what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2000-01-18 to 2000-01-19

pidentd-3.0.10.tar.gz
Posted Jan 18, 2000
Authored by Peter Eriksson | Site lysator.liu.se

Pidentd v3 is a much improved version of the original Ident daemon both in terms of speed, code quality and features. Features include multithreading, a "configure" script, startup autodetection, much clearer/rewritten C code, doesn't run as root after startup, has a configuration file and can be started from /etc/inittab (on systems using a SysV init).

Changes: Solaris 8 support, a bugfix with a missing setsid() call causing Pidentd to terminate when running as a standalone daemon, and support for using /dev/random (on Linux) for encryption key generation.
tags | root
systems | unix
SHA-256 | 90c64a4c17de693f940eddc2ed2a9e831ef18486054df4877534e6c693977386
winfingerprint-223.zip
Posted Jan 18, 2000
Authored by Vacuum | Site technotronic.com

Winfingerprint 223: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQLSERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, E numerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes.

Changes: Better error reporting, implemented Global FILE descriptors, bug fixes.
tags | remote, registry
systems | windows
SHA-256 | d2c64498ec1cb0175f3084da43d7f9f0ff3cd23013d44bae7d96fb8efb56b556
Windows_2000_Security.doc
Posted Jan 18, 2000
Authored by David Elswick

Windows 2000 Security - Log of a Windows 2000 hack and explanation of the dangers involved with the default security in Windows 2000 professional.

tags | paper
systems | windows
SHA-256 | 8b2ac853634ad5a826d4954ec9a04f38562ac16e7d8df4b21e6871c90ec05651
Q-1.0.tgz
Posted Jan 18, 2000
Authored by Mixter | Site members.tripod.com

Q 1.0 is a client / server backdoor which features remote shell access with strong encryption for root and normal users, and a encrypted on-demand tcp relay/bouncer that supports encrypted sessions with normal clients using the included tunneling daemon. Also has stealth features like activation via raw packets, syslog spoofing, and single on-demand sessions with variable ports. This version is downward compatible and includes a few bugfixes that make the remote access daemon work reliably.

tags | remote, shell, root, spoof, tcp
SHA-256 | 35ffdfbefeac850bb2ce4ff8a3613dbf68aaa7ef7147b5b4a9a14bcbff725692
nemesis-v0.9.tar.gz
Posted Jan 18, 2000
Authored by Obecian | Site celerity.bartoli.org

The Nemesis Project is designed to be a commandline-based, portable human IP stack for UNIX/Linux. The suite is broken down by protocol, and should allow for useful scripting of injected packet streams from simple shell scripts.

Changes: OSPF fully supported, bugfixes, and autoconf support.
tags | tool, shell, protocol
systems | linux, unix
SHA-256 | 55b28c562859c445ffcacb06d9a5d7268a74d4a47d80d6e42b4b2c9cd9cef0c3
ms00-005
Posted Jan 18, 2000

Microsoft has released a patch for a security vulnerability in the Rich Text Format (RTF) reader that ships as part of Windows 95, 98, and NT 4.0. The vulnerability is used to cause email programs to crash. Microsoft FAQ on this issue here.

systems | windows
SHA-256 | f8951101aeebb2c728a48f1c1870a0377255e6ef1c0a19790e2f2f19fa49c968
lids-0.8pre1-psk-2.2.14.tar.gz
Posted Jan 18, 2000
Authored by Xie Hua Gang | Site soaring-bird.com.cn

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace on your system. LIDS can also provide raw device and I/O access protection.

Changes: Use of capabilities bounding for even more control, switch of any capability without turning LIDS off, control of programs executed before LIDS is sealed, and unmount special authorization when rebooting for automatic shutdowns.
tags | kernel, root
systems | linux
SHA-256 | c39022e6637ebe955b9e6589c00444a2e4cd839fbb6745d42db2e6983994d769
syslog-ng-1.3.13.tar.gz
Posted Jan 18, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: TCP reconnection fixes, documentation enhancements.
tags | system logging
systems | unix
SHA-256 | 8c217ce8ee29bc17b5d8e90ac179438e71f454e78e50a5febe7c2e8980683901
flash-0.9.3.tar.gz
Posted Jan 18, 2000
Authored by Steve Fegan | Site netsoc.ucd.ie

Flash is an attempt to address the security problems associated with giving local unix users full shell access. It is a (hopefully) secure shell which will only execute administrator defined programs, while also being very user friendly. Flash is fully windowed (using an ncurses interface), is driven by cursor keys, has hotkey support, has fascist logging support and more.

Changes: The version addresses some of the configuration, compilation and installation problems with 0.9.2. Some documentation has also been slightly changed.
tags | shell, local
systems | unix
SHA-256 | c410a190307086628c2e042d55436e24ba55a65b60d905474b261883b35b5eed
iplog-2.1.0.tar.gz
Posted Jan 18, 2000
Authored by Odin | Site ojnk.sourceforge.net

iplog is a TCP/IP traffic logger. Currently, it is capable of logging TCP, UDP and ICMP traffic. iplog 2.0 is a complete re-write of iplog 1.x, resulting in greater portability and better performance. iplog 2.0 contains all the features of iplog 1.x as well as several new ones. Major new features include a packet filter and detection of more scans and attacks. It currently runs on Linux, FreeBSD, OpenBSD, BSDI and Solaris. Ports to other systems, as well as any contributions at all, are welcome at this time.

Changes: The capability to run in promiscuous mode and monitor a whole network was added. Lots of bug fixes were made.
tags | udp, tcp, system logging
systems | linux, unix, solaris, freebsd, openbsd
SHA-256 | 1b8b3ea7a188c4ebf4c4c9e89f7947797ae041ca6472ec52d2e1d93748996f6b
Nmap Scanning Utility 2.3 BETA 13
Posted Jan 18, 2000
Authored by Fyodor | Site insecure.org

Nmap is a utility for network exploration or security auditing. It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

Changes: nmap is now smarter about detecting filtering during UDP, Xmas, NULL, and FIN scans, Nmapfe is now 0.9.5, a couple of ICMP unreachable messages that were missing have been added, an internal cleanup has been done that improves the way some port lists are stored, and some more RPC numbers have been added.
tags | tool, remote, tcp, nmap
systems | unix
SHA-256 | a24a812f64eda5d17aa7581490867f0831831045e6e525f89faaeead1af4a79b
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close