what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2001-10-05

ms01-050
Posted Oct 5, 2001

Microsoft Security Advisory MS01-050 - Excel and PowerPoint contain a flaw in the macro security framework which allows malicious users to bypass all macro checking, allowing attackers to run code of their choice when an Excel or PowerPoint document is opened. Microsoft FAQ on this issue available here.

SHA-256 | 979fdaca159af66b77ef4fce08b0f0c8ef791e8fe955b61c5380ab9c0045204e
Samhain File Integrity Checker
Posted Oct 5, 2001
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain (stable branch) is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Better detection of kernel module rootkits (Linux only) to detect 'stealth' syscall redirection, the server can listen for syslog reports from remote hosts, logfiles can be written in XML format, the default install paths comply with the Filesystem Hierarchy Standard, minor bugs have been fixed, and added support for Mac OS X.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 0ff014554ff5f6e52c2fcc3638ee710af2c7053143a3f95659761f0aa510a287
stegdetect-0.3.tar.gz
Posted Oct 5, 2001
Site outguess.org

Stegdetect is an automated tool for detecting steganographic content in images which is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Currently, the detectable schemes are jsteg, jphide, and outguess 01.3b.

Changes: Now includes Stegbreak - a tool for launching dictionary attacks against JSteg-Shell, JPHide, and OutGuess.
tags | encryption, steganography
SHA-256 | 3e14fc3e9330887f7ae5d65a736bb435101c14a0ab1e161659e7cd296c29b780
0009-exploits.tgz
Posted Oct 5, 2001
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for September, 2000.

tags | exploit
SHA-256 | f37ed49f9fab70a3d7c2be9c3b5c02fc2f9029da33739f9475b5045152993601
psad-0.9.2.tar.gz
Posted Oct 5, 2001
Site cipherdyne.com

Port Scan Attack Detector (psad) is a perl program that is designed to work with Linux firewalling code (iptables in the 2.4.x kernels, and ipchains in the 2.2.x kernels) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options (Linux 2.4.x kernels only), email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap.

Changes: Filesystem Hierarchy Standard (FHS) support, Red Hat 7.0/7.1 support, a process management system which is used by the psad init script, and support for ipchains firewalls on the 2.4.x kernels.
tags | kernel, perl, tcp
systems | linux
SHA-256 | 34192961ae47cf0ada6d157751581dd8baf9c3d32d6e7c8e0b975202cf121333
ipa-1.1.6.tar.gz
Posted Oct 5, 2001
Site simon.org.ua

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: A new method of handling overflowed IPv4/v6 Firewall, and IP Filter accounting rules with the "maxchunk" parameter has been implemented.
systems | unix, bsd
SHA-256 | 0423982c29e13530d7b535faacc7676cbd8d59c91f0674364c683805b5dcfc9a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close