exploit the possibilities
Showing 1 - 25 of 1,520 RSS Feed

Files Date: 1999-12-21 to 1999-12-22

NSS_2000pre1.tar.gz
Posted Dec 21, 1999
Authored by Narrow

Narrow Security Scanner 2000 searches for 249 remote vulnerabilities. Written in perl, tested on Redhat, FreeBSD, and OpenBSD, Slackware, and SuSE.

tags | tool, remote, scanner, perl, vulnerability
systems | linux, redhat, unix, freebsd, suse, slackware, openbsd
SHA-256 | 8c4fdb14440f7bff678d4bbd8c29638af5273f05e1137e2ed0b3cdd5b41c12be
dns-pro.dos.txt
Posted Dec 21, 1999
Authored by Underground Security Systems Research

Remote DoS attack discovered in DNS Pro 5.7 for Windows NT, caused by over 30 connections to port 53 at the same time.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | 6a5b1d3203440661fa1a3460290844a5985c7115edfcea8d58a274dcc8be800a
dsniff-1.1.tar.gz
Posted Dec 21, 1999
Authored by Dug Song | Site monkey.org

Dsniff contains several powerful new network tools, written for use in penetration testing. Arpredirect is a very effective way of sniffing traffic on a switch by forging arp replies. Findgw determines the local gateway of an unknown network via passive sniffing, which can be used in conjunction with arpredirect to intercept all outgoing traffic on a switch. Macof floods the network with random MAC addresses, causing some switches to fail in open repeating mode, facilitating sniffing. Dsniff is a simple password sniffer which parses passwords from many protocols, only saving the "interesting" bits. Mailsnarf is a fast and easy way to violate the Electronic Communications Privacy Act of 1986. urlsnarf outputs all requested URL's from HTTP traffic. webspy sends URLs sniffed from a client to your local Netscape browser for display, updated in real-time (as the target surfs, your browser surfs along with them, automagically).

tags | tool, web, local, sniffer, protocol
SHA-256 | 5b8ac1a36bdcb8085709d1fb176ea958619549ff8c83cdd6c06ec75272cde04f
lsof_4.47_W.tar.gz
Posted Dec 21, 1999
Authored by Vic Abell

Lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system.

Changes: Fixed compilation on Solaris, hacks for HP/UX, linux bugfixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 78fa7d515c0fec04c226609c590bba0b6806da8612b1609d77d70ddb0db9adf3
Samhain File Integrity Checker
Posted Dec 21, 1999
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a tool for monitoring the integrity of files on a single machine as well as on a network. It is easy to configure and maintains a single database (per host) for storing the signatures of files. Samhain is designed to be run as a background process, checking files periodically against the database. Reports can be written to a signed, tamper-resistant log file, and/or sent offsite by e-mail. To monitor several machines and collect data by a central log server, samhain may be used as a client/server application. For the paranoid, a 'stealth' option is available.

Changes: Added a client/server mode and a stealth option. Fixed several bugs and portability fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 7e6a44873d79298b027d90259ecc248e8b444f798ef7d93fc219650ce7306cc7
ms99-059
Posted Dec 21, 1999

Microsoft has released a patch for a security vulnerability in Microsoft SQL Server 7.0. The vulnerability causes a SQL server to crash. Microsoft FAQ available here.

SHA-256 | bad8df9b8108317e9c63a2bb5a524a2b385e11b1d63530d8503248b29f8e8b12
bernstein-9th.htm
Posted Dec 21, 1999

bernstein-9th.htm

tags | encryption
SHA-256 | cca07e54f19a409255f9dce1a79742beff07c4d5408d889683727914144aa6e8
bernstein-eff.htm
Posted Dec 21, 1999

bernstein-eff.htm

tags | encryption
SHA-256 | 0ed6191d7e14f845752f4fdd582405dfdf814c4a9b6f1bc6be7964a95136b1ac
button.gif
Posted Dec 21, 1999

button.gif

tags | encryption
SHA-256 | cfdbc6584523860cd43adefaeb8da0815a646e8b1700646ec602844c17f17ea0
crypto-call.htm
Posted Dec 21, 1999

crypto-call.htm is a Paper on Building crypto archives worldwide

tags | encryption, crypto
SHA-256 | 8763376a1cfa060dbe473fbc426e735c9b6804f0f80900f8a289045bf9d61e30
crypto-free.htm
Posted Dec 21, 1999

crypto-free.htm is a paper on cryptography freedom

tags | encryption, crypto
SHA-256 | 6cfe0e296ab845303da8e73b2915d35c3e729d217981c93f091f5aa91d709cc8
crypto-links.htm
Posted Dec 21, 1999

crypto-links.htm

tags | encryption, crypto
SHA-256 | 9f478cfd8bd2ec6c6a457b7db014fd5dba45f7f10f5050c4ef4e0f2f4e872675
crypto-update.sh
Posted Dec 21, 1999

crypto-update.sh

tags | encryption, crypto
SHA-256 | fa4533ce1ea69f34e0549ef8d8f9ecc4492944851b74c35fe71f1b4e48b03643
efccrypt.gif
Posted Dec 21, 1999

efccrypt.gif

tags | encryption
SHA-256 | 89b44cfd86d2cdcc9a69e86ca1278b214bfee292c1f4a31afdc5afe97c9c0768
execorder.txt
Posted Dec 21, 1999

execorder.txt

tags | encryption
SHA-256 | 09fda4593d54fe9d2f069bf3a99152b8221a0398890bb9ed1ace31d77df248f0
htls
Posted Dec 21, 1999

htls

tags | encryption
SHA-256 | 963d433310fda12de54d945b81c9031a8ee7aaa8b61735e7df48fcd2377aaf24
key2_neu.gif
Posted Dec 21, 1999

key2_neu.gif

tags | encryption
SHA-256 | badff82bc75b5fe68c59ddb8b24dff4041977ca2307f1d40c55cb62a2f25836f
LEARNING.HTM
Posted Dec 21, 1999

Paper on Learning about Cryptography

tags | encryption
SHA-256 | 8d5dac29372daf7cc9e3a5cbc6547b8376ef421bc903570c432ce5088ebc0460
mlmkbadge.white.gif
Posted Dec 21, 1999

mlmkbadge.white.gif

tags | encryption
SHA-256 | 170dd82920f0ce12d7ea73f697d574fc25f90b9c648b7e4ff954cf138c76c654
soi_ch4.htm
Posted Dec 21, 1999

soi_ch4.htm

tags | encryption
SHA-256 | 19ba859ad8431660dfa94a58fd8964f44c11c2031d783b1a155ee892885d5f5e
tree.html
Posted Dec 21, 1999

tree.html

tags | encryption
SHA-256 | a1a4f9d964342b89884cb629c4c88f07ffa70c01b84705534bdcf6b1ee2cf989
BUILD.gz
Posted Dec 21, 1999

BUILD.gz

tags | encryption
SHA-256 | 463f39e3f18a5e15dd901b2bc6640df57a3280bd5b65405c720f1b155b8fb345
GLOSSARY.HTM
Posted Dec 21, 1999

Crypto Glossary and Dictionary of Technical Cryptography

tags | encryption, crypto
SHA-256 | baf7b4cb94f88210381fcdfb4698d853b122f3e1540c86a815295fbc9142bef5
README
Posted Dec 21, 1999

README

tags | encryption
SHA-256 | c9c2171bdfcd9981fd4d60c6085975fe0d180538b191bcbb08af62d35b7fd181
skipsrc-1_0_tar.Z
Posted Dec 21, 1999

skipsrc-1_0_tar.Z

tags | encryption
SHA-256 | bcc692d427b030d04e10aa8907d63f92ddb48cf6311a7324a2b3b7e8d8f5cc62
Page 1 of 61
Back12345Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close