ignore security and it'll go away
Showing 1 - 25 of 749 RSS Feed

Files Date: 2006-03-01 to 2006-03-31

systrace-1.6a.tar.gz
Posted Mar 28, 2006
Authored by Neils Provos | Site citi.umich.edu

Systrace enforces system call policies for applications by constraining the application's access to the system. The policy is generated interactively. Operations not covered by the policy raise an alarm, allowing the user to refine the currently configured policy. After a policy has been sufficiently constructed, further alarms often indicate security problems. Policies can also be generated automatically for sandboxing purposes.

systems | unix
MD5 | ac0eabc16767e1f8630fefdabab45a78
Beltane Web-Based Management For Samhain
Posted Mar 28, 2006
Site la-samhna.de

Beltane is a web-based central management console for the Samhain file integrity / intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. Beltane requires a Samhain (version 1.6.0 or higher) client/server installation, with file signature databases stored on the central server, and logging to a SQL database enabled.

Changes: Fixed an arcane bug in configure.ac.
tags | tool, web, intrusion detection
systems | unix
MD5 | 646445fa2f85414214a2c22c26591fab
radmind-1.6.0.tar.gz
Posted Mar 28, 2006
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Added support for network communication compression. OS X Package contains universal binaries.
tags | tool, intrusion detection
systems | unix
MD5 | 19ca1d4b40e6dbdf7fc15611236c9093
nufw-1.0.23.tar.gz
Posted Mar 28, 2006
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Minor bugfixes and adds a new option which should improve interoperability with Windows domains which are case insensitive.
tags | tool, remote, firewall
systems | unix
MD5 | dad4435629ca7b7b6a4f9da3f5346bac
john-1.7.0.2.tar.gz
Posted Mar 28, 2006
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.

Changes: Minor bug and portability fixes.
tags | cracker
systems | windows, unix, beos
MD5 | 084fa03f265491ef7e32c05e9fb027db
aircrack-ng-0.2.1.tar.gz
Posted Mar 28, 2006
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

Changes: Various updates and feature enhancements.
tags | tool, wireless
MD5 | 5b918c0dffa6495e9dbf1bfc2babd753
plash-1.16.tar.gz
Posted Mar 28, 2006
Authored by Mark Seaborn | Site cs.jhu.edu

Plash (the Principle of Least Authority Shell) is a Unix shell that lets you run Unix programs with access only to the files and directories they need to run. In order to implement this, the filesystem is virtualized. Each process can have its own namespace, which can contain a subset of your files. Plash is implemented by modifying GNU libc and replacing the system calls that use filenames. For example, open() is changed so that it sends a message to a file server via a socket. If the request is successful, the server sends the client a file descriptor. Processes are run in a chroot jail under dynamically-allocated user IDs. No kernel modifications are required. Existing Linux binaries work unchanged.

Changes: Documentation updates. Various enhancements and fixes.
tags | tool, shell, kernel
systems | linux, unix
MD5 | 7f1749c04ba62dbae31f6d0437bb1dea
prelude-manager-0.9.4.tar.gz
Posted Mar 28, 2006
Site prelude.sourceforge.net

Prelude Manager is the main program of the Prelude Hybrid IDS suite. It is able to register local or remote sensors, let the operator configure them remotely, receive alerts, and store alerts in a database or any format supported by reporting plugins, thus providing centralized logging and analysis.

Changes: Various bug fixes and improvements.
tags | tool, remote, local, intrusion detection
systems | unix
MD5 | ccde00b47f0bc8586aed23286162d0d0
Scapy Packet Manipulation Tool 1.0.4
Posted Mar 28, 2006
Authored by Philippe Biondi | Site secdev.org

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

Changes: See changelog.
tags | tool, scanner, python
systems | unix
MD5 | c156668cfab4c1fde276f81e0b85b5d9
Samhain File Integrity Checker
Posted Mar 28, 2006
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | b6082cbec978d483fabe638f991acdb4
Gentoo Linux Security Advisory 200603-22
Posted Mar 28, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-22 - Multiple vulnerabilities in PHP allow remote attackers to inject arbitrary HTTP headers, perform cross site scripting or in some cases execute arbitrary code. Versions less than 4.4.2 are affected.

tags | advisory, remote, web, arbitrary, php, vulnerability, xss
systems | linux, gentoo
MD5 | 81837311cd1f94ef97031e5edcde2938
sendmail0058.txt
Posted Mar 28, 2006
Site sendmail.com

Sendmail, Inc. has recently become aware of a security vulnerability in certain versions of sendmail Mail Transfer Agent (MTA) and UNIX and Linux products that contain it. Sendmail was notified by security researchers at ISS that, under some specific timing conditions, this vulnerability may permit a specifically crafted attack to take over the sendmail MTA process, allowing remote attackers to execute commands and run arbitrary programs on the system running the MTA, affecting email delivery, or tampering with other programs and data on this system. Versions 8.13.5 and below are affected.

tags | advisory, remote, arbitrary
systems | linux, unix
advisories | CVE-2006-0058
MD5 | 16374816bcdc48726dfca23914a5b38b
Secunia Security Advisory 19295
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - trew has discovered a vulnerability in LibVC, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 559d59e8de839f5638337e49381b4852
Secunia Security Advisory 19372
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pratiksha Doshi has reported a vulnerability in Meeting Reserve, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | e8cf574ef4dbd949aa4d5a2a557b34d9
Secunia Security Advisory 19375
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has discovered some vulnerabilities in Helm Web Hosting Control Panel, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, vulnerability, xss
MD5 | 2103565167fb21f267c8c81ee404051b
Secunia Security Advisory 19378
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jeffrey van der Stad has reported a vulnerability in Internet Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 9aaa7499c3656187d9c5b13d477a2fb5
Secunia Security Advisory 19381
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported a vulnerability in E-School Management System, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | a0740d1c6c2330385a850ab1deebc3bc
Secunia Security Advisory 19384
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in phpPgAds / phpAdsNew, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
MD5 | 7d031e21d6fa13f246ba8d939577fb43
Secunia Security Advisory 19385
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported a vulnerability in Metisware Instructor, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | c872a6a0c38aee037a83f62a2ae743c5
Secunia Security Advisory 19386
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported some vulnerabilities in EZ

tags | advisory, vulnerability
MD5 | 8663de3ee61ef71033dd1954b7198df5
Secunia Security Advisory 19387
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0t has reported a vulnerability in BlankOL, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 5ae42fc88c1d71312a7cad9b9eab9d08
Secunia Security Advisory 19388
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported two vulnerabilities in Vavoom, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | a1337ded68dd9fcc170fc18bf73bea91
Secunia Security Advisory 19389
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported some vulnerabilities in csDoom, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 1a560ce4e567f6d937ac674af420ce51
Secunia Security Advisory 19390
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for realplayer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, gentoo
MD5 | 42d609426f07552c6db482e48ea4476e
Secunia Security Advisory 19393
Posted Mar 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pratiksha Doshi has reported a vulnerability in Calendar Express, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | c02dc39259de223842d563e590de5a59
Page 1 of 30
Back12345Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    15 Files
  • 19
    Oct 19th
    10 Files
  • 20
    Oct 20th
    7 Files
  • 21
    Oct 21st
    4 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close