exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2001-03-10

ipa-1.1.tar.gz
Posted Mar 10, 2001
Site simon.org.ua

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: NetBSD support, FreeBSD IPv6 firewall support, a new option in IPA (-c directory, which specifies the directory IPA should chroot() into immediately), and some bugfixes.
systems | unix, bsd
SHA-256 | 641e93d516beedb82ea6902b76db51746176efd1b8b6af86814ac320d254e928
Nmap Scanning Utility 2.54 BETA 20
Posted Mar 10, 2001
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.

Changes: A Darwin (Mac OS X) 1.2 portability patch, showing the actual IPID, TCP ISN, and TCP timestamp values in XML format output rather than just the cooked results, suppressing the IPID and TCP ISN predictability report unless you use -v (which needs -O), and better detection and reporting from some heinous errors.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 8bf8e3b872213e4163fd59634e0c8dfc3bcbce81475eb64f98d60c4c412e17a2
scanssh-1.5.tar.gz
Posted Mar 10, 2001
Authored by Provos | Site monkey.org

scanssh scans a list of addresses and networks for running SSH servers and their version numbers. scanssh supports random selection of IP addresses from large network ranges and is useful for gathering statistics on the deployment of SSH servers in a company or the Internet as whole.

Changes: This release adds faster syn probe scanning, more retries, larger backoff, better round robin between subprocesses, and changed semantics of -E so that scanssh only fails on a missing exclude file if -E is specified.
tags | tool, scanner
systems | unix
SHA-256 | dea74cadaa62163da15179dd4adde921a04558ba70c745ded0f711eb3855cb2c
jcon.zip
Posted Mar 10, 2001
Site cyberdemon.ellicit.org

JCon is a security-scanner and brute-force password breaking tool. It can scan ports, FTP and mailer daemons, and check for CGI-vulnerabilities. It is easy to use, platform independent, easily extensible, and can perform all of its actions on lists of hosts/IP addresses.

tags | cgi, cracker, vulnerability
SHA-256 | 7244acfc42f36e6377508386df6cc968becd83fefb2b37f1dc90dccc9abe4a61
cgiproxy.1.4.1-SSL.tar.gz
Posted Mar 10, 2001
Site jmarshall.com

CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. No user info is transmitted, so it can be used as an anonymous proxy. HTTP and FTP are supported. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, encoded target URLs, configuration by end user, and more.

Changes: This release runs 15% faster, fixes bug with meta "refresh" tags causing duplicate entry forms, and fixes another entry form bug.
tags | web, cgi, perl
SHA-256 | 16a82decd7d2a13d783b9183bf22a87111d9b3a05d046f3f94a62265d0ac3f09
cgiproxy.1.4.1.tar.gz
Posted Mar 10, 2001
Site jmarshall.com

CGIProxy is a Perl CGI script that acts as an Internet proxy. Through it, you can retrieve resources that may be inaccessible from your own machine. No user info is transmitted, so it can be used as an anonymous proxy. HTTP and FTP are supported. Options include text-only browsing (to save bandwidth), selective cookie and script removal, simple ad filtering, encoded target URLs, configuration by end user, and more.

Changes: This release runs 15% faster, fixes a bug with meta "refresh" tags causing duplicate entry forms, and fixes another entry form bug.
tags | web, cgi, perl
SHA-256 | b2efb05a707055a5d76b3c8719b1bc00d5b0e290888710de309f359046732b1e
lids-0.9.13-2.2.18.tar.gz
Posted Mar 10, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: The lidsadm compiling error was fixed. The code was cleaned. Information when accessing a hidden file was added. A lids_script.sh was added. The default lids.conf was fixed. Changelog available here.
tags | kernel, root
systems | linux
SHA-256 | 8459d7e1cf4d16f4d2535b7dda2ad49323ca89bb88f90460854bfc02ec8f92ce
Samhain File Integrity Checker
Posted Mar 10, 2001
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Problems with logging to syslog and with templates for the HTML server status page have been fixed.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 668359b668a71b61438b1ab2f12daabe3a31ac1b11e9dd4fdf840819bce81d6a
viperdb-0.9.7.tar.gz
Posted Mar 10, 2001
Authored by Peter Surda | Site panorama.sth.ac.at

ViperDB is a file checker. It is meant to be run from cron on a regular basis in order to monitor strange activity on a system. It supports checking of size, mtime, privileges, UID/GID, added/deleted files, and (as of 0.9.3) MD5 checksums. Data isn't stored in a single archive as in tripwire, but is split among all the monitored directories. This ViperDB is in fact a fork of the original, as the original authors seem unreachable.

Changes: This release adds bugfixes in symlink handling, improved detecting of corrupted databases, and a directory-specific option to ignore mtime changes. Upgrading and re-initing of databases is recommended.
tags | tool, intrusion detection
systems | unix
SHA-256 | 3cb38576519cd7ae00a09aa9a3652653cfedf7ce8409a1a400538db02dec7f83
fwlogwatch-0.2.1.tar.gz
Posted Mar 10, 2001
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

Fwlogwatch analyzes the ipchains, netfilter, iptables packet filter, and cisco logfiles and generates text and HTML summaries. Features realtime anomaly alerting capability, an interactive report generator, and the ability to cut off attacks by adding firewall rules.

Changes: This release includes support for compressed files and long interface names, a total packet length display option, and various small fixes and cleanups.
tags | tool, firewall
systems | cisco, unix
SHA-256 | e94ae7b2a89c6c5bfc488323fd1ba584c1d611ac791bd59ea4cfbca64eaf78a5
ettercap-0.2.4.tar.gz
Posted Mar 10, 2001
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 9c006f636dee28f206c1de0a15c1ca9a6555ee2b7b2d7b6856afe8387cf0a925
debian.man2html.txt
Posted Mar 10, 2001
Site debian.org

Debian Security Advisory DSA-035-1 - Man2html contains a remote denial of service attack which can use up all available memory. Upgrade to the newest version.

tags | remote, denial of service
systems | linux, debian
SHA-256 | e1d95320a78e84c88163ab91bc64bc8646142fd453c2345eb8145bc1994fee3d
debian.eperl.txt
Posted Mar 10, 2001
Site debian.org

Debian Security Advisory DSA-034-1 - When eperl is installed setuid root, it can switch to the UID/GID of the scripts owner. Although Debian doesn't ship the program setuid root, this is a useful feature which people may have activated locally. When the program is used as /usr/lib/cgi-bin/nph-eperl the bugs could lead into a remote vulnerability as well.

tags | remote, cgi, root
systems | linux, debian
SHA-256 | 02eaa849d2cade62ea6b294233b6e1c1e2966df90f5ce3308c20a07b5f1becbc
debian.analog.txt
Posted Mar 10, 2001
Site debian.org

Debian Security Advisory - A buffer overflow in all versions of Analog except 4.16 has been discovered in the ALIAS command. This bug is particularly dangerous if the form interface (which allows unknown users to run the program via a CGI script) has been installed.

tags | overflow, cgi
systems | linux, debian
SHA-256 | 371f662494b07e9ace10facbbd3f19648ed19a75fee11836cbce0414e3320918
cscan.pl
Posted Mar 10, 2001
Authored by Iceburg

Cscan is a CGI scanner in perl which reads vulnerabilities from a database.

tags | cgi, perl, vulnerability
systems | unix
SHA-256 | 59f5f292b67b3b624d8950ff5d050400b2122724ae627393d5c9ede33ff2cdf9
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close