exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2004-06-08

garuda-0.1.0.tgz
Posted Jun 8, 2004
Authored by Seunghyun Seo | Site garuda.sourceforge.net

Garuda is a wireless intrusion detection system (WIDS). It has been designed for detecting war drivers, rogue APs, denial of service attacks, and even MAC spoofing. Rule-based detection, statistics, and enumeration modules included.

tags | tool, denial of service, spoof, wireless
SHA-256 | 91b1fbcc60a57ba0341d54ffc12fb409bf01bbd9436e702f1a0feea63f4f9185
keychain-2.3.1.tar.bz2
Posted Jun 8, 2004
Authored by Daniel Robbins | Site gentoo.org

keychain is a utility that helps manage ssh keys in a convenient and secure manner. It acts as a frontend to ssh-agent, but allows the user to easily have one long running ssh-agent process per system, rather than the norm of one ssh-agent per login session. It also makes it easy for remote cron jobs to securely hook-in to a long running ssh-agent process, allowing your scripts to take advantage of key-based logins.

tags | remote, encryption
SHA-256 | 8aa407cbade370b5c1095feec46679006731bc1317ae0aeb00e49b931cd3286e
sid-0.3.5.tar.gz
Posted Jun 8, 2004
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

Changes: Various updates.
tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
SHA-256 | 7205ee61e9f13b4e782af6f3b2406ed1b13c620765d75e8dd5f733f854b5e006
vthrottle-0.54.tar.gz
Posted Jun 8, 2004
Authored by Jose Nazario | Site monkey.org

vthrottle is an implementation of an SMTP throttling engine for Sendmail servers, based upon M. Williamson's mechanisms, as described in his 2003 Usenix Security paper. It allows the administrator to control how much email users and hosts may send, hindering the rapid spread of viruses, worms, and spam. Exceptions can be made using a whitelist mechanism, which can be generated manually or with the included tool vmeasure.

Changes: Miscellaneous updates.
tags | worm
systems | unix
SHA-256 | 8ccf4c09583f75d4470ccf6960421588913866604303e286ad78dcd7ea17bbfd
walker-3.5.tar.gz
Posted Jun 8, 2004
Authored by Simon Josefsson | Site josefsson.org

DNSSEC Walker is a tool to recover DNS zonefiles using the DNS protocol. The server does not have to support zone transfers, but the zone must contain DNSSEC NXT or NSEC records. Optionally, it can also verify DNSSEC signatures on the RRsets within the zone.

Changes: Minor updates.
tags | tool, scanner, protocol
systems | unix
SHA-256 | a52beb8f075312b5882b57f6e5c329336f0b48786df343c9c2896311238a1880
tcpick-0.1.23.tar.gz
Posted Jun 8, 2004
Authored by DuskDruid | Site tcpick.sourceforge.net

tcpick is a textmode sniffer that can track TCP streams and saves the data captured in files or displays them in the terminal. It is useful for picking files in a passive way. It can store all connections in different files, or it can display all the stream on the terminal with colors.

Changes: Bug fixes, feature enhancements, and slight tuning.
tags | tool, sniffer, tcp
SHA-256 | ab6fc7f818d123ad8201868f8599e684c7ad807030e5410a051cffc0d246c820
analysis.tgz
Posted Jun 8, 2004
Authored by Jelmer Kuperus

Complete analysis of the 180 Solutions trojan along with exploitation tools that demonstrate at least two new unpublished vulnerabilities in Microsoft Internet Explorer 6 that allow for arbitrary code execution.

tags | exploit, arbitrary, trojan, vulnerability, code execution
SHA-256 | 633228ca6454a639b5fda36a2efc9fdfa8547bf3667c82b69a3a87a882a0b6d0
cpanelPHP.txt
Posted Jun 8, 2004
Authored by Rob Brown

Flaws in how Apache's suexec binary has been patched by cPanel when configured for mod_php, in conjunction with cPanel's creation of some perl scripts that are not taint clean, allow for any user to execute arbitrary code as any other user with a uid above UID_MIN.

tags | advisory, arbitrary, perl
advisories | CVE-2004-0529
SHA-256 | c6f8c68995fc348495dd14264910ae5696e263da879190792db1826b49350c14
colinmcraerally04.txt
Posted Jun 8, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Colin McRae Rally 04 has a flaw where a client can passively block an entire gaming network by setting a value too high.

tags | advisory
SHA-256 | 59bf7b0c634d77e4622f2f88c9b7593b772f34e7892e3e2eb4d1655dc959e6e4
cmr4cdos.zip
Posted Jun 8, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Colin McRae Rally 04 remote denial of service exploit that makes use of a flaw where a client can passively block an entire gaming network by setting a value too high.

tags | exploit, remote, denial of service
SHA-256 | 601ac79a78b9e63c767aae8eeb1339e7de19daaed223d660ef30e43a2c3da0c8
l2tpd.txt
Posted Jun 8, 2004
Authored by Thomas Walpuski

All versions of l2tpd contain a bss-based buffer overflow. After circumventing some minor obstacles, the overflow can be triggered by sending a specially crafted packet.

tags | advisory, overflow
SHA-256 | a067c526f020fd9fb9fb3138db7c81b08532d2a4d41587a7148996d43140fb10
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close