exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2001-10-11

Posted Oct 11, 2001
Site cs.uct.ac.za

IDS/A is an API which programmers can use to add security awareness to their applications. This is implemented via an integrated reference monitor, logger and IDS which is accessible to applications through a simple API. Applications can use this infrastructure to delegate access control and intruder detection to idsa.

Changes: Bug fixes and improvements.
tags | system logging
systems | unix
MD5 | e4bbaba62b8e71ed5f429c2601cb11ff
Posted Oct 11, 2001
Authored by Mao | Site oxid.it

IP Restrictions Scanner (IRS) is a Windows NT/2k tool which finds out which network restrictions have been set for a particular service on a host. It combines "ARP Poisoning" and "Half-Scan" techniques and tries totally spoofed TCP connections to the selected port of the target.

Changes: Better temp file use to minimize false positives, bug fixes, and code cleanups.
tags | spoof, tcp
systems | windows, 2k, nt
MD5 | e3d49382b7b147c19cab5a1a6ef8b871
Posted Oct 11, 2001
Authored by teso, scut | Site team-teso.net

Exploiting Format String Vulnerabilities v1.2 - Includes over 30 pages of well organized information along with several examples.

tags | paper, vulnerability
systems | unix
MD5 | b83261bd868fa46874290b59915bda58
Posted Oct 11, 2001
Authored by teso, scut | Site team-teso.net

IOB stands for I/O bridge, a simple tty chaining program. It can be used to log almost any session, including ssh, gpg, pgp, cfsattach, losetup, etc.

MD5 | e5014222fec4c7375e3f66dbb8edb43a
FreeBSD Security Advisory 2001.62
Posted Oct 11, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:62.uucp - Taylor UUCP is incorrectly configured by default, allowing local users to run commands as the uucp user and dialer group, allowing local root access.

tags | local, root
systems | freebsd
MD5 | 725c3b6b92572c199d8624d6f2c806e0
FreeBSD Security Advisory 2001.61
Posted Oct 11, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:61 - If the squid proxy port is configured in acceleration-only mode, ACL's are ignored, allowing a remote attacker to use the squid server in order to issue requests to hosts that are otherwise inaccessible. Because the squid server processes these requests as HTTP requests, the attacker cannot send or retrieve arbitrary data. However, the attacker could use squid's response to determine if a particular port is open on a victim host. Therefore, the squid server may be used to conduct a port scan.

tags | remote, web, arbitrary
systems | freebsd
MD5 | 3a5eadce78ebd78879fe27fb8d2f1278
Posted Oct 11, 2001
Authored by Bind | Site packetfactory.net

The Sentinel project is designed to be a portable, accurate, and effective implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, icmp etherping test, and ARP test. Tested on OpenBSD-3.0beta, FreeBSD 4.0, Netbsd 1.5.2, and Linux 2.4.x.

Changes: Bug fixes, updated documentation.
tags | tool, remote, intrusion detection
systems | linux, netbsd, unix, freebsd, openbsd
MD5 | c4f05217762b6ebe876fffe57ad0701d
Posted Oct 11, 2001
Site cse.fau.edu

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: New AU whois servers added, changed: lines from whois are now ignored unless no other contacts are found A few more whois server error messages are handled properly, and timeouts/retries for whois are now configurable. Some other minor bugfixes were also done.
tags | tool, remote, sniffer
MD5 | c095dc64bea5d14dff1d209878e5b66e
Posted Oct 11, 2001
Site sourceforge.net

fwmon is a firewall monitor for Linux which integrates with ipchains to give you realtime notification of firewall events. It has fairly customizable output, allowing you to display a packet summary, hex, and ascii data dumps to stdout, a logfile, or tcpdump-style capture files. It also boasts some simple security features such as the ability to chroot itself, and does not need to run as root.

Changes: Buffer output for faster execution under heavy load. SQL output has been added, and the RPM now installs fwmon as a daemon.
tags | tool, root, firewall
systems | linux
MD5 | 7091968d0103282ce6c2fdf32ae126ff
Posted Oct 11, 2001
Authored by Alex Howansky | Site wankwood.com

Reptor is a utility designed to aid the analysis of Axent/Raptor firewall logfiles which generates HTML reports which can include traffic summaries and alert messages that are based on highly customizable conditions. It has built in support for logfile retrieval, FTP, and SMTP allow it to be easily automated.

Changes: Uses OOBA (out of band communication), DNS caching, a workaround for Raptor's "SMTP huge received bytes value" bug, new HTML themes, and several bugfixes.
tags | tool, firewall
systems | unix
MD5 | cca36a50c08888b4ea31b242d8685902
Page 1 of 1

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    12 Files
  • 4
    Jul 4th
    1 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    25 Files
  • 7
    Jul 7th
    35 Files
  • 8
    Jul 8th
    4 Files
  • 9
    Jul 9th
    9 Files
  • 10
    Jul 10th
    7 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By