what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 84 RSS Feed

Files Date: 2001-12-01 to 2001-12-31

lids-1.1.0-2.4.16.tar.gz
Posted Dec 29, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection. LIDS FAQ available here.

Changes: LIDS can be used for the 2.4.16 kernel, /etc/lids access deny is no more hardcoded and has to be included in the configuration and several bugs where fixed.
tags | kernel, root
systems | linux
SHA-256 | d7548f59b3973f98bdf19dc654a963244f3639ac752c377a382018717e9a1191
phrack58.tar.gz
Posted Dec 28, 2001
Authored by phrack | Site phrack.org

Phrack Magazine Issue 58 - In this issue: Advanced return-into-lib(c) exploits (PaX case study), Runtime binary encryption, Advances in kernel hacking, Linux on-the-fly kernel patching without LKM, Linux x86 kernel function hooking emulation, RPC without borders, Developing StrongARM/Linux shellcode, HP-UX (PA-RISC 1.1) Overflows, The Security of Vita Vuova's Inferno OS, Phrack Loopback, Phrack World News, and more.

tags | overflow, x86, kernel, shellcode, risc, magazine
systems | linux, hpux
SHA-256 | ee77a8d4f48fe30a69ff0924cfc8de40748da8c69b2e4e854bd0ba5d410e233c
hp-ftp
Posted Dec 28, 2001

The hp-ftp trojan pretends to be an exploit created by the Last Stage of Delirium that targets HP-UX FTP servers. Upon executions this file will try to add two new accounts to the password file and will send an email with netstat information to aborted@yahoo.com LinuxPir8@yahoo.com. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | hpux
SHA-256 | 323f34db83b7d6108a4f23c73d3afb15
smash_bin_login.c
Posted Dec 28, 2001
Authored by JW Oh | Site monkey.org

Solaris x86 v2.8 /bin/login via telnet remote buffer overflow exploit. Uses fixed addresses. Executes any command as root.

tags | exploit, remote, overflow, x86, root
systems | solaris
SHA-256 | 8d3fd288df4995d5d3f1e2fea300e371c51d0455b03a428ac1c07e3ded29d2ab
pmexpl.c
Posted Dec 28, 2001
Authored by IhaQueR@IRCnet

Pmake <= 2.1.33 local root exploit. Some distributions have pmake suid root by default.

tags | exploit, local, root
SHA-256 | 2b080511384ae8e213adb366947433c6146e524aa2bfafbf50c32312f1454f8f
kaiten.c
Posted Dec 27, 2001
Authored by contem

Kaitan.c is an IRC based DDoS client.

SHA-256 | a4ad354cdca50b144490f75cf9193af1925f2308ee52514a7ffb5fc9d8b0bb79
nb-isakmp.pl
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.pl is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. Perl version.

tags | exploit, remote, denial of service, perl, proof of concept
systems | windows
SHA-256 | 6ef25b8d1ba114841a8d4ccc55e140f50dd17a4700763333202bc66f1293b338
nb-isakmp.c
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.c is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. C version.

tags | exploit, remote, denial of service, proof of concept
systems | windows
SHA-256 | f5486daacf1b331ad898ccb4e9629d84abc8a606c7e8d3b2b80234edda1df027
adstreamer.txt
Posted Dec 26, 2001
Authored by Gobbles Security | Site bugtraq.org

AdStreamer is a cgi package with several remote vulnerabilities, one of which allows remote command execution. Buggy open calls were found in addbanner.cgi, banner.cgi, bannereditor.cgi, and report2.cgi.

tags | exploit, remote, cgi, vulnerability
SHA-256 | b45aa093198822646a56eced2418259c61c1cd33a6793264a56045e50d87c79a
aesop-0.3.tar.gz
Posted Dec 26, 2001
Authored by BigHawk | Site kryptology.org

Aesop is a TCP-proxy which supports many advanced and powerful features. It's designed to be secure, fast and reliable. Aesop makes use of strong cryptography (RC4) for all its data-transmission up to the end-link. Another powerful feature of Aesop is that Aesop proxies can be transparently stacked into a secure chain. Aesop is implemented using multiplexing and is therefor fast and lightweight.

Changes: Added IPV6 support, more portable, fixed makefiles, added debugging, and fixed bugs.
tags | tcp
systems | unix
SHA-256 | d5ad647ce2d30f7b5f15fb6162d4d7bb8a79761c151ac939a4267d4d7952d017
ethereal-0.9.0.tar.gz
Posted Dec 26, 2001
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: New dissectors include EAPOL, M2TP, MS RPC, MTP2, PCNFSD, PPP/EAPOL, QLLC, SMPP, and SUA. Support for DBS Etherwatch, Visual Networks Visual UpTime, and VMS TCPIPtrace capture files was added. Ascend/Lucent debug Etherpeek, iptrace and MS Netmon capture file support was enhanced.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 25fa62a5d1ba6dce074e67e25601464c57e75a1ecb506bdcfac4d533d9dc70c5
ie.cert.attack.txt
Posted Dec 26, 2001
Authored by Stefan Esser | Site e-matters.de

A flaw in Microsoft Internet Explorer allows an attacker to perform a SSL Man-In-The-Middle attack without the majority of users recognizing it. In fact the only way to detect the attack is to manually compare the server name with the name stored in the certificate due to a flaw in the way IE checks HTTPS objects that are embedded into normal HTTP pages.

tags | exploit, web
SHA-256 | be656d7d8e024e7317da02518924572f3527b139ee72d711816b35515804709c
twlc-adv-plesk211201.txt
Posted Dec 26, 2001
Authored by twlc, Supergate | Site twlc.net

Plesk, a popular server administration tool used by many web hosting companies, has a bug which allows remote users to view the source of .php hosted files. All versions prior to v2.0 are affected.

tags | exploit, remote, web, php
SHA-256 | 086915112cab9f9dc4dd1793e8217e3b54220f795ea7084a433c309e15fa6430
Bastille-1.2.0.tar.bz2
Posted Dec 26, 2001
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening System attempts to "harden" or "tighten" the Linux/Unix operating systems. It currently supports Red Hat and Mandrake systems, with support on the way for Debian, SuSE, TurboLinux and HP-UX. We attempt to provide the most secure, yet usable, system possible. Screenshot available here.. RPM's available.

systems | linux, redhat, unix, suse, debian, hpux, mandrake
SHA-256 | c68b2bc856ef76b4934210205be2188b0e1e4ecb37ebf40e5fa829daa0f2f3f2
ms01-060
Posted Dec 21, 2001

Microsoft Security Advisory MS01-060 - SQL Server 7.0 and 2000 have several vulnerabilities. Some allow remote code execution while others are denial of service attacks. An attacker could exploit the vulnerabilities in either of two ways. The most direct way would be for the attacker to simply load and execute a database query that calls one of the affected functions. Alternatively, if a web site or other database front-end would accept and process arbitrary queries, it could be possible for the attacker to provide inputs that would cause the query to call an affected function with the appropriate parameters. Microsoft FAQ on this issue available here.

tags | remote, web, denial of service, arbitrary, vulnerability, code execution
SHA-256 | 0530d56484cb8b2a5215cdfe4eb3ed9d93faf7299a0ea4afaab538a52aa688f5
ms01-059
Posted Dec 21, 2001

Microsoft Security Advisory MS01-059 - Two unrelated buffer overflows have been found in the Microsoft UPnP service. A overflow in the NOTIFY directive allows remote attackers to execute arbitrary code. The second vulnerability crashes the machine. Windows ME and XP include native UPnP services; Windows 98 and 98SE do not include a native UPnP service, but one can be installed. Microsoft FAQ on this issue available here.

tags | remote, overflow, arbitrary
systems | windows
SHA-256 | a44bee6a9162db8db90b17837abd4cad322825fb0c509ebb1aad45b1e928b6cc
ftester-0.4.tar.gz
Posted Dec 21, 2001
Authored by Andrea Barisani

The Firewall Tester consists of two simple perl scripts, the client part (ftest.pl) and the listening "daemon" (ftestd.pl). The client injects custom marked packets, while the daemon listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall.

Changes: Added command line packet injection option, packets are now tracked also with IP ID field, added freport for automatically parse ftest and ftestd log files. Requires: Net::RawIP, Net::PcapUtils, Net::Packet.
tags | tool, perl, firewall
systems | unix
SHA-256 | 53aba6a00e93b66c9d0092c9704525d2851c6e2f20d70e521e5046590cf7376d
sec-2.0.tar.gz
Posted Dec 21, 2001
Authored by Risto Vaarandi | Site kodu.neti.ee

Sec is a free and platform independent event correlation tool that was designed for network and application management, but it can be applied for solving any other task where similar event correlation operations are relevant. Since sec uses powerful regular expression concept for matching input and also supports named pipes as input files, it can not merely be used for matching events from a single logfile, but also for more general purposes. You can integrate sec with arbitrary network management (or other) application, provided that output from that application can be directed to a named pipe, which most modern network management platforms provide. Written in perl, works on Unix and Windows. FAQ here.

tags | arbitrary, perl, system logging
systems | windows, unix
SHA-256 | 207a4804d03e2d8b75b7babeaa2ffa17d2483ed2719354c92c2d8ed7e76345ac
hk-0.1.zip
Posted Dec 18, 2001
Authored by Todd Sabin | Site razor.bindview.com

Microsoft HK local exploit - Executes any command as SYSTEM, as described in MS01-003. Good for recovering lost admin rights. Includes C source and binary.

tags | exploit, local
SHA-256 | cd88e00055d120a493e12b4c85d7918cb835d162033519a2bfc4df5c703507c9
knetfilter-2.2.3.tar.gz
Posted Dec 18, 2001

Knetfilter is a KDE gui application designed to manage the netfilter functionalities that will come with the new kernel 2.4.x. In Principal, all standard firewall system administration activities can be done just using knetfilter. But there is not just a GUI to iptables command line, it is possible also some monitoring via a tcpdump interface.

Changes: Output lines are no longer printed three times. The configure system has been updated (on the way to KDE 3).
tags | tool, kernel, firewall
systems | linux
SHA-256 | 97f93e9a7e42ac6bdac9a90c261af29d6589bbb1c510ee05d4f0b01033d3b45b
firestarter-0.8.0.tar.gz
Posted Dec 18, 2001
Authored by Tomas Junnonen | Site firestarter.sourceforge.net

The goal of FireStarter is to provide an easy to use, yet powerful, GUI tool for setting up, administrating and monitoring firewalls for Linux machines. FireStarter is made for the GNOME desktop. It can actively monitor your firewall and list any unauthorized connection attempts made to your machine in a readable table format.

Changes: A more powerful wizard!!!!! Smarter connection tracking, more advanced sysctl checks that provide better security than ever, ability to forward different protocols (e.g., UDP), and lots of bugfixes.
tags | tool, firewall
systems | linux
SHA-256 | 57185b1b202c202ab312683c0cec2e72f46ca731ef9489300166d8c329124370
ipfc-1.0.tar.gz
Posted Dec 18, 2001
Site conostix.com

IPFC is a framework to manage and monitor multiple types of security modules across a network. Security modules can be as diverse as packet filters (like netfilter, pf, ipfw, IP Filter, checkpoint FW1, etc.), NIDS (Snort, arpwatch, etc.), Web servers, and other general devices (from servers to embedded devices). Features log collection for different security "agents", dynamic log correlation possibilities, and easy extensibility due to the generic database and XML message formats used

tags | web, system logging
systems | unix
SHA-256 | 35da85916f89ffe63c21bbd2e6dc451a2045d24980edb9862b30db9e2c9a9bea
monitord-4.0beta.tar.gz
Posted Dec 18, 2001
Site sourceforge.net

The Network Security Monitor Daemon is a lightweight (distributed?) network security monitor for TCP/IP LANs which will capture certain network events and record them in a relational database. The recorded data is then made available for analysis via a CGI-based interface.

Changes: Improved security - No threads run as root. Added a new statistical thread and an HTTP server thread (which serves statistics in XML/XSL).
tags | tool, cgi, tcp, intrusion detection
systems | unix
SHA-256 | 848342a5d5417eb00d5a2621a8ecd05922765397c2559d33af29be18b511c60c
tct-1.09.tar.gz
Posted Dec 18, 2001
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, Solaris, and SunOS. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

Changes: Added large file support for linux. Fixed a bad off by one bug in unrm. New grave-robber -I option for better control of icat/pcat. Fixed lots of bugs. Updated documentation.
tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | 40c43f9dd527192a2d17123c639020ca7431eb4a2af3dc31432c14373fcc0856
infostego3.zip
Posted Dec 18, 2001

Infostego is a program for Windows to hide information in pictures. Shareware. From www.anity.net.

tags | encryption, steganography
systems | windows
SHA-256 | 9b1b01d5b6485133375896ffced032e70a9ce44849aa9257dfe8ebbfe39ac015
Page 1 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close