Hackers Digest Issue 2 - In this issue: Power to the People, Free Jerome Heckencamp, Guidelines for C Source Code Auditing, The Cordless Beige Box Theory, Invisible File Extensions on Windows, Strategies for Defeating Distributed Attacks, Autopsy of a Successful Intrusion, Remote GET Buffer Overflow Vulnerability in CamShot WebCam HTTP, An Approach to Systematic Network Auditing, Statically Detecting Likely Buffer Overflow Vulnerabilities, and more.
4771bce8b56d1c1d5b14512b71b52fa12c82f88f542069ec17bc71e7d2e93cb8
The Stealth HTTP Security Scanner provides more than 13000 http vulnerability checks. Runs on Win32 and Linux under Wine. Free.
76517c144886aeb5041a9d7fac1712d28f622a7643e56332b8fc3ca3ebcc98e4
Cisco IOS HTTP Server Vulnerability Scanner - This code scans a Cisco router/switch for vulnerability, and as an option fetching the configuration, without any authentication as described here. Cisco bug ID CSCdt93862. Tested on Linux and OpenBSD.
81d881c2b33df0e7b482f1d03c843a9f8271bf7f2c9576f3f52ef9e116a990b5
WARD v1.7 is a classic war dialer: it scans a list of phone numbers, finding the ones where a modem is answering the call. WARD can generate phone numbers lists based on a user-supplied mask, in incremental or random order. Remember to change some defines to make it fit your current system configuration. WARD is one of the fastest PBX scanners around (and possibly the best for UNIX environment). Tested on OpenBSD and Linux.
bf6d61d5f2eeb2b286d8900abe800e604d3856c75e62eba1e1ade8c1622b0c92