what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2003-11-24

istumbler-83.tgz
Posted Nov 24, 2003
Authored by Alf Watt | Site istumbler.net

iStumbler is a small Mac OS/X utility for finding 802.11b & 802.11g wireless networks and services which combines a compact Aqua user interface with advanced wireless scanning and reporting. Changelog available here.

tags | tool, wireless
systems | apple, osx
SHA-256 | 9717b5735caccd871ac7f83ed12f297276254c0067212d563fc91a0098b45d16
renattach-1.2.0rc3.tar.gz
Posted Nov 24, 2003
Site pc-tools.net

RenAttach is an e-mail filter/processor which runs from a user's .forward file. It is designed to protect end users (particularly those using Windows) from malicious e-mail attachments. It does not scan specifically for viruses, but rather renames e-mail attachments so that they can not be accidentally executed. It handles both UUencoded and MIME-encoded attachments. It can be used from within sendmail, postfix, procmail, or pretty much anywhere else.

Changes: A man page has been created and Sendmail compatibility has been tested and documented in the INSTALL file. The badlist format was enhanced to allow specific filtering actions to override the defaults.
systems | windows, unix
SHA-256 | 1875644598f77e47fd86ef288760ac7a010790ba300a9a7c28bab23166764942
honeyd-0.7.tar.gz
Posted Nov 24, 2003
Authored by Niels Provos | Site citi.umich.edu

Honeyd is a small daemon that creates virtual honey pot hosts on a network. The hosts can be configured to run arbitrary services, and their TCP personality can be adapted so that they appear to be running certain versions of operating systems. Any type of service on the virtual machine can be simulated according to a simple configuration file. Instead of simulating a service, it is also possible to proxy it to another machine.

Changes: Includes a whole bunch of new features, including dynamic templates that allow the honeypots to adapt based on the operating system and source IP addresses of the adversary, passive fingerprinting that allows the identification of the remote host, a tarpit to slow down spammers, and many bugfixes.
tags | tool, arbitrary, tcp, intrusion detection
systems | unix
SHA-256 | 752ffaa91edf7b6d3a3a7144524b694b63f6f190d37e45ff22d3581a43dd61fa
afv0.5.tar.gz
Posted Nov 24, 2003
Authored by jeremian | Site freshmeat.net

Active port forwarder is designed for people without an external IP who want to make some services available on the Internet. afserver is placed on the machine with a publicly accessible address, and afclient is placed on the machine behind a firewall or masquerade. This makes the second machine visible to the Internet. Running afserver does not require root privileges, nor does it use threads or other processes. Uses SSL for secure packet tunneling.

Changes: This is the first release - There are no known major bugs.
tags | root
systems | unix
SHA-256 | 8fdf415f846fb9070d51705ddbad66a9fb1bfc3cdcd17c0f26c97883aadd1750
mimedefang-2.39.tar.gz
Posted Nov 24, 2003
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: The multiplexor can be compiled with an embedded Perl interpreter, making starting a slave much cheaper, and allows for more shared memory between slaves. A few bugs were fixed.
systems | windows, unix
SHA-256 | 5fa56ea6d079f6b8aefbd36ef56fb696b7a521de69d8467e63d5ded8624ccfe9
knetfilter-3.1.4.tar.gz
Posted Nov 24, 2003
Site expansa.sns.it

Knetfilter is a KDE frontend to iptables which is used with Linux 2.4 to manage the functionality of netfilter. Knetfilter lets you set up most common firewall configurations, as well as perform more sophisticated management of a complex firewall. It's also possible to use an integrated interface to tcpdump and nmap. Screenshot available here.

Changes: Now compiles with gcc 3.3.2!
tags | tool, firewall
systems | linux
SHA-256 | ee5848f94c5b222043c92072a298a2ed8cfa9ec2313faae6e771a5c53256aa99
tcptrack-1.0.0.tar.gz
Posted Nov 24, 2003
Authored by Steve Benson | Site rhythm.cx

tcptrack is a packet sniffer which passively watches for connections on a specified network interface, tracking their states and listing them in a manner similar to the top command. It displays source and destination addresses and ports, connection state, idle time, and bandwidth usage. Screenshot available here.

tags | tool, sniffer
SHA-256 | 978cf9ed3cc1cfe2321cb1be45b0261c60bcc473b1e2b60f24ed6916ac6cf7ea
Firewall Builder With GUI
Posted Nov 24, 2003
Site fwbuilder.org

Firewall Builder consists of object-oriented GUI and set of policy compilers for various firewall platforms. In Firewall Builder, firewall policy is a set of rules, each rule consists of abstract objects which represent real network objects and services (hosts, routers, firewalls, networks, protocols). Firewall Builder helps user maintain database of objects and allows policy editing using simple drag-and-drop operations. Firewall Builder can be used to manage firewalls built on variety of platforms including, but not limited to, Linux running iptables and FreeBSD or Solaris running ipfilter.

tags | tool, firewall, protocol
systems | linux, solaris, freebsd
SHA-256 | e6f4477fc29afca3a53fc0c40fea3b1339c9b157eb9329bd7e077048df65d361
ficc-1.2.tar.gz
Posted Nov 24, 2003
Authored by Terry Ott | Site firsttracks.net

File Integrity Command & Control (FICC) helps system administrators manage multiple Tripwire installations across their network. It maintains MD5 hashes for the three key Tripwire files (the config file, executable, and TW database) for every system it monitors. It retrieves these key files from each system via SCP and compares the computed signature against the signatures in the FICC signature database. If all three signatures match the database, FICC then connects to the host via SSH and runs Tripwire.

Changes: The "quick_check" option for hosts was added, allowing FICC to download only the MD5 executable for the target host. If the checksum of the remote MD5 executable is unchanged, FICC then runs the remote MD5 executable on the remaining files (the Tripwire executable, database, and config file), dramatically reducing bandwidth usage and runtime.
tags | tool, intrusion detection
systems | unix
SHA-256 | 7890a4b49fe0b512ba7c714a5221513a2293b4036a20831ad7fb4ad9545baf4f
stunnel-4.04.tar.gz
Posted Nov 24, 2003
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.

Changes: Stunnel 4.03 and earlier does not properly handle SIGCHLD signals safely, allowing remote users to hijack the service.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | b7e937734dfc93527e05a6daf2a54da538c3d6ab050a2ade35b56ab16cec7791
stunnel-3.26.tar.gz
Posted Nov 24, 2003
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.

Changes: Stunnel 3.24 and earlier (as well as 4.0x x<4) does not properly handle SIGCHLD signals safely, allowing remote users to hijack the service.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | d2a55b089d46d14bc4b456bb1927303492dab6649867c67a005d2c9d1ededfb3
oC-zlib.c
Posted Nov 24, 2003
Authored by Dcryptr | Site crionized.net

Zlib gzprintf() proof-of-concept buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 526b27a79eccef0155d5959f4134946835d3f413dd6d008aa45c728ec96c60bd
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close