what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2003-12-14

Posted Dec 14, 2003
Site enforcer.sourceforge.net

Enforcer is a Linux security module designed to help improve integrity by providing a subset of Tripwire-like functionality with a LKM. It runs continuously and as each protected file is opened its SHA1 is calculated and compared to a previously stored value. The Enforcer can integrate with TCPA hardware to provide a secure boot when booted with a TCPA enabled boot loader.

Changes: This release only works with 2.6+ because updates were made to take advantage of Linux 2.6+ kernel features such as native kernel crypto and the new build system. Some bugs were squashed, and some features were added. A user-space helper was written to mount an encrypted loopback filesystem where the encryption key is the secret protected by the TPM. Some stand alone programs that implement TCPA functions such as MakeIdentity, CertifyKey, etc. were written.
systems | linux
SHA-256 | bbd2015e518721f899c0b5986b3b476ce5516d4bd926e089ae588f3a3f9213b7
Posted Dec 14, 2003
Site backerstreet.com

REC is a portable reverse engineering decompiler which reads an executable file and attempts to produce a C-like representation of the code and data used to build it. It can decompile 386, 68k, PowerPC, and MIPS R3000 programs and recognizes the following file formats: ELF (System V Rel. 4, e.g. Linux, Solaris, etc.), COFF (System V Rel. 3.x, e.g. SCO), PE (Win32 .EXE and .DLL for Microsoft Windows 95 and NT), AOUT (BSD derivatives, e.g. SunOS 4.x), Playstation PS-X (MIPS target only), and raw binary data (via .cmd files).

systems | linux, windows, solaris, bsd
SHA-256 | 3f8f4c802b33352fe0114bbf7758d4f5510b3e435824539cf8b5a73eb0162a87
Posted Dec 14, 2003
Site nopcode.org

Wistumbler2 is a network stumbler for WaveLAN/IEEE wireless networking. Supports GTK2 and console modes. Includes speaker beeps similar to windows stumbler.

Changes: Log-saving on the fly is now allowed. Some GPS pointers that caused segfaults were patched.
tags | tool, wireless
systems | windows
SHA-256 | b91062aa528a1167ac7b1bafb83ac0e952deefdcb416157fbe971729f988fea3
Posted Dec 14, 2003
Site netdude.sourceforge.net

Netdude is the NETwork DUmp data Displayer and Editor for tcpdump tracefiles. It is a GUI-based tool that allows you to make detailed changes to packets in tcpdump tracefiles. It can set the value of every field in IP, TCP, and UDP packet headers, copy, move, and delete packets in the tracefile, and fragment and reassemble IP packets. Netdude addresses the need for a tool that allows developers of networking code to easily create specific traffic patterns in order to test features of their software. Tested on Linux and FreeBSD.

Changes: Minor fixes and an update to libnetdude.
tags | tool, udp, sniffer, tcp
systems | linux, freebsd
SHA-256 | 7f1085df99de995a11a9e0f62fb5a9f8991d37ed5a51e51308d402b98383e6db
Posted Dec 14, 2003
Authored by fred | Site lepied.com

Login Anomaly Detection System (LADS) detects anomalies in logins and logouts and can perform various actions in response.

Changes: Fixes a bug in IP address reporting and a bug that prevented correct logging.
tags | tool, intrusion detection
systems | unix
SHA-256 | d2dd213fb0ebc64e75f230b31d4d8fe6d649ad13d69b52918f87ea09f78c7710
Posted Dec 14, 2003
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: A new directive (exclude_suffix) has been added, the tk interface has been improved with a progress bar, and some bugs have been repaired.
tags | tool, integrity
systems | windows, unix
SHA-256 | 29bd843065eb80f97412ba332da5f2b486df98084b60b42a6a3c0686998ac39e
Posted Dec 14, 2003
Authored by Konrad Rieck | Site roqe.org

Stream Analyzer is a console application which analyses binary streams and calculates useful statistical information from the observed data which features mathematical, pattern, and bit analysis. It has been designed as a "Swiss-army-knife" for initial steps in reverse engineering and cryptographic analysis.

Changes: Code and documentation have been polished and unneeded sections from previous years have been removed.
tags | encryption
SHA-256 | 8e94b31d3df053835db88145966cd411826430ec29870f1c0031387ccbc9745c
Posted Dec 14, 2003
Authored by fris | Site dreambigmedia.com

How to find Cart32 Sites with google.com.

tags | paper
SHA-256 | 6d2dafb695fac4ed8c9dec44e7d126334f0eedd89347451338dae80c99c157a3
Posted Dec 14, 2003
Authored by Steve Benson | Site rhythm.cx

tcptrack is a packet sniffer which passively watches for connections on a specified network interface, tracking their states and listing them in a manner similar to the top command. It displays source and destination addresses and ports, connection state, idle time, and bandwidth usage. Screenshot available here.

Changes: Fixed compile problems with GCC and on Solaris.
tags | tool, sniffer
SHA-256 | 158a701b19d994f75611be11e9a0049a504d66d5bb8d877f9deafb57410bd5d1
Posted Dec 14, 2003
Site modsecurity.org

Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.

Changes: A bug in the Apache 2 version that would confuse PHP has been fixed and another bug causing the "nolog" action to not prevent the request from being logged to the audit log has been fixed.
tags | web
SHA-256 | d71a01b4444fe6b454b0fbb39a0c4695069b9bbca5c5c562a32c611606d18eb2
Posted Dec 14, 2003
Authored by Cowboy, 0x333 | Site 0x333.org

Maelstrom local exploit that gives gid for user games making use of the overflow found in the -server switch. Tested against /usr/bin/Maelstrom on Red Hat 9.0

tags | exploit, overflow, local
systems | linux, redhat
SHA-256 | d35fbfa93b97946227f3f1032375023f8f6aba52ebed8a946e94bfbe4648d811
Page 1 of 1

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    14 Files
  • 7
    Dec 7th
    24 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By