what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2000-05-02 to 2000-05-03

secureworx0_7-B1.sh
Posted May 2, 2000
Authored by Secure Worx | Site secureworx.homestead.com

Secure Worx (TM) Network Intrusion Detection System - The intrusion detection system is a network based system that performs high-speed traffic analysis of the content and context of a network packet to detect unauthorized traffic in real-time. It has inexpensive hardware and OS requirements. The intrusion detection system runs on a Intel Pentium class compatible processor with a 10/100 Ethernet card running the Linux OS with kernel 2.2 and above with a configured TCP/IP stack. The installation process involves running an installation script that asks a few simple questions. It is then a simple matter of starting the software and your network is then searched for anomalous activity.

tags | tool, kernel, tcp, intrusion detection
systems | linux, unix
SHA-256 | faea89ee797f3f11988cce474a14e1abb795054d5e4a03ec5804ff43884cdee8
CA-2000-05.dns
Posted May 2, 2000
Site ciac.org

There are continuing compromises of machines running the Domain Name System (DNS) server software that is part of BIND ("named"), including compromises of machines that are not being used as DNS Servers.

SHA-256 | 963aadc711ddd0cc32b45275239100e6619d5dfd74f8b0a52fa29b8b8ef0e9d5
cart32scan.pl
Posted May 2, 2000

Script used to scan for the Cart32 vulnerability. Anonymously Submitted.

tags | exploit
SHA-256 | b1b84ce54d1dc264e9ddddb9c86e0ad712ed73384db9127f9030cd4e819e3e83
sf.tar.gz
Posted May 2, 2000
Authored by Anthraxx | Site datacomm.ch

Switch Fucker is a frontend to Arptool, to easily sniff connections in a switched network. And it has some goodies, like automated mac sniffing from the target and easy DoS Attacks.

tags | tool
systems | unix
SHA-256 | 9d683254f20858b6e61f12e8cc48eb735eaf026d97d419ad5c1f7a95aefd43ba
suse.aaabase.txt
Posted May 2, 2000
Authored by SuSE Security | Site suse.de

SuSE Security Advisory - aaa_base is the basic package which comes with any SuSE Linux installation. Two vulnerabilities have been found: 1) The cron job /etc/cron.daily/aaa_base does a daily checking of files in /tmp and /var/tmp, where old files will be deleted if configured to do so. Please note that this feature is NOT activated by default. 2) Some system accounts have their homedirectories set to /tmp by default. These are the users games, firewall, wwwrun and nobody on a SuSE 6.4.

tags | vulnerability
systems | linux, suse
SHA-256 | 5a3e2e3231a4460b85f1219b5ea705fbcc5e0ff1be6878fc5be1742a41f15b0a
Turner.mstream
Posted May 2, 2000
Authored by Elliot Turner

In response to the surfacing of the mstream attack tool and the published analysis of its inner workings, a set of SNP-L scripts and attack signatures has been developed which allow one to detect and decode "mstream" network activity.

tags | denial of service
SHA-256 | 7d599172d8cb0bff081b92cc56b96669bc4b1a244c78ad849b823846dd543336
saint-2.0.2.beta2.tar.gz
Posted May 2, 2000
Site wwdsi.com

SAINT is the Security Administrator's Integrated Network Tool. It gathers as much information about remote hosts and networks as possible by examining all network services and potential security flaws. The collected data can then be analyzed using a simple rules-based system (or via other included interfaces). In Exploratory Mode, SAINT will examine the avenues of trust and dependency and iterate further data collection runs over secondary hosts.

tags | tool, remote, scanner
systems | unix
SHA-256 | 46761eef129f31c072ac46eb5837adcec548df2fffc8b5e023df425a622b1e79
ISS.txt
Posted May 2, 2000

Internet Scanner and the Real Secure products can both be used for bad. Submitted Anonymously.

tags | exploit
SHA-256 | df9bfc9f99bf0383ee7387fedbd24255d38196a8e92216724058308703f15a4f
Content-Type: TEXT/PLAIN; charset=US-ASCII Internet Security Systems Security Alert May 1, 2000
Posted May 2, 2000
Site xforce.iss.net

A new Distributed Denial of Service tool, mstream, has been discovered at the University of Washington. It has also been seen on networks at Penn State and Indiana University. A Distributed Denial of Service attack is designed to bring a network down by flooding target machines with large amounts of traffic. The source code for a version of the program was recently posted anonymously to the BugTraq and VULN-DEV e-mail lists hosted by SecurityFocus. This tool includes a master controller and a zombie. The master controller is the portion of the tool that controls all of the zombie agents. An attacker connects to the master controller using telnet to control the zombies.

tags | denial of service
SHA-256 | 831b88ac1fc976e9564f7cfad9d681900d7de2682423dab9dddec3575ad0743e
sara-3.0.2.tar.gz
Posted May 2, 2000
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. This release addresses the pirahna attack and the mstream DDOS detection. Added pirahna test (password vulnerability in Linux Web server), Updated http.sara to reduce false alarms on non 404 servers, updated sara.cf to avoid answerbook2 inadvertent denial of service, Added test for pcanywhere, Added test for mstream DDOS agents.

tags | tool, web, denial of service, scanner
systems | linux, unix
SHA-256 | b9a2c7095c6caeb70b3168bb283941e4326fe98c4629e23efe781d4e162e3548
crypto-06.tgz
Posted May 2, 2000
Authored by PepsiCrew

This is crypto version 0.06. This is a beta release with very limited functionality. It was written completely from scratch in C. It started out as joke about the NSA, and one hour later, crypto 0.01 was born. Now it is very useful to protect your personal information.

tags | encryption, cryptography
SHA-256 | ee88a6ccecb4c6ec792bc373f777c4054c4376606a8ad00dce1de6a304f5d6f2
labs39.txt
Posted May 2, 2000
Site ussrback.com

USSR Advisory #39 - Remote DoS attack in CASSANDRA NNTPServer v1.10 from ATRIUM SOFTWARE Vulnerability. The Ussr Labs Team has recently discovered a buffer overflow problem in the CASSANDRA NNTPServer v1.0. Performing an attack, with excessive login information on Port 119, can cause the process containg the services to stop responding.

tags | remote, overflow
SHA-256 | 17a506747b2a9826304107dde7d83dac57c212fd345197f859dcc3e40633fb0b
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close