what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2001-11-14

swatch-3.0.4.tar.gz
Posted Nov 14, 2001
Authored by Todd Atkins | Site stanford.edu

Swatch, the Simple Watch Daemon is a program for UNIX system logging, originally written to actively monitor messages as they are written to a log file via the UNIX syslog utility. Swatch was designed to keep system administrators from being overwhelmed by large quantities of log data. It monitors log files and acts to filter out unwanted data and take one or more simple user specified actions based upon patterns in the log. Swatch can monitor information as it is being appended to the log file and alert system administrators immediately to serious system problems as they occur.

Changes: Fixed a big bug involving key value assignment when throttling.
tags | tool, intrusion detection
systems | unix
SHA-256 | 3f3225f58781b125ec0025ae69ddac82e9e8a2e0b1b3bb4b116021812053dfd7
openssh-3.0p1.tar.gz
Posted Nov 14, 2001
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: The default protocol is now SSH protocol v2. Support for Rekeying in protocol v2 was added. Dynamic forwarding added useing ssh(1) as your socks server. Extended AllowUsers user@host syntax added to sshd(8). ssh-keyscan(1) now supports protocol version 2. Full changelog available here.
tags | encryption
systems | linux, openbsd
SHA-256 | 4a0aee685874a64fcc96bd36f2ed4f341709d9191ef730e7b405de32e87241eb
incident-2.0.tar.gz
Posted Nov 14, 2001
Site cse.fau.edu

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: Switched back to WHOIS for IP lookups with a fallback to RWHOIS due to the fact that rwhois.arin.net is so often overloaded.
tags | tool, remote, sniffer
SHA-256 | 46adf59384df5ca7c2c095ffeccfb3c7e7ad2d0beb49cb9f31f7dd68985ac1bd
ipsorc-1.2.tar.gz
Posted Nov 14, 2001
Site legions.org

IP Sorcery is a TCPIP packet generator which allows you to send TCP, UDP, and ICMP packets with a GTK+ interface.

Changes: Repaired the ability to send data within the packets in the GTK version.
tags | udp, tcp
systems | unix
SHA-256 | 128427aa2c9f567d35671fdb436ca66aa14301c90b9cee6ca7ac222e41c6eb9d
stunnel-3.21c.tar.gz
Posted Nov 14, 2001
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.

Changes: Includes DLLs for OpenSSL 0.9.6b. Updated autoconf scripts and docs.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | 46b40e6c5e18997904ac098eb57f3c539feb3c92fdf18c475e4524a3b97ceb8c
floppyfw-1.0.12.img
Posted Nov 14, 2001
Authored by Thomas Lundquist | Site zelow.no

Floppyfw is a router and firewall on one floppy disk. It uses Linux basic firewall capabilities, and has a simple packaging system. It is ideal for masquerading and securing networks on ADSL and cable lines, using static IP, DHCP, and PPPoE. Installation involves editing of only one file on the floppy.

Changes: New stable release! A DHCP server and DNS cache were added. Kernel 2.2.20 is now included.
tags | tool, firewall
systems | linux
SHA-256 | 656537f156e158ceb049740eee387415c59f412c978d35ae9e0a1a73a55aa6af
SUN MICROSYSTEMS SECURITY BULLETIN: #00212
Posted Nov 14, 2001
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, root
systems | solaris
SHA-256 | fdb48f205b9093efa4f6227ea7def7424f4461b07154dea026d00d83941e9ec3
hp-ux-bdf.c
Posted Nov 14, 2001
Authored by Brainstorm, electronicsouls | Site es.xor.ru

Hp-ux-bdf.c is a local root buffer overflow exploit for HP-UX's /usr/bin/bdf.

tags | exploit, overflow, local, root
systems | hpux
SHA-256 | 0e8e2833f271db51967945879c37ea8b040d8a327992db7a84525fd4e618c1ce
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close