what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2002-04-09

sendmail.8.12.3.tar.gz
Posted Apr 9, 2002
Site sendmail.org

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: This version fixes a long-standing MIME (7 to 8-bit) conversion bug, a possible communication problem between the MTA and libmilter, bug in handling (invalid) addresses containing 8-bit characters, a possible problem with small timeouts being lost on slow machines if itimers are used, and handling of the 421 reply code and timeouts in the SMTP delivery code.
systems | unix
SHA-256 | 122fd74f8bb7a14efb96e83bb10e1377d3bf012cc7df10b846b95b88699602e1
lcrzoex-4.08-src.tgz
Posted Apr 9, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: It's now possible to compile the shared version liblcrzo.so. Lcrzo_stringlist functions were created to store lists of strings.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | 218a1b1a1cb9e9fe90523aa1a18134960e4046d350c1d0465cc5c9b194fcfa1d
netspoc-1.1.tar.gz
Posted Apr 9, 2002
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: This release fixes bugs with the pix security levels.
systems | unix
SHA-256 | a4f6d5b81e9f2a49908356154dfda3286665922c5f7a08d62c9bcc3ba79d4929
watchguard.dos.txt
Posted Apr 9, 2002
Authored by Andreas Sandor

Watchguard SOHO remote denial of service vulnerability - All versions prior to v5.0.35 crash when tcp traffic with bad IP options are sent. The Watchguard Soho firewall does not perform parsing of IP options unless the packet has to be forwarded. This means that most home users will not be affected by this vulnerability, unless they have a service running behind the firewall, that is enabled through port- forwarding (eg. FTP, HTTP).

tags | remote, web, denial of service, tcp
SHA-256 | d4e57f6e99405813301b492710370b3c468cb976efffd0630b0f2a18edb29d82
adv_funk.txt
Posted Apr 9, 2002
Authored by Chris Coffin | Site razor.bindview.com

Bindview Security Advisory - The Funk Proxy Server v3.x for Windows contains vulnerabilities that allow local and remote attackers to change and even obtain configuration settings and passwords for the Proxy Host software. This could allow unauthorized remote control access to the Windows GUI, which could be used to further compromise the system. Many vendors, including Veritas, On Technology, Bendata, and BindView include the Proxy remote control software (under different names) within their desktop management or help desk product suites to aid in remote administration.

tags | remote, local, vulnerability
systems | windows
SHA-256 | 7ffbd47166cc6bb6ec085e5cb4a9dce57f109577ba77e07cee12766c14ab03c4
Webr00t.pl
Posted Apr 9, 2002
Authored by B-root

Webr00t.pl is used to discover hidden directories and 'interesting' files on webservers. Use it when pentesting applications and servers to find that one directory or script left by mistake.

tags | cgi
systems | unix
SHA-256 | 2b51ee05b6db72bbd2b05bdd857b76edb8d29838837a027b1f8ea9378ff02c78
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close