what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 752 RSS Feed

Files Date: 2000-01-01 to 2000-01-31

tripwall.tar.gz
Posted Jan 26, 2000
Authored by Colin Lee | Site homepages.hack-net.com

Tripwall is a Tripwire clone developed for use with the Linux Router Project.

tags | tool, intrusion detection
systems | linux, unix
SHA-256 | 8374e6dcde17b2a0fbbfb92e565552fe840c028047f48853f965ccf757f89d4e
acua-3.00.tar.gz
Posted Jan 26, 2000
Authored by Adam Mckee | Site acua.ebbs.com.au

ACUA is a software package designed to facilitate the administration of user accounts and the enforcement of access restrictions on a Linux system.

systems | linux
SHA-256 | babe2dc4a3c4ac7a560041074aebe9a96b66d4f7b253870c2f350f7d79b2564f
apocalypso131.zip
Posted Jan 26, 2000
Authored by Dave Shanley | Site hack-net.com

Apocolypso 1.3.1 is a new crypto tool from HNC. It supports a wide variety of encryption methods, including DES, Blowfish, IDEA, Gost, Misty 1, Twofish, Cast 256, Rinjindael, HNC Single Encryption, and HNC Multi Encryption. Apocolypso runs on Win95, 98, and NT.

Changes: Fixed a bug in the DES encryption, other bugfixes.
tags | encryption, cryptography
systems | windows
SHA-256 | e3971c5b03cf26796dc241c6178c8ccac77da47abcd69d1f21a2db9599bc306e
2647.txt
Posted Jan 26, 2000

Benchmarking Terminology for Firewall Performance - This document defines terms used in measuring the performance of firewalls. It extends the terminology already used for benchmarking routers and switches with definitions specific to firewalls.

tags | paper
SHA-256 | 1cfc1222f7893059f65761a05327b55cd6dcf9da670c0a6f2191bca669e20d84
NS102.zip
Posted Jan 26, 2000
Site surf.be

Net Sentinel 1.02a - This program: checks continuously the users connected to the share on your computer, warns you as soon as someone is connected, works under WIN 98 and WIN NT4.

SHA-256 | 185e965c95eb082e1f22a746b5ed2f3de5eeeb4f8aae352889f9ebb8aa13affa
vision.conf
Posted Jan 26, 2000
Authored by Max Vision | Site whitehats.com

Snort rules from the arachNIDS IDS signature database. Last updated 1/25/2000.

tags | tool, sniffer
SHA-256 | 323abf45e4929dc5da1a57cc54bcd13c491ab19132558461310c59b513bdecbe
hacking-dict.html
Posted Jan 26, 2000
Authored by Robert Graham

This document clarifies many of the terms used within the context of information security (infosec). Version 0.1.2, last updated January 25, 2000.

tags | paper
SHA-256 | d9a367117965f9e60e6ec503c76e7de426b0f835bd2f8e32e73045ab98c15449
snort-1.5.1.tar.gz
Posted Jan 26, 2000
Authored by Martin Roesch | Site clark.net

Snort is a libpcap-based packet sniffer/logger which can be used as a lightweight network intrusion detection system. It features rules based logging and can perform content searching/matching in addition to being used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, and much more. Snort has a real-time alerting capabilty, with alerts being sent to syslog, a seperate "alert" file, or as WinPopup messages via Samba's smbclient.

Changes: fixed a problem with pass rules not being applied properly, fixed slackware 4 install problem, fixed banner output for the -V option, Added packet buffer cleanup code to all protocol decoders, and Added a Snort man page.
tags | tool, overflow, cgi, sniffer
SHA-256 | c9aa00003a3c2fe7589af1f23d5322b9668e46a5f9b48f98697f20066d100514
tcp_input.c.patch
Posted Jan 25, 2000
Authored by Omachonu Ogali

Patch for tcp_input.c in FreeBSD in response to stream.c/raped.c.

tags | patch
systems | unix, freebsd
SHA-256 | 7d2e64495b07163ff141ebd639ee1e8b8b1f20967e0d3a890b09919bbe58fa35
NSS_2000pre4.tar.gz
Posted Jan 25, 2000
Authored by Narrow

Narrow Security Scanner 2000 searches for 289 remote vulnerabilities. Written in perl, tested on Redhat, FreeBSD, and OpenBSD, Slackware, and SuSE.

Changes: Plugins updated: HTTPD, CGI, FTPD, RPC and TROJAN, Descriptions of holes added, code cleaning, last minute updates.
tags | tool, remote, scanner, perl, vulnerability
systems | linux, redhat, unix, freebsd, suse, slackware, openbsd
SHA-256 | d717abc5786b1c4d11d96bb49978194faaea0820c95c6f9ff1ebe58e10ff8038
OOBNukeV1_3.zip
Posted Jan 25, 2000
Authored by Jason Misoskian | Site xcoders.com

An oob flooder & nuker. asic OOBNuke program which you can also use to flood. Effective against WinNTs and vanilla windowz boxes.

tags | denial of service
SHA-256 | 8ad224f1444186fe441c2c5e865fd8bc91a45580805dca41817963c0ae4e2e1b
PortListen.zip
Posted Jan 25, 2000
Authored by Jason Misoskian | Site xcoders.com

Windows based port listener, with source code. This program opens a port and listens it for connection and received data. Examine source and see how easy a nukenabber can be written.

systems | windows
SHA-256 | 58248b67d363222c8a7c1ad9f5997b332d8603e0484be6ea084b52f7d781afab
RocketV1_0.zip
Posted Jan 25, 2000
Authored by Jason Misoskian | Site xcoders.com

Another +++ATH0 modem attack. A new fun for users who has modems with "escape code guard". If your modem does support (all quality modems supports) escape code guard you can use this program else wait for next version with defence feature. If it's successful, this attack will cause disconnection of the target modem.

tags | denial of service
SHA-256 | e4019b7de191281f65bb62b6ae340a65d12460b77fbdfdf69b6b90a1295e87c9
ShowPassV1_0.zip
Posted Jan 25, 2000
Authored by Jason Misoskian | Site xcoders.com

ShowPass 1.0 - like dripper - dial up password ripper for Windows. With this program you can find every password in a machine! "*" shadowed passwords, dialup passwords and cached passwords are on your hire. It's like a combination of Dripper, Revolution and Pwlview. Program supports both English and Turkish. Warning: This program will cause many AV programs, including McAffee, to give a false alarm.

systems | windows
SHA-256 | 25aabd8b24f2824e4f2e0a3cfb821e10f73f48a216d0a09c851239b25a5ccb96
winhole.zip
Posted Jan 25, 2000
Authored by Courtney Loveless

Winhole will put Wingate onto 95/98 system without its owners knowledge (easily done if the system is compromised with BO/Netbus/etc).

SHA-256 | e5dea92d85d7d6c7e3d0c462ee946f8e5bf555bed78b970bc43a32f2f45d245d
password.py.gz
Posted Jan 25, 2000
Authored by Dan Grassi

Quick Password is a program written in Python that generates passwords of user specified lengths which are easy to remember and pronounce. The passwords are reasonably secure and can easily be remembered because they are composed of dictionary words that are pronounceable joined by special characters. The program generates passwords of between 2 and 10 words each between 3 and 10 characters in length separated by non-alpha characters. It is usable as a web application from the home page if you do not wish to download it.

tags | web, python
systems | linux
SHA-256 | d6dabca6d18785695d9795744ba0c6fd12a1e673dfd26a9be02d799b1feac4c9
zebedee-1.3.0.tar.gz
Posted Jan 25, 2000
Authored by Neil Winton | Site winton.org.uk

Zebedee is a simple program to establish an encrypted and compressed TCP/IP tunnel between two systems. This allows TCP-based traffic such as telnet, FTP and X to be protected from snooping as well as potentially gaining performance over slow networks from compression. The main goals for Zebedee are to provide full client and server functionality under both UNIX and Windows 95/98/NT, to be easy to install, use and maintain with little or no configuration required, to have a small footprint, low wire protocol overhead and give significant traffic reduction by the use of compression and to use only algorithms that are either unpatented or for which the patent has expired.

Changes: Much improved connection setup performance when not using encryption. Fixed FTP tunnelling.
tags | encryption, tcp, protocol
systems | windows, unix
SHA-256 | aa256143ec1153d1bef38f4dbe8fc990ce52179913a013bce04ae36ba1b6091a
loopy-0.1.2.tar.bz2
Posted Jan 25, 2000
Authored by Ian Wehrman | Site prism.gatech.edu

loopy is a small shell script which allows users to easily create, mount and unmount multiple encrypted loopback device filesystems. loopy requires the international kernel patch, as well as all other utilities normally required to use encrypted loopback filesystems.

Changes: Small documentation updates to help the user choose a good cipher.
tags | shell, kernel, encryption
SHA-256 | 1f0ff80770ba864ce79a1a490901da8f46ebbba16b23a1bc4c923cb7882e29b5
el8-0.txt.gz
Posted Jan 25, 2000
Authored by ~el8 | Site el8.n3.net

~el8 Issue 0 - Contains px25 Network Primer, zgv exploit, AlphaSort, UDP vs TCP, Anarchist Code Kit, matrix.c, and the w00raw Packet maker.

tags | udp, tcp, magazine
SHA-256 | 08a3f65c2fe417a95ff35d48d3e3a4bfb4c6d1d4f413c897a004ef35a458387c
lids-0.8pre3-psk-2.2.14.tar.gz
Posted Jan 25, 2000
Authored by Xie Hua Gang | Site soaring-bird.com.cn

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide sensitive processes and prevent anyone from using ptrace on your system. LIDS can also provide raw device and I/O access protection.

Changes: A fix for a code regression in 0.8pre2 that can oops the kernel.
tags | kernel, root
systems | linux
SHA-256 | ea5e4a5e8abd53eabcf1772a530c3381da9a034461cbeae98f47b852b657f1e3
softwarst.exe
Posted Jan 25, 2000
Authored by True Real | Site truereal.com

Softwar "Shadow Thief" is a Win 9X remote control trojan. The server is coded in pure ASM and is only 8k! Has over 30 features. Current AV products do not pick it up. Archive password is set to p4ssw0rd. Use at your own risk.

tags | remote, trojan
SHA-256 | 1fc9ad816a4b7690c8e30b2dd2c3b790925c29b646b6b02d9984637cc966e7d7
issue2.txt
Posted Jan 25, 2000
Authored by napalm | Site napalm.firest0rm.org

Napalm Magazine issue #2 - Quantum Crypto, VPNs, more gh0st.net (Dec 3, 1999).

tags | cryptography, magazine
SHA-256 | e017bfdc9ad598287d72b79ac9eb9bec9ba20aff80acfb63ea82ece5b4cb594b
issue1.txt
Posted Jan 25, 2000
Authored by napalm | Site napalm.firest0rm.org

Napalm Magazine issue #1 - Onion Routing, gh0st.net, Introduction (Sep 29, 1999).

tags | magazine
SHA-256 | c97e9bef1f3a4b48e1a2f61ad2e4acf63347c010b1b9daaacb9455e087cfcf35
bsdnethack.c
Posted Jan 25, 2000
Authored by s0ftpj, Pigpen

FreeBSD kernel module which can change options at every layer in a connection.

tags | kernel
systems | freebsd
SHA-256 | 9d8903cacecd3861b6cda58fe802e06cd717ab2e2925d204ecf4ee06745f5440
ipfwfilter.c
Posted Jan 25, 2000
Authored by s0ftpj, Pigpen

BSD kernel module which prevents ipfw from blocking a specified IP address.

tags | kernel
systems | bsd
SHA-256 | eda8204dc0dd9bee437dbd4ef6006b28fdcf118846aa7c66f58d74c79494e86b
Page 3 of 31
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close