exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2001-12-18

hk-0.1.zip
Posted Dec 18, 2001
Authored by Todd Sabin | Site razor.bindview.com

Microsoft HK local exploit - Executes any command as SYSTEM, as described in MS01-003. Good for recovering lost admin rights. Includes C source and binary.

tags | exploit, local
SHA-256 | cd88e00055d120a493e12b4c85d7918cb835d162033519a2bfc4df5c703507c9
knetfilter-2.2.3.tar.gz
Posted Dec 18, 2001

Knetfilter is a KDE gui application designed to manage the netfilter functionalities that will come with the new kernel 2.4.x. In Principal, all standard firewall system administration activities can be done just using knetfilter. But there is not just a GUI to iptables command line, it is possible also some monitoring via a tcpdump interface.

Changes: Output lines are no longer printed three times. The configure system has been updated (on the way to KDE 3).
tags | tool, kernel, firewall
systems | linux
SHA-256 | 97f93e9a7e42ac6bdac9a90c261af29d6589bbb1c510ee05d4f0b01033d3b45b
firestarter-0.8.0.tar.gz
Posted Dec 18, 2001
Authored by Tomas Junnonen | Site firestarter.sourceforge.net

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: A more powerful wizard!!!!! Smarter connection tracking, more advanced sysctl checks that provide better security than ever, ability to forward different protocols (e.g., UDP), and lots of bugfixes.
tags | tool, firewall
systems | linux
SHA-256 | 57185b1b202c202ab312683c0cec2e72f46ca731ef9489300166d8c329124370
ipfc-1.0.tar.gz
Posted Dec 18, 2001
Site conostix.com

IPFC is a framework to manage and monitor multiple types of security modules across a network. Security modules can be as diverse as packet filters (like netfilter, pf, ipfw, IP Filter, checkpoint FW1, etc.), NIDS (Snort, arpwatch, etc.), Web servers, and other general devices (from servers to embedded devices). Features log collection for different security "agents", dynamic log correlation possibilities, and easy extensibility due to the generic database and XML message formats used

tags | web, system logging
systems | unix
SHA-256 | 35da85916f89ffe63c21bbd2e6dc451a2045d24980edb9862b30db9e2c9a9bea
monitord-4.0beta.tar.gz
Posted Dec 18, 2001
Site sourceforge.net

The Network Security Monitor Daemon is a lightweight (distributed?) network security monitor for TCP/IP LANs which will capture certain network events and record them in a relational database. The recorded data is then made available for analysis via a CGI-based interface.

Changes: Improved security - No threads run as root. Added a new statistical thread and an HTTP server thread (which serves statistics in XML/XSL).
tags | tool, cgi, tcp, intrusion detection
systems | unix
SHA-256 | 848342a5d5417eb00d5a2621a8ecd05922765397c2559d33af29be18b511c60c
tct-1.09.tar.gz
Posted Dec 18, 2001
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, Solaris, and SunOS. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

Changes: Added large file support for linux. Fixed a bad off by one bug in unrm. New grave-robber -I option for better control of icat/pcat. Fixed lots of bugs. Updated documentation.
tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | 40c43f9dd527192a2d17123c639020ca7431eb4a2af3dc31432c14373fcc0856
infostego3.zip
Posted Dec 18, 2001

Infostego is a program for Windows to hide information in pictures. Shareware. From www.anity.net.

tags | encryption, steganography
systems | windows
SHA-256 | 9b1b01d5b6485133375896ffced032e70a9ce44849aa9257dfe8ebbfe39ac015
SUN MICROSYSTEMS SECURITY BULLETIN: #00213
Posted Dec 18, 2001
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, overflow, x86, local, root
systems | solaris
SHA-256 | 11ceb5f50c546a836bc20af25d7ea1614c3cd5895bf45f647ce467bc6a41c19a
script.command.txt
Posted Dec 18, 2001
Authored by Marco van Berkum | Site ws.obit.nl

The script command overwrites hardlinks named typescript in the current directory.

tags | exploit
SHA-256 | d79023227c22e8ad95ff6441f4cb693f4c84fd87bea085fa786b664d343ebb48
FreeBSD Security Advisory 2001.68
Posted Dec 18, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:68 - The XSane port has insecure temp file vulnerabilities allowing local users to overwrite files by exploiting a race condition.

tags | local, vulnerability
systems | freebsd
SHA-256 | 13a8acd9ec717a5886e42bcf5e561d7bb8a8fd1f23abc51ef6013571ccd76bc0
FreeBSD Security Advisory 2001.67
Posted Dec 18, 2001
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-01:67 - Htsearch, part of the htdig port, contains remote denial of service vulnerabilities. It also can allow files on the webserver to be written, but only if the attacker can anon-ftp in files. Version 3.1.5 and below are affected.

tags | remote, denial of service, vulnerability
systems | freebsd
SHA-256 | c0535815b894fe6e442f2f4287ca788e2a7c57797fa9aac8ba3b5ac9b0612ddd
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close