exploit the possibilities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2001-04-30

Posted Apr 30, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Options added for icmp_broadcast and tcp_timestamps, syncookies are now disabled by default, bugfix for oversight in run-time options, and updated documentation.
tags | tool, tcp, firewall
systems | linux, bsd
MD5 | 28561dd27d8d6bde33cccee7c9637bfe
Posted Apr 30, 2001
Authored by Mike Ricketts | Site earth.li

SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, or raw IP packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.

Changes: RIP bugfix, disabled IP_HDRINCL on IPv6.
tags | tool, arbitrary, udp, tcp
systems | unix
MD5 | 4b7fbfba1693a716460370d3c99ac5b9
Posted Apr 30, 2001
Authored by Tomas Junnonen | Site firestarter.sourceforge.net

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: Port forwarding interface, a manual, protection against all known trojans, and blocking of Trinity V3 and DDoS attacks added. Also a number of small enhancements all around.
tags | tool, firewall
systems | linux
MD5 | a9bb5d2954ece1181d29d5f17914c671
Posted Apr 30, 2001
Site sourceforge.net

fwmon is a firewall monitor for Linux which integrates with ipchains to give you realtime notification of firewall events. It has fairly customizable output, allowing you to display a packet summary, hex, and ascii data dumps to stdout, a logfile, or tcpdump-style capture files. It also boasts some simple security features such as the ability to chroot itself, and does not need to run as root.

Changes: A syslog logging facility has been added. When using chroot, fwmon now opens logfiles AFTER chrooting. Some of the documentation has been updated. RPM and Makefile install locations have been consolidated. A README.chroot file has been added as a quick guide to getting fwmon running in a chroot jail and with lowered privileges.
tags | tool, root, firewall
systems | linux
MD5 | 8a6be5254a6a15b7bf0418c257a6954d
Posted Apr 30, 2001
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
MD5 | 407502df60364a4af83c75f360bd962e
Posted Apr 30, 2001
Authored by Matthew Gauthier | Site srm.sourceforge.net

secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Changes: This release includes minor build changes to allow for clean builds on Solaris and Tru64, and new Redhat 7.1 based rpms. Current users shouldn't upgrade, unless you want the new binary packages.
systems | unix
MD5 | f47739d10ef6dcdeb5cca06cb44ac6be
Posted Apr 30, 2001
Authored by Andris K

Andrisk Security Advisory 2# - Cerberus FTP Server 1.05 for Windows 9x/NT allows remote users without accounts to view any file on the server.

tags | exploit, remote
systems | windows, 9x
MD5 | 9ef96dcb8278ccd0ef665ec60ee9307d
Posted Apr 30, 2001
Site laurentconstantin.com

Lcrzoex, created with the network library lcrzo, allows to test an Ethernet/IP network. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris.

Changes: Creation of several modules grouping examples by themes. Creation of functions implementing http GET, HEAD, POST, PUT and DELETE. Moreover, basic authentication is supported. Also improved clients using UDP syslog.
tags | udp, spoof, tcp, protocol, library
systems | linux, solaris, freebsd
MD5 | 328c278562a583dafc98fda93c7417ff
Posted Apr 30, 2001
Authored by SnakeByte | Site kryptocrew.de

TFAK v5.0 is a client for 22 remote access trojans, and detects 736 remote access trojans and 9 file joiners. This is the first trojan scanner which is able to find new, unknown trojans. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Parts of the code have been switched to ASM, making scanning 3 times faster. Now scans running files with Win NT / 2000. Now lists all windows so you can find windows hidden by vxd's. Now supports German and French.
tags | remote, trojan
MD5 | 558d93aa1d6f84877d1708553aaeb27e
Posted Apr 30, 2001
Authored by vade79, realhalo | Site realhalo.org

Netscript is a portable and lightweight tcp socket scripting tool. It is intended to allow anyone to script situations based on a word-to-word ruleset response system. Includes wildcard support, character replacement, random replacement, argument inclusion, server timeout, initial send, display altering, multiple character dump formats, telnet protocol support, logging, program to socket dumping, executable ruleset support and reverse binding among other things.

tags | tcp, protocol
systems | unix
MD5 | b6fea18b4b109ef19341658e49503148
Posted Apr 30, 2001
Authored by ThePike | Site whizkunde.org

The Unix versions of the PerlCal CGI script have vulnerabilities which allow website visitors to view any file on the webserver. Exploit URL included.

tags | exploit, cgi, vulnerability
systems | unix
MD5 | cafeef1792da9c0feaa60892b0c79d59
Posted Apr 30, 2001
Authored by Diskiller | Site nfisher.campus.vt.edu

Share finder is a tool for System Administrators to examine what is being shared on their networks. Scans for open shares and lists contents.

MD5 | 5ef809ec617a1a2de0ec3fd1078b27f1
Posted Apr 30, 2001
Authored by Sean Whalen

Introduction to Arp Spoofing, a method of exploiting the interaction between IP and Ethernet protocols. Includes discussion of switched sniffing, man in the middle attacks, hijacking, cloning, poisoning and more. Describes the operation of ARPoison, Ettercap, and Parasite.

tags | paper, spoof, protocol
MD5 | d6e4ccb58a50fb399854112178df5955
Posted Apr 30, 2001
Authored by G0ne | Site scrypt.net

Nessus Grep is a perl script which parses the session data files that nessus creates if you have session saving on. Using it you can search the data files for keywords and output the data in text, html, xml.

tags | tool, scanner, perl
systems | unix
MD5 | 1c349d896e7b87725ffdb8dd3425fe16
Posted Apr 30, 2001
Authored by vade79, realhalo | Site realhalo.org

Irix Netprint local root exploit. Exploits netprint's -n option. Tested on IRIX 6.2, but should work on other versions.

tags | exploit, local, root
systems | irix
MD5 | 684f4fd7980f8cd288d4c7246a74c4e0
Posted Apr 30, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:053-06 - A format string bug was fixed in gftp, which is present in versions below 2.08.

systems | linux, redhat
MD5 | 70dd0a3861e4d09e38a921468b469072
Posted Apr 30, 2001
Authored by BigHawk

Squirt is a perl tool for finding and exploiting local buffer overflow vulnerabilities which is very configurable and platform independent. It is possible to exploit almost any local overflow on any system by providing the correct values as arguments (or brute forcing them), telling the program how the overflow must be triggered, and by eventually loading (system specific) desired shellcode.

Changes: Two new techniques - The Framepointer Overwrite and exploiting non-terminated adjacent memory spaces. Also includes some code cleanups.
tags | overflow, local, perl, vulnerability, shellcode
systems | unix
MD5 | 5eb8e2e4ec4c39f4b812259340bce975
Page 1 of 1

File Archive:

May 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    1 Files
  • 2
    May 2nd
    4 Files
  • 3
    May 3rd
    26 Files
  • 4
    May 4th
    17 Files
  • 5
    May 5th
    3 Files
  • 6
    May 6th
    32 Files
  • 7
    May 7th
    11 Files
  • 8
    May 8th
    2 Files
  • 9
    May 9th
    2 Files
  • 10
    May 10th
    13 Files
  • 11
    May 11th
    17 Files
  • 12
    May 12th
    22 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By