads, limiting access to a specific domain, or suppressing cookies.

tags | web
MD5 | 4840088e4e843dfa9867c966260e43af
antiroute-1.1.tar.gz
Posted Jan 15, 2001
Site lovric.net

Antiroute prevents and logs UDP-based route tracking. Programs like traceroute utilize the IP protocol 'time to live' field to elicit an ICMP TIME_EXCEEDED response from each gateway along the path to a host, or an ICMP PORT_UNREACH from the host itself. This is of corse impossible if the target ports are open. Antiroute listens on ports used in UDP-based route tracking and determines the IP address, source port and distance (in hops) of the host from which the trace is being performed. Tested on Linux 2.2.13, SunOS 5.6, Digital UNIX 4.0, and FreeBSD 4.1.1-STABLE.

Changes: Syslog support has been added.
tags | udp, protocol
systems | linux, unix, solaris, freebsd
MD5 | 2343ae5f8d1b2b6f43175745d7e0f6cf
gShield-2.0.1.tgz
Posted Jan 15, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Additional chains for output readability, cleanups to the logging output, no longer logging SMB broadcasts, and an option for easily adding user-defined open ports.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | 4ffd0ce19d3997319b984ede1092d6ed
ctk-adm-dns-chroot-0.2.tar.bz2
Posted Jan 15, 2001
Site sourceforge.net

Ctk-adm-dns-chroot creates the minimum file structure needed to run bind as a chrooted unprivileged user.

Changes: More transparent chroot installation without compromising security.
tags | patch
systems | unix
MD5 | 2b36125f9267efe8187df25aeff81bc1
lids-0.9.12-2.2.18.tar.gz
Posted Jan 15, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: The file that acls inherit has had several bugs removed. Multiplatform support has been added to the makefile. Changelog available here.
tags | kernel, root
systems | linux
MD5 | 8cac5d7ec5749fcba0486331cb8c6d75
fwlogwatch-0.1.1.tar.gz
Posted Jan 15, 2001
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch analyzes the ipchains, netfilter, or iptables packet filter logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: Small fixes and improvements.
tags | tool, firewall
systems | unix
MD5 | ccceff539166177a1e5e5c03a3106192
floppyfw-1.0.9.img
Posted Jan 15, 2001
Authored by Thomas Lundquist | Site zelow.no

floppyfw is a router and simple packet filtering firewall on one single floppy. It uses Linux ipchains firewall capabilities and includes a simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It is simple to install, you only need to edit one file on the floppy.

Changes: The "File system is full" bug has been fixed. The PPPoE packages will work with this version.
tags | tool, firewall
systems | linux
MD5 | 95c9370eb59b2206a63cf669e90404a1
unrm-0.92.tar.gz
Posted Jan 15, 2001
Authored by Octavian Popescu | Site hideout.art.ro

unrm is a small linux utility which can, under some circumstances, recover almost 99% of your erased data (similar to DOS's undelete).

Changes: Fixed a bug that allowed only 6 digit inode numbers to be dumped, and added a few variables containing the common used program locations (mount,debugfs).
tags | tool
systems | linux, unix
MD5 | 29db01f82ddd4bd210dc58f9feb2777b
logtool-1.0.3.tar.gz
Posted Jan 15, 2001
Site users.digitex.net

Logtool is a syslog file parser, report generator, and monitoring utility. It takes syslog (and syslog compatible) logfiles as input from stdin, and depending on command line switches and/or config file settings, will parse and filter out unwanted messages from the logfile accordingly, and generate output in ANSI color, formatted ASCII, CSV (for spreadsheets), or HTML format. It is very handy for use in automated nightly reports, and online monitoring of logfile activity. It comes with some simple example scripts and documentation.

Changes: Bug fixes.
tags | system logging
systems | unix
MD5 | 88fb933946f00b8315e6e3967660eee0
flatline-0.75.tar.gz
Posted Jan 15, 2001
Site c1sco.net

Flatline is a Web Server vulnerability scanner, beta version for linux, BSD. Options include mass host scanning, scanning through proxies, Detection evasion, quick banner grab scans, interactive mode to send specific url's. Also includes sample exploit database if a vulnerable file is found it will print a BugTraq ID or way to exploit the file. This is a semi beta release lots of new things to come.

tags | web, cgi
systems | linux, unix, bsd
MD5 | 26277c6cc02b7186ba268a0b2ae46b3d
cgisec.txt
Posted Jan 15, 2001
Authored by Tonec

PERL/CGI Hacking - What makes CGI scripts insecure and how to exploit them.

tags | cgi, perl
systems | unix
MD5 | 5649ad7dce8adccef9699054adbc31c0
libpcap-0.6.1.tar.gz
Posted Jan 15, 2001
Site tcpdump.org

Libpcap is a portable packet capture library which is used in many packet sniffers, including Tcpdump.

tags | library
MD5 | 9e79abace0c9776e2f90514638ef37e6
tcpdump-3.6.1.tar.gz
Posted Jan 15, 2001
Site tcpdump.org

Tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities. Requires Libpcap.

Changes: Remotely exploitable buffer overflows in the AFS packet parsing which are present if the snaplen is over 500 are fixed! Incorporates libpcap-0.6.1.
tags | tool, sniffer
MD5 | 0ad9ecdf83e260894467935e2e6efcd2
tcpdump-xploit.c
Posted Jan 15, 2001
Authored by Zhodiac | Site hispahack.ccc.de

Tcpdump v3.5.2 remote root exploit - Tested against X86 Linux. Exploits an overflow in the AFS packet parsing which requires the snaplen (-s) to be set to 500 or greater. Fixed in v3.62.

tags | exploit, remote, overflow, x86, root
systems | linux
MD5 | 289510d424aa0a665ee3161b20c9abab
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close