what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2001-04-30

Posted Apr 30, 2001
Authored by R. Gregory | Site muse.linuxmafia.org

Shield is an aggressive, modular firewall script for iptables which features easy configuration through a BSD-style configuration file, optional NAT support, TCP-wrapper-like functionality for service access, port forwarding, routable protection, DMZ support, and more.

Changes: Options added for icmp_broadcast and tcp_timestamps, syncookies are now disabled by default, bugfix for oversight in run-time options, and updated documentation.
tags | tool, tcp, firewall
systems | linux, bsd
SHA-256 | 0a38e59e90db7c5ef66dd88ffecd7724876d5577f69462f9c8027f2b0b9613fe
Posted Apr 30, 2001
Authored by Mike Ricketts | Site earth.li

SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a TCP, UDP, ICMP, or raw IP packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.

Changes: RIP bugfix, disabled IP_HDRINCL on IPv6.
tags | tool, arbitrary, udp, tcp
systems | unix
SHA-256 | a31e687bdc2c47268e1ba78508d915590be8e80395e2b44ca50b84e0bef76761
Posted Apr 30, 2001
Authored by Tomas Junnonen | Site firestarter.sourceforge.net

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: Port forwarding interface, a manual, protection against all known trojans, and blocking of Trinity V3 and DDoS attacks added. Also a number of small enhancements all around.
tags | tool, firewall
systems | linux
SHA-256 | 66f173a22da12775f93bb508b046e3df1ce4328b9068505081b91346640d853e
Posted Apr 30, 2001
Site sourceforge.net

fwmon is a firewall monitor for Linux which integrates with ipchains to give you realtime notification of firewall events. It has fairly customizable output, allowing you to display a packet summary, hex, and ascii data dumps to stdout, a logfile, or tcpdump-style capture files. It also boasts some simple security features such as the ability to chroot itself, and does not need to run as root.

Changes: A syslog logging facility has been added. When using chroot, fwmon now opens logfiles AFTER chrooting. Some of the documentation has been updated. RPM and Makefile install locations have been consolidated. A README.chroot file has been added as a quick guide to getting fwmon running in a chroot jail and with lowered privileges.
tags | tool, root, firewall
systems | linux
SHA-256 | dacbd947fd9074a6545b7fb933050922c675ba073bd63180fc8766d689820e05
Posted Apr 30, 2001
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 95bc29720e7f68658483aa62bd0201537dc9bb3f0d3c1a6b539146f3dc9a8701
Posted Apr 30, 2001
Authored by Matthew Gauthier | Site srm.sourceforge.net

secure rm (srm) is a command-line compatible rm(1) which completely destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Changes: This release includes minor build changes to allow for clean builds on Solaris and Tru64, and new Redhat 7.1 based rpms. Current users shouldn't upgrade, unless you want the new binary packages.
systems | unix
SHA-256 | 057f274e2be9094c711b6e199c071cbe6c85bd2fb03973cc42ef4609400de563
Posted Apr 30, 2001
Authored by Andris K

Andrisk Security Advisory 2# - Cerberus FTP Server 1.05 for Windows 9x/NT allows remote users without accounts to view any file on the server.

tags | exploit, remote
systems | windows
SHA-256 | ac36f5c4f40ea379968ee64d982cb79cad04d53d8808bf71cd2833ea937ccc41
Posted Apr 30, 2001
Site laurentconstantin.com

Lcrzoex, created with the network library lcrzo, allows to test an Ethernet/IP network. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris.

Changes: Creation of several modules grouping examples by themes. Creation of functions implementing http GET, HEAD, POST, PUT and DELETE. Moreover, basic authentication is supported. Also improved clients using UDP syslog.
tags | udp, spoof, tcp, protocol, library
systems | linux, solaris, freebsd
SHA-256 | c59a272d38519fc08e67feb67c22bd19ff9ce1aced88dc6150d8d63feb9972f1
Posted Apr 30, 2001
Authored by SnakeByte | Site kryptocrew.de

TFAK v5.0 is a client for 22 remote access trojans, and detects 736 remote access trojans and 9 file joiners. This is the first trojan scanner which is able to find new, unknown trojans. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Parts of the code have been switched to ASM, making scanning 3 times faster. Now scans running files with Win NT / 2000. Now lists all windows so you can find windows hidden by vxd's. Now supports German and French.
tags | remote, trojan
SHA-256 | a3957a61f026b4abe0583f83ab1d9144d456900d0bfb9515d3d8c2b3f6726a88
Posted Apr 30, 2001
Authored by vade79, realhalo | Site realhalo.org

Netscript is a portable and lightweight tcp socket scripting tool. It is intended to allow anyone to script situations based on a word-to-word ruleset response system. Includes wildcard support, character replacement, random replacement, argument inclusion, server timeout, initial send, display altering, multiple character dump formats, telnet protocol support, logging, program to socket dumping, executable ruleset support and reverse binding among other things.

tags | tcp, protocol
systems | unix
SHA-256 | d5e734f70b09c752e932f628fe42d6efe76be98903a5705d1c71178428926e57
Posted Apr 30, 2001
Authored by ThePike | Site whizkunde.org

The Unix versions of the PerlCal CGI script have vulnerabilities which allow website visitors to view any file on the webserver. Exploit URL included.

tags | exploit, cgi, vulnerability
systems | unix
SHA-256 | 6008fabe1a329e1cad455aa8c84eeb5e7a5393d69a639699c592aa9613882baf
Posted Apr 30, 2001
Authored by Diskiller | Site nfisher.campus.vt.edu

Share finder is a tool for System Administrators to examine what is being shared on their networks. Scans for open shares and lists contents.

SHA-256 | 02737bb519ae249b044f88e3360c95042fc752d077cc77170bcf9aabc284de4c
Posted Apr 30, 2001
Authored by Sean Whalen

Introduction to Arp Spoofing, a method of exploiting the interaction between IP and Ethernet protocols. Includes discussion of switched sniffing, man in the middle attacks, hijacking, cloning, poisoning and more. Describes the operation of ARPoison, Ettercap, and Parasite.

tags | paper, spoof, protocol
SHA-256 | 9f31244837a10876290ac89653e0333bb44ed531f895263dacf205244e32560f
Posted Apr 30, 2001
Authored by G0ne | Site scrypt.net

Nessus Grep is a perl script which parses the session data files that nessus creates if you have session saving on. Using it you can search the data files for keywords and output the data in text, html, xml.

tags | tool, scanner, perl
systems | unix
SHA-256 | 3cbfdbc5f49b410858e4a4df9cfed8ea7f7a44975db62e43de0da2fd68f17ae4
Posted Apr 30, 2001
Authored by vade79, realhalo | Site realhalo.org

Irix Netprint local root exploit. Exploits netprint's -n option. Tested on IRIX 6.2, but should work on other versions.

tags | exploit, local, root
systems | irix
SHA-256 | e1b15bb0206ea96a407bd99676b571620fc56bbe407ca2fe157fa97b328c6b5b
Posted Apr 30, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:053-06 - A format string bug was fixed in gftp, which is present in versions below 2.08.

systems | linux, redhat
SHA-256 | 0b467ae59c0182524cf73277d8c629a3919eb2f6616ae25229cb6176d0184fd2
Posted Apr 30, 2001
Authored by BigHawk

Squirt is a perl tool for finding and exploiting local buffer overflow vulnerabilities which is very configurable and platform independent. It is possible to exploit almost any local overflow on any system by providing the correct values as arguments (or brute forcing them), telling the program how the overflow must be triggered, and by eventually loading (system specific) desired shellcode.

Changes: Two new techniques - The Framepointer Overwrite and exploiting non-terminated adjacent memory spaces. Also includes some code cleanups.
tags | overflow, local, perl, vulnerability, shellcode
systems | unix
SHA-256 | bf9e57c3c70d663c57aca417a29bc642423b00a7ee76cc65d7e70844dafffcd3
Page 1 of 1

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By