what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2002-12-15

Posted Dec 15, 2002
Site plasmahh.free-bsd.org

SMTP map uses fingerprinting to scan for the version of SMTP server software which is running on a machine.

Changes: This release adds some bugfixes and internal preparation for more protocols like POP3 and IMAP4.
tags | tool, scanner
systems | unix
SHA-256 | fcf9afa36d3a1e2accd4efd30a8b63a168d372cfdcc4557b443f9f0b780b503b
Posted Dec 15, 2002
Authored by Pedram Amini | Site pedram.redhive.com

Dnshijacker v1.3 is a libnet/libpcap based DNS sniffer/spoofer. A versatile tool, it supports tcpdump-style filters that allow you to specifically target victims. DNS answers are forged based on entries in a 'fabrication table' or by simply forging one answer to all requests. DNS Hijacker is an excellent tool for blocking and removing advertisements at the network level. The package comes with a default rule file for blocking about 780 known ad servers, as well as instructions on how to incorporate with RRDTool for ad blocking statistics generation. Archived prank: here. Future versions will be ported to use Libnet 1.1.0.

systems | unix
SHA-256 | 4040cb211860bec4dd43af09e157da25ebd20189d35884c11639d281ef7cd16a
Posted Dec 15, 2002
Authored by Thomas Lundquist | Site zelow.no

Floppyfw is a router and firewall on one floppy disk. It uses Linux basic firewall capabilities, and has a simple packaging system. It is ideal for masquerading and securing networks on ADSL and cable lines, using static IP, DHCP, and PPPoE. Installation involves editing of only one file on the floppy.

Changes: New stable release which includes kernel 2.2.23.
tags | tool, firewall
systems | linux
SHA-256 | c9d84925342881f9d180cb00e5e0f9e349a16a4960a038a2120ce5d0e89e78c5
Posted Dec 15, 2002
Site webkreator.com

Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads.

Changes: Selective filtering has been introduced. You can now filter requests based on the contents of individual variables (HTTP headers, environment variables, and individual script arguments) coming either from GET or POST.
tags | web
SHA-256 | 4d45450773939db6dca6056dad88a34d0932f9d82ee354d101155e92083157de
Posted Dec 15, 2002
Authored by Mike Ricketts | Site earth.li

SendIP is a commandline tool to send arbitrary IP packets. It has a large number of command line options to specify the content of every header of a RIP, RIPng, BGP, TCP, UDP, ICMP, or raw IPv4/IPv6 packet. It also allows any data to be added to the packet. Checksums can be calculated automatically, but if you wish to send out wrong checksums, that is supported too.

Changes: SendIP now compiles on architectures requiring alignment. A minor bug which occurred when attempting to load the same module many times was fixed. ripng.so now conforms more closely to the specification.
tags | tool, arbitrary, udp, tcp
systems | unix
SHA-256 | f39a533fe455e12decaca426dbdb8a1381e15957767d6bc9405c6418553104bf
Posted Dec 15, 2002
Site sourceforge.net

Tcpreplay v1.3 - Tcpreplay is a set of tools aimed at testing the performance of a NIDS by replaying real background network traffic in which to hide attacks. Tcpreplay allows you to control the speed at which the traffic is replayed, and can replay arbitrary tcpdump traces. Unlike programmatically-generated artificial traffic which doesn't exercise the application/protocol inspection that a NIDS performs, and doesn't reproduce the real-world anomalies that appear on production networks (asymmetric routes, traffic bursts/lulls, fragmentation, retransmissions, etc.), tcpreplay allows for exact replication of real traffic seen on real networks.

Changes: This stable release includes numerous bugfixes and feature enhancements, and all users are encouraged to upgrade.
tags | tool, arbitrary, protocol, intrusion detection
systems | unix
SHA-256 | a1b60f3a733858855133529bde413965f2d6db81ee81f256f5eeda38a92f98c9
Posted Dec 15, 2002
Authored by Jeroen Vreeken | Site motion.technolust.cx

Motion uses a video4linux device for detecting movement. It makes snapshots of the movement which later will be converted to MPEG movies, making it useful as an observation or security system. It can send out email and SMS messages when detecting motion and includes a web interface.

Changes: New stable release - Changelog available here.
tags | web
systems | linux
SHA-256 | 04828ac21f6f4cc514215852af2b4354eaab8b0bc7ec2ac84b9b387bb91daf6f
Posted Dec 15, 2002
Site freshmeat.net

Process Monitor v0.23 for Linux is a small kernel module that allows you to watch all programs executed on the system. It is useful for generating full listings of programs (and their supplied arguments) run by potentially dangerous users on a system.

Changes: A fix for a bug which could cause an entire system to hang under very heavy loads.
tags | kernel
systems | linux
SHA-256 | 925ec438e183031f4d96030d9759a85aefd0c33c7d5dd0ef3b2c6cce26c34756
Page 1 of 1

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By