what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files Date: 2002-06-03

logclean.c
Posted Jun 3, 2002
Authored by Victor Pereira

Logclean.c is a tool to clean entries in utmp/wtmp which uses Operational System functions getutent(3), pututline(3), making it faster.

tags | tool, rootkit
systems | unix
SHA-256 | cbe0039b712816cb75ff94fccc71214c508e999984a63ef49eeab6df35751ca0
d7-pH-orgasm.tgz
Posted Jun 3, 2002
Authored by Phrail | Site divisi0n7.org

Orgasm v1.0 is a distributed reflection denial of service attack. More information available here.

tags | denial of service
SHA-256 | d6dad5cb55226f0e8e534dbe17c2c41b0a68f7e8bc1f3cf035f779e1ea82e508
plushs-1.0.tar.gz
Posted Jun 3, 2002
Authored by Pluf | Site plushs.sourceforge.net

PluSHS allows a user to resolve the names of a single IP address or entire network of addresses to maintain a "map" of the names that comprise a certain network.

tags | tool, scanner
systems | unix
SHA-256 | 0d5bddb0ccc196ba0c98783a19d57e738ffda70e5cd718a83e2c996cfb0a742c
FreeBSD-SN-02:03
Posted Jun 3, 2002
Site freebsd.org

The following FreeBSD ports prior to the listed version have security vulnerabilities: amanda-2.3.0.4, fetchmail-5.9.11, gaim-0.58, gnokii-0.4.0.p20, horde-1.2.8, imap-uw (not fixed), imp-2.2.8, linux-netscape 6.2.3, mnogosearch-3.1.19_2, mpg321-0.2.9, ssh2 password auth issue, tinyproxy-1.5.0, and webmin-0.970.

tags | vulnerability, imap
systems | linux, freebsd
SHA-256 | 573f30008a2e7144a46d4b6e77775ec38d8ffa94127935a00f2ec8c7e36ebf0e
d7-ibm-x.c
Posted Jun 3, 2002
Authored by Smurfy

IBM x86 Informix SE-7.25 sqlexec local root exploit. Overflows the INFORMIXDIR environment variable passed to the sqlexec binary. Offsets for Redhat 7.0 and Mandrake 8.2 included.

tags | exploit, overflow, x86, local, root
systems | linux, redhat, mandrake
SHA-256 | 51fb5d073c8119f0f6b35e7780a8c034299174f9e239cfe43b734a26ce42b317
ymxp.txt
Posted Jun 3, 2002
Authored by sk | Site scan-associates.net

Yahoo! Messenger v5,0,0,1061 buffer overflow exploit for Windows XP Pro. Shellcode spawns cmd.exe. Fix available here.

tags | exploit, overflow, shellcode
systems | windows
SHA-256 | 596e8d32292e00213f89d2811227c7e70b98b19be3b42189a13ad01d3f5aa08f
Itadem-1.01.zip
Posted Jun 3, 2002
Authored by Itadem

Itadem Trojan v1.1 is a small trojan controlled by a web browser. Archive password is set to p4ssw0rd. Use at your own risk.

Changes: Now supports renaming of server, added some other functions & fixed some bugs.
tags | web, trojan
SHA-256 | 47617222232591d37c6d295c98d14336c69f1933fef69af6ff79b870919d5754
openssl-0.9.6d.tar.gz
Posted Jun 3, 2002
Authored by The OpenSSL Team | Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Minor bug fixes.
tags | encryption, protocol
SHA-256 | 091a1a460c3facb06cc3d8994660db1e1705131ba03e4bc017fdd8c23aa2d20f
darkstat-1.3.tar.gz
Posted Jun 3, 2002
Site members.optushome.com.au

Darkstat is an ntop-workalike network statistics gatherer. Built to be faster and smaller than ntop, it uses libpcap to capture network traffic and serves up Web page reports of statistics such as data transferred by host, port, and protocol. It also has a neat bandwidth usage graph.

Changes: The Web interface can now be bound to any local IP address, using a command-line parameter. A rare segfault in host report sorting has been fixed. Internationalization support has been added.
tags | tool, web, sniffer, protocol
SHA-256 | 259d363b560ae3fb9e63fe6f6bc13149d8727ba71f7c8f381f5ba3a481983baa
firestorm-0.4.3.tar.gz
Posted Jun 3, 2002
Site scaramanga.co.uk

Firestorm is an extremely high performance network intrusion detection system (NIDS). Right now it is just a sensor but there are plans are to include real support for analysis, reporting, remote console, and on-the-fly sensor configuration. It is fully pluggable and hence extremely flexible.

Changes: Lots of bugs have been fixed. An 802.1q (VLAN) decode plugin has been added.
tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 229ff0fbaf8f7f56b18c9ec3c9d898f4658977c517b13b149e4ea93c39f4c147
Openwall Linux Kernel Patch
Posted Jun 3, 2002
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security "hardening" features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: Updated for Linux 2.2.21. Permissions on /proc entries have been changed to be consistent with Linux 2.4.18-ow0, and the getcwd(2) instance of the d_path() truncation problem and the fsuid/fsgid handling inconsistency have been fixed.
tags | overflow, kernel
systems | linux
SHA-256 | a2a533a4d8f7adba193ff7a7df1163b538c95bd8fb6048e91973590e2c4726db
Samhain File Integrity Checker
Posted Jun 3, 2002
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.

Changes: Fixes some bugs introduced with new features in version 1.5.0.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 7ef4c7c226f0859ea7fc4857508580b10666c13fdb7c7ef8727ce4c4db8646e9
hap-linux-2.2.21-1.diff.gz
Posted Jun 3, 2002
Authored by Hank Leininger | Site TheAIMSGroup.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: This release has been synchronized with kernel 2.2.21 and Openwall 2.2.21-1.
tags | root, patch
systems | linux, unix
SHA-256 | 58508fba90c8d918ac8566e635b8f317ad02aacbff916ed80bef5c55e066a163
motion-3.0.0.tar.gz
Posted Jun 3, 2002
Authored by Jeroen Vreeken | Site motion.technolust.cx

Motion uses a video4linux device for detecting movement. It makes snapshots of the movement which later will be converted to MPEG movies, making it useful as an observation or security system. It can send out email and SMS messages when detecting motion.

Changes: This release is fully threaded, enabling capture of multiple inputs from the same video device and capturing from multiple devices (plus various combinations). Added PostgreSQL support. Now capable of using ffmpeg to make real-time MPEG movies. There is a new time lapse option and various other enhancements.
systems | linux
SHA-256 | 2973ebd7d9483e9a9e0089d70bbd34b48d7783e269a3dfa37fd825c3804a0165
smtprc-0.9.3b.tgz
Posted Jun 3, 2002
Site sourceforge.net

SmtpRC is a fully configurable, multithreaded open mail relay scanner which supports scanning of IP blocks and can print the results to a Web page. It is intended for Systems Administrators to check IP blocks under their control.

Changes: Added a new feature to display scan results in machine readable format. Changed all HTML output to XHTML, and fixed several bugs that were causing problems with the HTML output formatting.
tags | web
systems | unix
SHA-256 | 74aa240f24e78e625cc0b627e63705dd294da7108fae76e76a4967064c829ee7
umpf.tar.gz
Posted Jun 3, 2002
Authored by s0ftpj, vecna | Site s0ftpj.org

Umpf is a system for managing encrypted files without using encrypted filesystems such as cfs/tcfs loop-aes/kerneli. Does not require root to run, is lightweight, and transparent.

tags | root
SHA-256 | 3aad55bb1c34d97b342fdc0a9b37279257a60a4cbdf3c450c433f6d11856d3c9
lsat-0.5.7.tgz
Posted Jun 3, 2002
Site dimlight.org

Linux Security Auditing Tool (LSAT) is a post install security auditing tool. It is modular in design, so new features can be added quickly. It checks inetd entries and looks for unneeded RPM packages. It is being expanded to work with Linux distributions other than Red Hat, and checks for kernel versions.

Changes: Fixed checkinetd (even under Red Hat 7.3), checkftpusers, and a symlink attack in checkfiles.
tags | kernel
systems | linux, redhat
SHA-256 | c668ce057dbed5c1588785c4508cff4332d9d2c971c1e9184024ee489736e792
ipsorc-1.6.5.tar.gz
Posted Jun 3, 2002
Site legions.org

IP Sorcery is a TCPIP packet generator which allows you to send TCP, UDP, and ICMP packets with a GTK+ interface.

Changes: OSPF format packet support has been added. RIP has been added to the HOWTO. Bugs were fixed.
tags | udp, tcp
systems | unix
SHA-256 | facd91a81669d700e5622ef495f5237f1cabebd5a7cd0e634feb6c32e5a9f04f
mimedefang-2.13.tar.gz
Posted Jun 3, 2002
Authored by Dianne Skoll | Site roaringpenguin.com

MIME Defanger is a flexible MIME e-mail scanner designed to protect Windows clients from viruses and other harmful executables. It works with Sendmail 8.11 / 8.12's "milter" API and will alter or delete various parts of a MIME message according to a flexible configuration file.

Changes: Default filter has improved filename matching which should yield fewer false alarms. Support was added for the F-Risk F-Prot virus scanner. The -U option drops privileges sooner - you may have to change your Sendmail configuration file.
systems | windows, unix
SHA-256 | a6f50ac4351088af61b7c2a974f2dc5299281c8a015a4d48c66d469f68f9c510
fenris-0.06.tgz
Posted Jun 3, 2002
Authored by Michal Zalewski | Site razor.bindview.com

Fenris is a multipurpose tracer, stateful analyzer and partial decompiler intended to simplify bug tracking, security audits, code, algorithm, protocol analysis and computer forensics by providing a structural program trace, general information about internal constructions, execution path, memory operations, I/O, conditional expression info, and much more. A small demonstration how this tool works can be found here.

Changes: GUI is now stable. There are several bugfixes, efficiency improvements, anti-debugging trap detection, better blocking syscall handling, and many more features.
tags | protocol
SHA-256 | 0505286f46a92eb98b135d52dc93d6949ecd18418ec1911d8d5d74825a2b4099
xscreensaver-4.04.2.tar.gz
Posted Jun 3, 2002
Authored by Jamie Zawinski | Site jwz.org

XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. It is also more stable than xlock and has more than 150 modes.

Changes: Added support for GTK/GNOME 2.x, the new hacks lavalite, queens, and anemone. Image loading no longer relies on external programs (xloadimage, etc). Webcollage no longer generates a lot of 404s and can now be used in conjunction with Driftnet to display images snooped from your local ethernet.
tags | root
systems | unix
SHA-256 | 66257344f187978a5f7d46bed6b57d6074288f0ed714094c1f5f5392f27c9247
cheops-ng-0.1.6.tgz
Posted Jun 3, 2002
Site cheops-ng.sourceforge.net

Cheops-ng is a graphical network management tool for mapping and monitoring your network. It has host/network discovery functionality, OS detection, and it also does a port scan of each computer to tell what services are running, so you can use or administer them.

tags | tool, scanner
systems | unix
SHA-256 | 8489b692fad2d019b1956801878c215f7c87fa10be5c51d375c0c245297a2a8b
incident-2.2.tar.gz
Posted Jun 3, 2002
Site cse.fau.edu

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: Whois.abuse.net is now queried for contacts. An option to not ignore 'Received:' lines in the input has been added.
tags | tool, remote, sniffer
SHA-256 | 33dce30ea53feca0860465757a1efa519ec41ab2990858f0d079760a48c366a2
ftester-0.7.tar.gz
Posted Jun 3, 2002
Authored by Andrea Barisani

The Firewall Tester consists of two perl scripts, the client part (ftest) and the listening sniffer (ftestd). The client injects custom marked packets, while the sniffer listens for them. The comparison of the script's log files permit the detection of filtered packets and consequently filtering rules if the two scripts are ran on different sides of a firewall. An IDS (Intrusion Detection System) testing feature is also available and snort rule definition file can parsed instead of the standard configuration syntax, ftest can also use common IDS evasion techniques. Stateful inspection firewall and IDS can be handled by the 'connection spoofing' option. CHANGES: Added fragmentation option, added option for specifying IP fragments and TCP segments numbers and size, added fragmentation related evasion techniques, extended syntax now works also for connection spoofing modes, various bugfixes, see Changelog for details. Requires: Net::RawIP, Net::PcapUtils, NetPacket.

tags | tool, perl, spoof, tcp, firewall
systems | unix
SHA-256 | b2e9999f056aca95a6a0edfcd1725b49f7add378b94d6548842ebf084f419695
libfmtb-0.3.tgz
Posted Jun 3, 2002
Authored by Frederic Raynal | Site minimum.inria.fr

Libfmtb v0.3 is a library with lots of functions for easily exploiting local and remote format string vulnerabilities.

tags | remote, local, vulnerability, library
SHA-256 | 75cb87287ef8777dfe7fccd084fd8a318fd10c069624afe34f229bf59951117e
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close