what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2001-05-23

modhide1.c
Posted May 23, 2001
Authored by Nijen Rode

Modhide1.c demonstrates a new method of hiding kernel modules which does not trigger any normal detection techniques because it does not change lsmod or the system call table. Instead it hacks the kernel's memory to make it "forget" the module.

tags | tool, kernel, rootkit
systems | unix
SHA-256 | 0a87b973516873f2b069e3b3d61def3144776cfcecb3dec5ab65fdef5d8cfd01
ms01-028
Posted May 23, 2001

Microsoft Security Advisory MS01-028 - Microsoft Word contains a vulnerability in RTF documents linked to templates which allows malicious users to run macros without the users knowledge or approval. The macro would be able to take any action that the user herself could take. This could include disabling the user's Word security settings so that subsequently-opened Word documents would no longer be checked for macros. Microsoft FAQ on this issue available here.

SHA-256 | 23d0500e57635f970a6cdb057331b5ed4edae2ecd473703ac2900e4611f3eeb0
RHSA-2001:069-02.man
Posted May 23, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:069-02 - The man package which is included with Red Hat 5.x, 6.x, and 7.0 contains a buffer overflow which allows local users to gain gid=man privileges.

tags | overflow, local
systems | linux, redhat
SHA-256 | b3528cab8e9854e0aea2f67b8bfbda58041f4184d82c1caf896cc0386f8802d6
RHSA-2001:063-02.gnupg
Posted May 23, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:063-02 - When modifying an unsuspecting user's private keyring, an attacker can cause a user to generate incorrect signatures for data. If a user generates both a correct and an incorrect signature for the same data, the different signatures can be used to compute the user's secret key. This is fixed in v1.0.5.

systems | linux, redhat
SHA-256 | f0495b4a79ee9ef8d5489f6b7cff1ee6128afd0bad6c90054acfcb63d3f51f65
RHSA-2001:060-04.kerberos5
Posted May 23, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:060-04 - Updated Kerberos 5 packages are now available for Red Hat Linux 6.2, 7, and 7.1, due to the discovery of several buffer overflows.

tags | overflow
systems | linux, redhat
SHA-256 | a485986767aedff1e0389289f0c1cfd5aba7bde259b7928671e3053a2fa52f0b
LinkMax.txt
Posted May 23, 2001

The WebAvail LinkMax2 (ASP) allows website visitors to view the LinkMax2 admin login and password. Fix included.

tags | exploit, asp
SHA-256 | bc49f92d642851afebdaa716c8669034d092c6652034fd4a9c0ddaa830453e4f
FGC_tools_v1.zip
Posted May 23, 2001
Authored by Frost Byte

FGC_Tools exploits Fortress security by simply making calls to the DLL used by their program. Disables security or overwrites the password without prior knowledge of the current password. Includes TASM source.

SHA-256 | 69b6b254e5158ea06287477874dc92414293ce96c8c13eb98dcc2cb7925247ec
icmp-log-0.4.2.tar.gz
Posted May 23, 2001
Authored by Zucco | Site w3.swi.hu

Icmp-Log v0.4 is a simple ICMP logger.

Changes: GPL license, coding style changed, uses automake script from netscript 1.6.0 by v9.
tags | system logging
systems | unix
SHA-256 | 26034114f4f2e03badef9ea5d53b3fbb65e94c2cf0a0db00c5d7da43fa7045cb
freevsd-1.4.8-1.tar.gz
Posted May 23, 2001
Authored by Mark Sutton | Site freevsd.org

FreeVSD facilitates true Linux Virtual Servers within a 'chroot' environment, allowing Web servers and other applications to be deployed and administered discretely, without compromise to security. Each Virtual Server has its own IP address(es), Apache webserver, and view of the process table. FreeVSD expands the Linux system by creating a pseudo-'super user' (admin) for each Virtual Server. The admin user has the ability to create extra POP3/FTP and Telnet users and also administrate vital services such as the webserver.

Changes: Improved OpenSSL support, improved SSL certificate handling, PAM-based privileges, upgraded 'addon' packages, and added multiple skel support.
tags | web
systems | linux, unix
SHA-256 | 03d3bb19a8cc0553d34c00ccab0151b47ae1cc4f32e47c354adbf742bea1b200
Samhain File Integrity Checker
Posted May 23, 2001
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain (development branch) is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6. The devel version has more advanced features, but not all options are thoroughly tested yet.

Changes: Now detects Linux LKM rootkits. Problems with repetitive reports by the daemon have been fixed, the installation has been streamlined, init scripts for Linux (SuSE, Redhat, and Debian) have been added, and the docs have been revised.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 5d1dad7c0b0a2a4dd188767a5f3f037cf9749b1bb98b06900f7c8d21c445aba1
lids-1.0.8-2.4.4.tar.gz
Posted May 23, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection. LIDS FAQ available here.

Changes: Updated for kernel v2.4.4. Most of the "-EROFS" have been changed to to "-EPERM" (the output of the violation would be "permission deny", not "Read only file system").
tags | kernel, root
systems | linux
SHA-256 | c55524357504029edc8df12d1f74d0fae50aa031bb0a75ab64e4e96ad05757ee
authforce-0.9.6.tar.gz
Posted May 23, 2001
Site kapheine.hypa.net

Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.

Changes: Fixed a bug which caused it to crash on large datafiles.
tags | web, cracker
SHA-256 | 96b48c77c92a128f92d0a7016d8908de006ed99506c0e506524d4b59ca531c92
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close