exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2004-06-08

Posted Jun 8, 2004
Authored by Seunghyun Seo | Site garuda.sourceforge.net

Garuda is a wireless intrusion detection system (WIDS). It has been designed for detecting war drivers, rogue APs, denial of service attacks, and even MAC spoofing. Rule-based detection, statistics, and enumeration modules included.

tags | tool, denial of service, spoof, wireless
SHA-256 | 91b1fbcc60a57ba0341d54ffc12fb409bf01bbd9436e702f1a0feea63f4f9185
Posted Jun 8, 2004
Authored by Daniel Robbins | Site gentoo.org

keychain is a utility that helps manage ssh keys in a convenient and secure manner. It acts as a frontend to ssh-agent, but allows the user to easily have one long running ssh-agent process per system, rather than the norm of one ssh-agent per login session. It also makes it easy for remote cron jobs to securely hook-in to a long running ssh-agent process, allowing your scripts to take advantage of key-based logins.

tags | remote, encryption
SHA-256 | 8aa407cbade370b5c1095feec46679006731bc1317ae0aeb00e49b931cd3286e
Posted Jun 8, 2004
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

Changes: Various updates.
tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
SHA-256 | 7205ee61e9f13b4e782af6f3b2406ed1b13c620765d75e8dd5f733f854b5e006
Posted Jun 8, 2004
Authored by Jose Nazario | Site monkey.org

vthrottle is an implementation of an SMTP throttling engine for Sendmail servers, based upon M. Williamson's mechanisms, as described in his 2003 Usenix Security paper. It allows the administrator to control how much email users and hosts may send, hindering the rapid spread of viruses, worms, and spam. Exceptions can be made using a whitelist mechanism, which can be generated manually or with the included tool vmeasure.

Changes: Miscellaneous updates.
tags | worm
systems | unix
SHA-256 | 8ccf4c09583f75d4470ccf6960421588913866604303e286ad78dcd7ea17bbfd
Posted Jun 8, 2004
Authored by Simon Josefsson | Site josefsson.org

DNSSEC Walker is a tool to recover DNS zonefiles using the DNS protocol. The server does not have to support zone transfers, but the zone must contain DNSSEC NXT or NSEC records. Optionally, it can also verify DNSSEC signatures on the RRsets within the zone.

Changes: Minor updates.
tags | tool, scanner, protocol
systems | unix
SHA-256 | a52beb8f075312b5882b57f6e5c329336f0b48786df343c9c2896311238a1880
Posted Jun 8, 2004
Authored by DuskDruid | Site tcpick.sourceforge.net

tcpick is a textmode sniffer that can track TCP streams and saves the data captured in files or displays them in the terminal. It is useful for picking files in a passive way. It can store all connections in different files, or it can display all the stream on the terminal with colors.

Changes: Bug fixes, feature enhancements, and slight tuning.
tags | tool, sniffer, tcp
SHA-256 | ab6fc7f818d123ad8201868f8599e684c7ad807030e5410a051cffc0d246c820
Posted Jun 8, 2004
Authored by Jelmer Kuperus

Complete analysis of the 180 Solutions trojan along with exploitation tools that demonstrate at least two new unpublished vulnerabilities in Microsoft Internet Explorer 6 that allow for arbitrary code execution.

tags | exploit, arbitrary, trojan, vulnerability, code execution
SHA-256 | 633228ca6454a639b5fda36a2efc9fdfa8547bf3667c82b69a3a87a882a0b6d0
Posted Jun 8, 2004
Authored by Rob Brown

Flaws in how Apache's suexec binary has been patched by cPanel when configured for mod_php, in conjunction with cPanel's creation of some perl scripts that are not taint clean, allow for any user to execute arbitrary code as any other user with a uid above UID_MIN.

tags | advisory, arbitrary, perl
advisories | CVE-2004-0529
SHA-256 | c6f8c68995fc348495dd14264910ae5696e263da879190792db1826b49350c14
Posted Jun 8, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Colin McRae Rally 04 has a flaw where a client can passively block an entire gaming network by setting a value too high.

tags | advisory
SHA-256 | 59bf7b0c634d77e4622f2f88c9b7593b772f34e7892e3e2eb4d1655dc959e6e4
Posted Jun 8, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Colin McRae Rally 04 remote denial of service exploit that makes use of a flaw where a client can passively block an entire gaming network by setting a value too high.

tags | exploit, remote, denial of service
SHA-256 | 601ac79a78b9e63c767aae8eeb1339e7de19daaed223d660ef30e43a2c3da0c8
Posted Jun 8, 2004
Authored by Thomas Walpuski

All versions of l2tpd contain a bss-based buffer overflow. After circumventing some minor obstacles, the overflow can be triggered by sending a specially crafted packet.

tags | advisory, overflow
SHA-256 | a067c526f020fd9fb9fb3138db7c81b08532d2a4d41587a7148996d43140fb10
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By