what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 1999-12-15 to 1999-12-16

nt.security.update.121599.txt
Posted Dec 15, 1999
Authored by winsd

Windows NT Magazene security update - December 15, 1999. Contains You Have the Right to Surf Anonymously, SQL Server 7.0 SA Password, NT Subject to Denial of Service, NT Help File Attack, News: Most Cybercrime Goes Unpunished, News: Microsoft Releases Smart Card Toolkit, Practical Recommendations for Post-Y2K, Enterprise Firewall with Security-Compliant VPN, and Monitor Data Before It Reaches the OS. NTsecurity homepage here.

tags | denial of service, magazine
systems | windows
SHA-256 | ff2a51b4aa6c31bd1316ffd02d7ca35e600d78e844b7b78b74b17c42d2a92ee4
lids-0.6.1-2.2.13.tar.gz
Posted Dec 15, 1999
Authored by Xie Hua Gang | Site soaring-bird.com.cn

Linux IDS Patch - Version 0.6.1 - Dec 15, 1999. Lids is an intrusion detection system in the Linux kernel. This patch (Version 0.6.1) is for the Linux kernel 2.2.13. LIDS 0.6 has a brand new design. When LIDS is in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.

Changes: A bugfix.
tags | kernel, root
systems | linux
SHA-256 | 8f3d6c23cf974e691bb4acd3e6b9334065f2817f6d687e7890389e174fcb2992
suse.wvdial.txt
Posted Dec 15, 1999

A security hole was found in wvdial which can allow regular users access to dialup passwords. SuSE security website here.

systems | linux, suse
SHA-256 | 6691e23fba7b944f3c30ec907d9f37340be3a0d009a6325713258f1fe960d70d
hir10.zip
Posted Dec 15, 1999
Authored by Axon, hir | Site hir.chewies.net

Hackers Information Report #10. Contains Defcon 7 in a nutshell, Flying Below The Radar: Avoiding IDS Systems, BeOS Revealed, RISC, CISC and The concept of the Power-PC, and Hacker News.

tags | risc, magazine
systems | beos
SHA-256 | 459b158b9f77b46da2f7d1e38a0f4641acadf6ff0ec6b6c27e325bdc8828808f
redir-2.2.tar.gz
Posted Dec 15, 1999
Authored by Sam Creasey | Site sammy.net

Redir is a port redirector. Its functionality basically consists of the ability to listen for TCP connections on a given port, and, when it recieves a connection, to then connect to a given destination address/port, and pass data between them. It finds most of its applications in traversing firewalls, but, of course, there are other uses. It can run under inetd or stand alone (in which case it handles multiple connections).

Changes: Enhanced support for redirection of FTP sessions, and minor bugfixes/improvements.
tags | tcp
systems | linux
SHA-256 | 92949cf1a5287eecd3e62720d93e1001301c2619ee74df07ba72119b66e20340
statd.pl
Posted Dec 15, 1999

SunOS 5.4-5.5 statd remote exploit - in perl.

tags | exploit, remote, perl
systems | solaris
SHA-256 | bd7ebae8ad5e5928d82da9b192e8e4a352c9277ff460e4561511c0ae7b227593
tryX.c
Posted Dec 15, 1999
Authored by Missinglnk | Site tribune.intranova.net

Some testing code I put together to try on a friend's old machine, it essentially tries to overflow the DISPLAY variable in X-based programs.

tags | exploit, overflow
SHA-256 | 7613d5b29ec47d7d33a9be662b0d6ff29d63ff54026a3473136af5f95fc5b577
logsurfer-1.5.tar.gz
Posted Dec 15, 1999
Site cert.dfn.de

logsurfer is a log checking/auditing tool similar to swatch and logcheck but with the capability of handling multi-line messages and dynamically adapting the ruleset. It is written in portable C, well documented, fast, and flexible. It works on any textfile or stdin, can be run at intervals or continuously, and has timeouts and resource limits.

tags | tool, intrusion detection
systems | unix
SHA-256 | 21fea4e03efe6f7b0246e5cbaf9b643e3c5d2c9a8e3c0eab39498b35004142a8
emf.zip
Posted Dec 15, 1999
Site pc-magic.com

Encrypted Magic Folders (EMF) gives you automated & transparent encryption! Select folders whose files you want encrypted and EMF not only makes those folders and files completely invisible to others but decrypts and encrypts the files automatically and transparently as you use them. You won't even know you're using encrypted files as EMF does all the work behind the scenes.

tags | encryption
SHA-256 | 458824b2a2162ff6b87ac0ac9c6ba0aa3e1f456231db0bef619b4ae0f2339f15
SPIRO-Bastille-1.0.tar.gz
Posted Dec 15, 1999
Authored by Rick Collette | Site openshare.net

SPIRO-Bastille is an adaption of the original Bastille-Linux product. This version checks the SPIRO-Linux website for security updates, and hardens the system from various attacks. It fixes permissions, ftpd, inetd, console security, and remote access, among other issues.

tags | remote
systems | linux
SHA-256 | 3079cff865e45a2caa315bb50c162f95c9a5f0f2f253732a97d8a71cecc48982
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close