Pandora v4 Beta 2 Online for Windows 95/98 BETA 2 - Online point and click attacking of Novell Netware from Windows 95/98. Unzip and run the setup.exe program. DO NOT FORGET TO INSTALL THE PACKET DRIVER OR THIS PROGRAM WILL NOT WORK!
36c2d370416cc675506924ffe914c39de77ba897ac6e9152960d99152ccfd8e3
Pandora v4 Beta 2 Offline for Windows 95/98/NT BETA 2 - Offline Novell password auditing for the Windows platform. Unzip and run the setup.exe program. Fully optimized for Pentium platforms to maximize password cracking.
be5edd61749ef0a35dd50d9a007f8fe9b8e55331a82504bdb76d99e71a1b07ea
If proftpd has the mod_sqlpw.c optional module compiled in, the last command will display passwords instead of usernames.
ec7d82abc3be27d87dddd381e6122c6d188a6c5e42de20b16c051adac8a7c83a
Linux Trace Toolkit is a tool used to reconstruct the dynamic behavior of a linux system. LTT fills the gap left by tools such as gprof, strace, ps and many others when attempting to know what is going on with your linux system at every moment by providing it's user with all the information required to reconstruct a system's behavior during a certain period of time. One can know exactly the dynamics of a system. Why do certain synchronization problems occur? What exactly happens to an application when a packet is received for it? Overall, where do all the applications that I use pass their time? Where are the I/O latencies in a given application? etc. Requires kernel patch.
62c058b496848eb4487ce3a762be80f4829bc513c2c92b5356b3d2653e071fd5
ZetaMail 2.1 POP3/SMTP server is vulnerable to a buffer overflow caused by a long username / password. Binary / Source for the DoS exploit here.
05ab8f61d142aacfec12a6ab466acd75890a08dc2d75bd8809207b0e15a17a65
lids is an intrusion detection system patch for the Linux kernel; it can protect important files from being changed. When it's in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.
4f6f7925ca1f194d7d0c5f3f6c351e96fe52e41607c32e8906779badde1514b9
PSS gets "texts for newbies" by the bucketload. However, this is quite different. It has the "newbie hacking basics" presented in a tasteful and useful manner. Later, it goes into "novice/intermediate" tactics that many as piring (though not yet leet) hackers will find usefull. And finally, in sections such as Firewall Penetration experienced hackers will find valuable theroritical and practical tactics and techniques. All in all, Digital Voodoo is a great reference and resource for hacker and security specialist alike.
2b4e0acd7c6e89e30072ee3d3f99aab6d5fe8681f729269c134adc5d676f52de
Narrow Security Scanner is a perl script which checks for 177 remote vulnerabilities. Tested on Slackware 4.0, Red Hat (4.2, 5.0, 6.0), SuSE 6.1, FreeBSD 3.0 & OpenBSD 2.5.
957bdf614696996026ae4b75da6ff416b20c67a32a74a057df9ff5656ed3a6e1
Dragonmount Networks has released Part 1 of a multipart series on the Transmission Control Protocol. This first discussion is geared towards those new to the Internet who want an overview of the processes involved in client/server communications. A brief history of the Internet, discussion of ports, the 3-way handshake, and SEQ/ACK numbers are all included.
f3bcf352a2c27fc77330298259a54d48d655f8a17860eee8facd4fce4ee33641
XScreenSaver is a modular screen saver and locker for the X Window System. It is highly customizable and allows the use of any program that can draw on the root window as a display mode. More than 100 display modes are included in this package.
2fce3ff66937668106e28b2feab9d4a2f6fb72fb1b1e105818a2026174f56368
A low level interface to a TCP/IP socket for Windows. Send exactly what you want in hex or ascii, receive information formatted in a logical manner. Full diagnostic window to assist you in debugging problems. Great if you're a programmer wanting to learn how protocols work, or to experiment.
127b4dea28a1cdd133d7f0ba1b85643ea949646eacabb730f2ee920cb9ebf091
Lynx has mechanisms to avoid spoofed 'special URLs'. The protections are insufficient and can result in local compromise.
572c27a381354f90a31a76977dccc10442db4065337602fbc6a83efbba50ffb1
Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process.
3283fdf6cd25602716adccdc1295928d6c5af282f603fde9b0c9394c7acf3226
Ping Sting 1.0 - pingsting is an application that monitors networks for ICMP Echo Requests and attempts to determine what application generated the ICMP packets. The method and weaknesses of this method are described at the end of this document.
dda27dc367e0fec9588170a585b726379286ad739cb535249fdeb7f60e3ba3dc
CGI Check 99 v0.4. Checks for 119 remote CGI vulnerabilities and other remote issues. Written in rebol to be extremely portable (37 os's).
b4015369ea7391e4a7d4a18d610dfc675f3883cf684c00b8838d7b78c4725ae8
Re-release: Microsoft has learned of a vulnerability in Microsoft(r) Internet Explorer that could allow a malicious web site operator to read files on the computer of a user who visited the site, under certain circumstances. A patch is now available.
7537dc57932b2b135676443a6008da4a5072403722fde739836a368f2a9cf0b3
Broad Scan 0.6 something I wrote when I wanted to search my internal network for systems running certain services but didnt want to run a full blown portscanner. This allows you to scan an IP address range for a specific port.
09caa1b8801a1763b606926f7d05278fe17d3575ed02ef8ef33ba17daa254fa2
Power PC shellcode. LinuxPPC and BSD (darwin?) versions are included.
90c4607349c3839a253a0f9763beb1cc9b88e2bca9499223eb1a0fc0cb33140a
A security hole was discovered in thttpd server, distributed with SuSE 6.2 and 6.3. When overflowing a static buffer in tdate_parse() an attacker could remotely execute commands on the thttpd host with the permissions of thttpd. Patches available here.
8b5e0fbf85086d789ebdff5f9083447393cac48f65be5b050868c8efa4cf1cff
Remote DOS Attack in G6 FTP Server v2.0 (beta 4/5) caused by a buffer overflow in a long user name.
10a81014393e2e851e86f1b981ebf6ad5d458b73177cd286b8726538c086aa92
The version bind that was distributed in Debian GNU/Linux 2.1 has a vulnerability in the processing of NXT records that can be used by an attacked in a Debian of Service attack or exploited to gain root access to the server. This has been fixed in version 8.2.5p5-0slink1, and we recommend that you upgrade your bind package immediately. Debian security homepage here.
c0348f836c6ccdfcc5aeb64b724e1fe239dc1ecf33461b0f5ec14ecd6023e62d
Don't know anything about PGP? Wanna know what is it good for? How to use it? What are the advantages of encrypting your files and your Email? How PGP works? Why is it so hard to crack? Want a simple tutorial to teach you all this? Then go for this one! Simple, easy to understand and relatively small.
4463f8f5e7bbb27c5b104cb8b41cfd2dd3abc45de190a40487ed476b83466913
rhupdmgr is a script which sends an email to the sysadmins when a machine has fallen out of sync with the RedHat Updates. It works by checking a generated list of RPMs to be updated.
3a6a0e3d372afb9568dbaa46859fdd949cc34d08709f1b62dbb0a86b5919b6d1
Samhain is a tool for verifying the integrity of files. It uses the TIGER message digest algorithm to generate a database for files and directories listed in the configuration file. After initializing the database, samhain can run as a background process, performing checks at user-defined intervals. Results can be written to a log file and/or forwarded to another host by e-mail. Log file entries are signed to prevent tampering. The current version is tested on Linux only.
1505f8f9c2445ed1a8767f0ce6bdd68622d0740af23fed22db953ce348336066
Xipdump is a protocol analyzer and tester. It's a kind of graphical tcpdump(8) which adds the possibility of changing packet values and resending them. The graphical representation of a packet is intended to offer a complete, customizable view at a glance.
f82d39df7996146a48b3a60381c93fb0c2698dc5a99fcbb5873d1423e1519eb8