exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2001-03-06

Tim_Yardley.txt
Posted Mar 6, 2001
Authored by Tim Yardley

Packet Storm Contest Entry - Distributed Attacks and the Way To Deal With Them. (Text Format)

tags | paper
SHA-256 | 10f94ff136a258319f2596a4abbb50bd63aafa790390f4c9ca45547be86c774d
Simple_Nomad.txt
Posted Mar 6, 2001
Authored by Simple Nomad

Packet Storm Contest Entry - Strategies for Defeating Distributed Attacks. (Text Format)

tags | paper
SHA-256 | 7427476b12ea10eea15d1f28e11df64258077c0934a93532d27af5558cb06ff1
Richard_Kay.txt
Posted Mar 6, 2001
Authored by Richard Kay

Packet Storm Contest Entry - What pure or applied technical measures can be taken to protect the Internet against future forms of attack? (Text Format)

tags | paper
SHA-256 | cad93a87d641bb7572f4f98b4b119acd52892e3424d315d828101dbd55ca07cc
RFP.txt
Posted Mar 6, 2001
Authored by rain forest puppy, NightAxis

Packet Storm Contest Entry - Purgatory 101: Learning to cope with the SYNs of the Internet. (Text Format)

tags | paper
SHA-256 | 43284d288da9f2331d1bd5c0d9a900b6ffaf2f5af2659be61d5f41dde2c20fc5
Mixter.txt
Posted Mar 6, 2001
Authored by Mixter, 000 Prize Winner!

Winning Packet Storm Contest Entry - Protecting Against the Unknown - A guide to improving network security to protect the Internet against future forms of security hazards. (Text Format)

tags | paper
SHA-256 | 15f4e5704be7d69962a1a4a2d64b19373699e3374703fdf9c33bd2868743dfde
Jon_Squire.txt
Posted Mar 6, 2001
Authored by Jon Squire

Packet Storm Contest Entry - GNIDS - Early Detection of Unknown Threats. (Text Format)

tags | paper
SHA-256 | c9ff2af6c6f75f172a7c93d0b12d052d47a42146f239fb064a9e2256292fab1e
hhp-gdc_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-gdc_smash.c is a local root exploit for gdc. Requires group wheel access. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
SHA-256 | 59ac3f8c25947407d2c2124b1b923963380381d66406ef270bdd57b3c00baae5
hhp-ospf_smash.c
Posted Mar 6, 2001
Authored by Loophole, hhp | Site hhp-programming.net

Hhp-ospf_smash.c is a local root exploit for ospf_monitor. Tested on BSDI 4.1 x86 default install.

tags | exploit, x86, local, root
SHA-256 | b3df13e1c7b793947794b12771072086104e86b8f0f39f8f17d3b3f017cad2b0
rts.c
Posted Mar 6, 2001
Authored by hts

rts.c is reverse telnet shell code. Useful for systems behind firewalls which restrict incoming connections.

tags | shell, shellcode
SHA-256 | d33f2d3f19564249ea83b8f9b06cd293a3b5caf25938b63eade9e2e358c52b3b
knetfilter-2.1.0.tar.gz
Posted Mar 6, 2001

Knetfilter is a KDE gui application designed to manage the netfilter functionalities that will come with the new kernel 2.4.x. In Principal, all standard firewall system administration activities can be done just using knetfilter. But there is not just a GUI to iptables command line, it is possible also some monitoring via a tcpdump interface.

Changes: Knetfilter now allows the use of packet tracking for regular chains rules, mark-based rules for regular chains have been implemented (packets should be marked before routing), the save function now allows you to save packet track and mark based rules, and the knetfilter.spec has been updated.
tags | tool, kernel, firewall
systems | linux
SHA-256 | d45c1868837c0a8b54b93fb48fecb1fa87a0dabfab30b8aa809c6bf97f836a07
lcrzosrc-3.05.tgz
Posted Mar 6, 2001
Site laurentconstantin.com

Lcrzoex, created with the network library lcrzo, allows to test an Ethernet/IP network. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris.

Changes: This release includes fixes to some of the examples, an option to shorten the DNS resolving timeout, and a new example for putting files on an FTP server.
tags | udp, spoof, tcp, protocol, library
systems | linux, solaris, freebsd
SHA-256 | 1344783a80db2a524169578784cd62e067d0a2c38f7763f281c8a49b76c894d4
viperdb-0.9.6.tar.gz
Posted Mar 6, 2001
Authored by Peter Surda | Site panorama.sth.ac.at

ViperDB is a file checker. It is meant to be run from cron on a regular basis in order to monitor strange activity on a system. It supports checking of size, mtime, privileges, UID/GID, added/deleted files, and (as of 0.9.3) MD5 checksums. Data isn't stored in a single archive as in tripwire, but is split among all the monitored directories. This ViperDB is in fact a fork of the original, as the original authors seem unreachable.

Changes: Fixes for bugs introduced by the 0.9.5 rewrite, new/strengthened internal security checks, and minor updates.
tags | tool, intrusion detection
systems | unix
SHA-256 | 9beeb32344be8185db433775f799de2b79b2dddd9a21ba40738b083810070ddc
fping-2.3b1.tar.gz
Posted Mar 6, 2001
Site fping.com

Fping is a ping(1) like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up. fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable. Unlike ping, fping is meant to be used in scripts and its output is easy to parse.

tags | tool, scanner, protocol
systems | unix
SHA-256 | 9f98ea6510ddb44d45f8b135dd0a5285a05c946b2041e3c6fb85e8ff087a931a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close