exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2002-04-09

sendmail.8.12.3.tar.gz
Posted Apr 9, 2002
Site sendmail.org

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: This version fixes a long-standing MIME (7 to 8-bit) conversion bug, a possible communication problem between the MTA and libmilter, bug in handling (invalid) addresses containing 8-bit characters, a possible problem with small timeouts being lost on slow machines if itimers are used, and handling of the 421 reply code and timeouts in the SMTP delivery code.
systems | unix
SHA-256 | 122fd74f8bb7a14efb96e83bb10e1377d3bf012cc7df10b846b95b88699602e1
lcrzoex-4.08-src.tgz
Posted Apr 9, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: It's now possible to compile the shared version liblcrzo.so. Lcrzo_stringlist functions were created to store lists of strings.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | 218a1b1a1cb9e9fe90523aa1a18134960e4046d350c1d0465cc5c9b194fcfa1d
netspoc-1.1.tar.gz
Posted Apr 9, 2002
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: This release fixes bugs with the pix security levels.
systems | unix
SHA-256 | a4f6d5b81e9f2a49908356154dfda3286665922c5f7a08d62c9bcc3ba79d4929
watchguard.dos.txt
Posted Apr 9, 2002
Authored by Andreas Sandor

Watchguard SOHO remote denial of service vulnerability - All versions prior to v5.0.35 crash when tcp traffic with bad IP options are sent. The Watchguard Soho firewall does not perform parsing of IP options unless the packet has to be forwarded. This means that most home users will not be affected by this vulnerability, unless they have a service running behind the firewall, that is enabled through port- forwarding (eg. FTP, HTTP).

tags | remote, web, denial of service, tcp
SHA-256 | d4e57f6e99405813301b492710370b3c468cb976efffd0630b0f2a18edb29d82
adv_funk.txt
Posted Apr 9, 2002
Authored by Chris Coffin | Site razor.bindview.com

Bindview Security Advisory - The Funk Proxy Server v3.x for Windows contains vulnerabilities that allow local and remote attackers to change and even obtain configuration settings and passwords for the Proxy Host software. This could allow unauthorized remote control access to the Windows GUI, which could be used to further compromise the system. Many vendors, including Veritas, On Technology, Bendata, and BindView include the Proxy remote control software (under different names) within their desktop management or help desk product suites to aid in remote administration.

tags | remote, local, vulnerability
systems | windows
SHA-256 | 7ffbd47166cc6bb6ec085e5cb4a9dce57f109577ba77e07cee12766c14ab03c4
Webr00t.pl
Posted Apr 9, 2002
Authored by B-root

Webr00t.pl is used to discover hidden directories and 'interesting' files on webservers. Use it when pentesting applications and servers to find that one directory or script left by mistake.

tags | cgi
systems | unix
SHA-256 | 2b51ee05b6db72bbd2b05bdd857b76edb8d29838837a027b1f8ea9378ff02c78
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close