Twenty Year Anniversary
Showing 1 - 11 of 11 RSS Feed

Files Date: 2003-12-14

Posted Dec 14, 2003

Enforcer is a Linux security module designed to help improve integrity by providing a subset of Tripwire-like functionality with a LKM. It runs continuously and as each protected file is opened its SHA1 is calculated and compared to a previously stored value. The Enforcer can integrate with TCPA hardware to provide a secure boot when booted with a TCPA enabled boot loader.

Changes: This release only works with 2.6+ because updates were made to take advantage of Linux 2.6+ kernel features such as native kernel crypto and the new build system. Some bugs were squashed, and some features were added. A user-space helper was written to mount an encrypted loopback filesystem where the encryption key is the secret protected by the TPM. Some stand alone programs that implement TCPA functions such as MakeIdentity, CertifyKey, etc. were written.
systems | linux
MD5 | bfb914e98cf37292ffa871337b3f58f2
Posted Dec 14, 2003

REC is a portable reverse engineering decompiler which reads an executable file and attempts to produce a C-like representation of the code and data used to build it. It can decompile 386, 68k, PowerPC, and MIPS R3000 programs and recognizes the following file formats: ELF (System V Rel. 4, e.g. Linux, Solaris, etc.), COFF (System V Rel. 3.x, e.g. SCO), PE (Win32 .EXE and .DLL for Microsoft Windows 95 and NT), AOUT (BSD derivatives, e.g. SunOS 4.x), Playstation PS-X (MIPS target only), and raw binary data (via .cmd files).

systems | linux, windows, 9x, solaris, bsd, 32
MD5 | a347303252e10cba03e8f0d29d91d33d
Posted Dec 14, 2003

Wistumbler2 is a network stumbler for WaveLAN/IEEE wireless networking. Supports GTK2 and console modes. Includes speaker beeps similar to windows stumbler.

Changes: Log-saving on the fly is now allowed. Some GPS pointers that caused segfaults were patched.
tags | tool, wireless
systems | windows
MD5 | 922da338af586c24d81cdd87b2020c0e
Posted Dec 14, 2003

Netdude is the NETwork DUmp data Displayer and Editor for tcpdump tracefiles. It is a GUI-based tool that allows you to make detailed changes to packets in tcpdump tracefiles. It can set the value of every field in IP, TCP, and UDP packet headers, copy, move, and delete packets in the tracefile, and fragment and reassemble IP packets. Netdude addresses the need for a tool that allows developers of networking code to easily create specific traffic patterns in order to test features of their software. Tested on Linux and FreeBSD.

Changes: Minor fixes and an update to libnetdude.
tags | tool, udp, sniffer, tcp
systems | linux, freebsd
MD5 | b7cf1b90929ea4395c6237997f5bc6cf
Posted Dec 14, 2003
Authored by fred | Site

Login Anomaly Detection System (LADS) detects anomalies in logins and logouts and can perform various actions in response.

Changes: Fixes a bug in IP address reporting and a bug that prevented correct logging.
tags | tool, intrusion detection
systems | unix
MD5 | 0908e52ffc65a6fa16b7906b60dd2908
Posted Dec 14, 2003
Authored by Eric Gerbier | Site

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: A new directive (exclude_suffix) has been added, the tk interface has been improved with a progress bar, and some bugs have been repaired.
tags | tool, integrity
systems | windows, unix
MD5 | 6a4d9f9ab657e5132ab4bcf06a0199ae
Posted Dec 14, 2003
Authored by Konrad Rieck | Site

Stream Analyzer is a console application which analyses binary streams and calculates useful statistical information from the observed data which features mathematical, pattern, and bit analysis. It has been designed as a "Swiss-army-knife" for initial steps in reverse engineering and cryptographic analysis.

Changes: Code and documentation have been polished and unneeded sections from previous years have been removed.
tags | encryption
MD5 | 42069a002bac3d7004e11faec2e377d1
Posted Dec 14, 2003
Authored by fris | Site

How to find Cart32 Sites with

tags | paper
MD5 | 6600df331c4d0133197e24c8d9ad5f46
Posted Dec 14, 2003
Authored by Steve Benson | Site

tcptrack is a packet sniffer which passively watches for connections on a specified network interface, tracking their states and listing them in a manner similar to the top command. It displays source and destination addresses and ports, connection state, idle time, and bandwidth usage. Screenshot available here.

Changes: Fixed compile problems with GCC and on Solaris.
tags | tool, sniffer
MD5 | a661a8a53558c2b72189151e6e992153
Posted Dec 14, 2003

Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.

Changes: A bug in the Apache 2 version that would confuse PHP has been fixed and another bug causing the "nolog" action to not prevent the request from being logged to the audit log has been fixed.
tags | web
MD5 | 629945812ca7aab4ef2f76ad00172444
Posted Dec 14, 2003
Authored by Cowboy, 0x333 | Site

Maelstrom local exploit that gives gid for user games making use of the overflow found in the -server switch. Tested against /usr/bin/Maelstrom on Red Hat 9.0

tags | exploit, overflow, local
systems | linux, redhat
MD5 | a935d6a8cc4501c955311239727e64af
Page 1 of 1

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    45 Files
  • 16
    Nov 16th
    11 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By