what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2002-10-01

lcrzoex-4.15-src.tgz
Posted Oct 1, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: Bugs fixed.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | a03f7f6f74c7988b37fef255789605381b0369b5b79b43b9645a1aa255f0a735
Firewall Builder With GUI
Posted Oct 1, 2002
Site fwbuilder.org

Firewall Builder consists of object-oriented GUI and set of policy compilers for various firewall platforms. In Firewall Builder, firewall policy is a set of rules, each rule consists of abstract objects which represent real network objects and services (hosts, routers, firewalls, networks, protocols). Firewall Builder helps user maintain database of objects and allows policy editing using simple drag-and-drop operations. Firewall Builder can be used to manage firewalls built on variety of platforms including, but not limited to, Linux running iptables and FreeBSD or Solaris running ipfilter.

tags | tool, firewall, protocol
systems | linux, solaris, freebsd
SHA-256 | 7472d8b561d8e35156b48704209672df84c19ff6aad52591c42cdad22c8e046b
logrep-1.1.4.zip
Posted Oct 1, 2002
Site logrep.sourceforge.net

Logrep is a framework for extraction and presentation of information from several kinds of logfiles. Currently Snort, Squid, Postfix, Apache, Trend Micro VirusWall, and Microsoft IIS are supported. Includes HTML reports, 2D analysis, overview page, secure communication, and bar charts.

Changes: Made you all a new module for NT Eventlogs. Links for 2D analysis are more available.
tags | system logging
systems | unix
SHA-256 | db7158e3999e4608a14594f8a38de73b7e7a6e2828aa60cf853690f013f4ac12
RNmap 0.9
Posted Oct 1, 2002
Authored by Tuomo Makinen | Site sourceforge.net

Remote Nmap is a python client/server package which allows many authorized clients to connect to a centralized nmap server to do their port scanning. This could be useful for security companies who want to have all their scans come from a dedicated machine.

Changes: Added some support for new PyCrypto alpha versions and a fix for a bug which occurred when public-key in .rnmap.keys was corrupted. Made some repairs to rnmapd to ensure that all data will be sent to clients.
tags | tool, remote, nmap, python
systems | unix
SHA-256 | 798fd10227d78a79edf741845aaff45cb41f9c614981e41ba8090876bc719954
idefense.gv.txt
Posted Oct 1, 2002
Authored by Zen-Parse, David Endler | Site idefense.com

iDEFENSE Security Advisory 09.26.2002 - A buffer overflow has been found in gv v3.5. Some mail readers use GV to view pdf's. Other programs that utilize derivatives of gv, such as ggv or kghostview, may also be vulnerable in similar ways.

tags | overflow
SHA-256 | 6e40ecf0cfebaaf7f097fc7f92ba1a5e5282232ee987360efc0149e83a106f35
gv-exploit.pdf
Posted Oct 1, 2002
Authored by Zen-Parse | Site idefense.com

Buffer overflow exploit for gv v3.5.8 on linux which creates the file /tmp/itworked when gv opens the PDF. Some mail readers use GV to view pdf's. Tested on Red Hat 7.3.

tags | exploit, overflow
systems | linux, redhat
SHA-256 | 17584573625605cf365839d42b6249b81ab8189d3e8207c905c43574b0b985ef
wireless_sec.txt
Posted Oct 1, 2002
Authored by Danny | Site ebcvg.com

This is an article on wireless hacking which deals with WLAN's and Frames.

tags | tool, wireless
SHA-256 | 1c6b3556f9e4aad925ffe6ebc7b2655c5f8833ea9632d1c9c03cea6e5e216bfd
idefense.wnserver.txt
Posted Oct 1, 2002
Authored by jaguar, David Endler

iDEFENSE Security Advisory 09.30.200 - WN Server v1.18.2 through 2.0.0 are susceptible to remote exploitation of a buffer overflow that an attacker could cause arbitrary code execution under the privileges of the targeted server by issuing WN Server a long GET request. In order to successfully exploit this vulnerability, customized shell code is required to bypass the character filtering that WN Server imposes on the requested URI. Fix available here.

tags | remote, overflow, arbitrary, shell, code execution
SHA-256 | 8772acabc5a220150fee7559f9a705826f25db74d9483f93096f2f63ce078d3e
ipa-1.2.8.tar.gz
Posted Oct 1, 2002
Site simon.org.ua

IPA is highly configurable IP accounting software for Free and Open BSD. It allows to make IP accounting based on IP Firewall and/or IP Filter accounting rules. In most cases IP Accounting Daemon is run on public servers, software routers, etc. It uses powerful IP Firewall and/or IP Filter accounting rules and based on its configuration allows to escape from writing scripts to manage network accounting.

Changes: The code was revised and it now tests directories and files in the database more carefully. The "acl", "db_owner", and "db_perm" configuration parameters have been removed, and "db_group" was added.
systems | unix, bsd
SHA-256 | 66c10d2a27b6adfb0c183a2cb0f5fa81a7732549ee0135d1abc537335ddccac7
ipac-ng-1.24.tar.gz
Posted Oct 1, 2002
Site sourceforge.net

IP Accounter is an IP accounting package for Linux. It collects, summarizes, and nicely displays IP accounting data. Its output can be a simple ASCII table, or graph images. Ipchains and iptables are supported. Logs are stored in files, gdbm, or even a PostgreSQL database.

Changes: The Ipac-ng-suse-8 howto was added and files have been corrected to plain-file in ipac.conf. Spooling was repaired. A segfault with bad configs got fixed.
systems | linux
SHA-256 | ad51aa5a1b8ab2d2b0849cf45e84f103456d31c6cf08a1d0aa29f4190b8851bb
pmids-1.6.tar.gz
Posted Oct 1, 2002
Authored by Redox | Site autosec.sourceforge.net

Poor Mans IDS is a couple of scripts which check certain files on your host (any you like) for changes in content, ownership, and mode. Rather than only mailing if something is wrong (like other IDSs), this lean IDS will send you a daily (or weekly or hourly, depending on how you set-up your cron job) security audit, containing details of what it found.

Changes: A GPG bug and grabbing of md5 sigs from the website have been repaired.
tags | tool, intrusion detection
systems | unix
SHA-256 | a378a6338cf70225094a4db783161ff5ebf530f0019fcd6ed9b34099c248e983
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close