exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2001-07-11

Posted Jul 11, 2001
Authored by Tim Lawless | Site sourceforge.net

StMichael is a LKM that attempts to detect and divert attempts to install a kernel-module backdoor into a running linux system. This is done by monitoring the init_module and delete_module process for changes in the system call table. This is a experimental version, and a spin off from the Saint Jude Project.

Changes: Added the SHA1 checksum to complement the md5's, added timers to periodically revalidate the kernel, added a configuration script, and added some demos which will trigger StMichael.
tags | kernel
systems | linux
SHA-256 | a0d290b17442053787c6652f23397b32b04e3066b225c9bafc040f367dd857d5
Posted Jul 11, 2001

InaddyScanner is a port scanner that uses pthreads, and can scan 500 ports in 10 seconds in a good connection (112 kbp/s). Using the MIT-pthreads library and GTK, it includes a friendly interface with advanced stuff for scanning.

tags | tool, scanner
systems | unix
SHA-256 | c870983583afa8034f6debaa6a2612d8e13e5c4706740d64880006cee9264176
Posted Jul 11, 2001
Site trsecurity.net

Logs2Intrusions v1.0 parses IIS or Apache web server logfiles then create possible intrusions report.

tags | web
SHA-256 | 3f40f66b2115df1396b1b9a360d57330fab28da0db21fcf67fe7e9a5375dd39d
Posted Jul 11, 2001
Authored by FX | Site phenoelit.de

IRPAS is a suite of routing protocol attack tools which sends custom routing protocol packets from the unix command line. It is very useful for searching for new routing protocol vulnerabilities. Included is a tool for sending Cisco Discovery Protocol (CDP) messages, one for injecting IGRP routes, and a scanner for IGRP autonomous systems. Documentation available here.

tags | vulnerability, protocol
systems | cisco, unix
SHA-256 | 137b8a73f18383a037c5e6af51cfe6d29c72f38628bd5ce38f1864cf91a8e559
Posted Jul 11, 2001
Authored by Felipe Moniz | Site hideaway.net

Stealth HTTP Security Scanner 1.0 build 29 - Checks for 5677 CGI vulnerabilities. Run on Win32 and Linux under Wine. Free.

Changes: Checks for Microsoft FrontPage 2000 Server Extensions Buffer Overflow, MS Index Server and Indexing Service ISAPI Extension Buffer Overflow, CGI Decode, and IIS 4.0 ISAPI Buffer Overflow.
tags | web, cgi, vulnerability
systems | linux, windows
SHA-256 | dfd5a362ab45ee605e5c6e601ae5eba7ed6f320e00d9ca8c260e2a5fa4e44f92
Posted Jul 11, 2001
Site elcomsoft.com

Advanced NT Security Explorer (ANTExp) is an application for Microsoft Windows NT, Windows 2000 and Windows XP system administrators for finding holes in system security. It analyses user password hashes, and tries to recover plain-text passwords. If it's possible to recover the password in a reasonable time, the password should be considered to be insecure. ANTExp is very fast - tries about 900,000 passwords per second on a Pentium-III/450 CPU. Tested on Windows 95, Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP.

systems | windows
SHA-256 | cda4559e128daee59d7f154bb5d74f9cedc7a06826e88dd0bdfda3843e65f6ee
Posted Jul 11, 2001
Authored by Andrea Barisani

Firewall Tester v0.1 consists of two simple perl scripts, the client part (ftest.pl) and the listening "daemon" (ftestd.pl). The client injects custom packets with a signature in the data part while the daemon listens for such marked packets. Requires Net::RawIP, Net:PcapUtils, and Net::Packet.

tags | tool, perl, firewall
systems | unix
SHA-256 | b2d084cb97e57d877312862c2a15d12a330a9e005401c04c1c23373f57edf56f
Posted Jul 11, 2001
Authored by Doom, Smashstack | Site nbs.extremenetworking.net

Kppp (/usr/local/kde/bin/kppp) v1.1.2 and below local exploit. Tested against x86 and Sparc Linux.

tags | exploit, x86, local
systems | linux
SHA-256 | 6955c7c52f2070a0081b8194b5b560371868aee5f2f1508b33fcd2c8d10a32f7
Posted Jul 11, 2001
Authored by Natas

Malice v7.0 beta is a perl CGI scanner with an updated CGI list. Includes many anti-IDS functions, IIS checks, and more.

Changes: New anti-IDS techniques, updated CGI's, and IIS checks.
tags | cgi, perl
systems | unix
SHA-256 | 791d4a441af1936dedc5bf7495a5f3603d46c1f0dfd905bf0a8f15a4a1633efe
Posted Jul 11, 2001
Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex.

Changes: New tool - Backdoor webserver to execute commands remotely. Also includes new tools to send mail and news with attachments, check mail server relaying, list newsgroups, and download articles. Many bugs were fixed.
tags | udp, spoof, tcp, protocol, library
systems | linux, solaris, freebsd
SHA-256 | 9dd0e763d15fb5c35153497f64e90bb52fb6123f375bad38d56b063969f8f6a5
Posted Jul 11, 2001
Authored by Robert Osterlund | Site pikt.uchicago.edu

PIKT is a cross-platform, multi-functional toolkit for monitoring systems, reporting and fixing problems, security management, and updating system configurations. PIKT comprises an embedded scripting language with unique, labor-saving features. Binaries available here.

Changes: New stable release - Piktx was rewritten. The script parser has been simplified. Added lots of new options and bug fixes.
tags | tool
systems | unix
SHA-256 | a68325fcd762dc2dba836045b8ce188f9637f11f7a9f0f0944080e9947be6a59
Posted Jul 11, 2001
Site ntop.org

Monitoring Networks Using ntop - How to monitor networks using the security tool ntop. Includes information on how to use it as a lightweight IDS.

tags | paper
systems | unix
SHA-256 | 8fab586e80d7808fa072e8c914fb00ef79573c88cc88de648f64595124e333e7
Posted Jul 11, 2001
Site ntop.org

Ntop is a very useful Unix / Windows network sniffing tool that shows the network usage, similar to what the popular top Unix command does. Has an interactive mode and a web mode for greater functionality and options, shows network traffic sorted according to various criteria, displays traffic statistics, shows IP traffic distribution among the various protocols, analyses IP traffic and sorts it according to the source/destination, displays IP Traffic Subnet matrix (who's talking to who?), reports IP protocol usage sorted by protocol type.

Changes: Fixed a security flaw - ntop now check whether the requested URL does not contains strings such as '..' that may violate system security. Added SSL and QNX support. Fixed PPP glitch and graphs.
tags | tool, web, sniffer, protocol
systems | windows, unix
SHA-256 | e707c5bc5e52fb6021280ce2cf3edb41d7da18ce67bff64736256dcf75b4a35a
Posted Jul 11, 2001
Authored by Jordan Ritter | Site ngrep.sourceforge.net

Ngrep is a powerful network sniffing tool which strives to provide most of GNU grep's common features, applying them to all network traffic. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP, FDDI, and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.

Changes: Added option to set BPF caplen, fixed header for glibc 2.2, license changes, and bug fixes.
tags | tool, udp, sniffer, tcp
SHA-256 | fd9beee51894b3a6dca2d7e5a344111ae18c2d6670773cba789e27e91b65dbf4
Page 1 of 1

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By