NDiff compares two nmap scans and outputs the differences. It allows monitoring of your network(s) for interesting changes in port states and visible hosts. NDiff should be useful to network administrators, security analysts, and other interested parties who need to monitor large networks in an organized fashion.
9972d8b39599589019567236844c30ea8201f40105147f24b065d8b0658dd263
Tcpip_lib V2 is a library for Windows 2000 which allows arbitrary packet creation. It uses sockets 2 and opens up a raw socket, allowing you to send raw IP headers, do IP spoofing, and play with the nuts and bolts of networking protocols.
50cb614842e4fcbd9f5a423290c0e712b640e2ac42a72ba7595215b13f28c4ed
On July 26th, Thomas Lopatic, John McDonald, and Dug Song released vulnerability information at the Black Hat 2000 briefings that exposed the following security holes in Check Point FireWall-1:
eeedaa029a78ab96887ffba13275188e14b08454b5f8db03caf6f28381fdf2b1
Batchfile for Windows NT with Internet Information Server. This script automates jobs. If there is an attack on your server, starting this script manually enables you to see if something has happened.
f4e162bc9abb6263212ba4527e010ded527477b033e511a6fd7cd498ee5064cf
Sqlpoke is a NT based tool that locates MSSQL servers and tries to connect with the default sa account. A list of SQL commands is executed if the connection is successful. Win32 source included.
0e32d5348e71edf6b856f7663bf1789acfc15a29486062760aba27989754798c
USSR Advisory #53 - Malformed Embedded Windows Media Player 7 "OCX Attachment" Vulnerability. The USSR Team has found a problem in the Windows Media Player 7 ActiveX control, which could be used in a denial of service attack against RTF-enabled e-mail clients such as Outlook 2000 and Outlook Express.
6887a0efab15dca3948af2af037e0e47e29102b12b701b773f27ea873ae55235
Microsoft Security Bulletin (MS00-068) - Patch Available for "OCX Attachment" Vulnerability. Microsoft has released a patch for a security vulnerability in Microsoft Windows Media Player (WMP) 7 but primarily affects e-mail applications. This vulnerability would enable a malicious user to create an e-mail that, when closed after being read, would cause the e-mail application to fail. A FAQ regarding this vulnerability is available here.
2267d9828b2c026ecdf9f241a379d1a2a8f799b2fd1043179eb35d86fbac4d1d
Denial of service for NetcPlus BrowseGate 2.80 for Windows NT and 2000 when you sned more than 8000 characters in a GET / http-request, causing the system to crash.
d3ef954f1000d0d320d818df9bf2c1cb98834ce4871086275220da6bfdf2fb14
Proof of Concept. There exists a vulnerability in Pine 4.21 involving the portion of code in charge of peroidically checking email when a pine client is open.
4c381d3dd367cf74ed25122f66d5999b745e2e0d8ac761b2a7d1dd33c1d5f17c
This hole is for the control panel of all Alabanza based resellers/hosts. There could be more bugs. This is serious enough since you can delete all resold domains for a particulr webhosting company. You can also change the default MX and CNAME records of all associated domains.
53801f2b11521cbfb88f3a244efe6da453e8cf7c77bc1c4480c79b3231bb1fc6
A problem lies in that there is a Java SNMP MIB Browser Object ID parsing problem which can cause a Denial of Service. Platforms affected are: HP9000 Series 700/800 running HP-UX releases 10.XX and 11.XX, Sun Microsystems SOLARIS releases 2.X, plus under Microsoft Windows NT4.X/ Windows 2000 running NNM 6.1, NNM 5.01, and NNM 4.11.
f03861bd000202508283bfa2dda6e995d3c9b8dc31e44a7a007686ff9f282852
Klogd Local Exploit. Envcheck is a Linux/x86 kernel module which strips dangerous environment variables before executing a new program, and which can be used to log these probably threatening events. However, a recent format string handling bug in klogd allows an attacker to overflow its buffer and execute arbitrary code.
00657f3b775f48ad572550dfdff266b0e9640533df27a3bbd59dfc91f83192eb
Caldera Advisory - There is a format bug in the LPRng printer daemon that could possibly be exploited to obtain root privilege. This problem is particulary severe because it can be exercised remotely.
ce5a6fb6fa064fe5353a6cbce23cc3f20fc3c1a670d00d8478d93f4ce3f4b9ec
Snorticus is a collection of shell scripts designed to allow easy managment of Snort sensors. It allows you to routinely collect Snort sensor data, analyze the data via SnortSnarf, and easily maintain rule files.
f8d621dd59448d2e46229ef059992ce0cfe7c5db402e9a1ab1da4508c3cef260
A simple ICMP Source Address spoofing utility. A smurfing utility that also comes with log parsers, etc.
b4cd3707d8384f81947841c466f336ddc9c621a62110e789eee6623266d1b408
motion uses a video4linux device as a motion detector. It will make snapshots of the movement it sees, making it usable as an observation or security system. It can send out email, SMS messages, or invoke an external command when detecting motion.
5761b4027e68c677bfe479a1acd8f22d1969f4e02bf412e6b2e9262ed9caf2dd
MailScan is an email scanner that plugs into Sendmail which passes all messages into MailScan for scanning/filtering/optional-virus-scanning before being delivered or quarantined.
add036fef0973e4e77e2fc11c74d42252a733d4b7366b8c77fd4eb9e1419f564
Netcat with encryption for Linux and Windows - This is the classic network utility Netcat, with Twofish encryption. Includes Windows and Linux source and binary. To make it secure you need to change the hardcoded key.
cf11fce4287f940060b85a4699609e2f2417a7624c704d34506a3b3f1255f35e
OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
5215b670c2674df9a642565ea68a67e6d955d8efcca1aa1b4e6a5b4fd2744ee8
floppyfw is a router and simple packet filtering firewall on one single floppy. It uses Linux ipchains firewall capabilities and includes a simple packaging system. It is perfect for masquerading and securing networks on ADSL and cable lines using both static IP and DHCP. It is simple to install, you only need to edit one file on the floppy.
c4ee0cc409ce5159047ffb4720cc535cc3ad0e999007da716a12168559b00f9f
closefd v1.1.3-ok is a kernel module which closes a file of any process for Linux 2.2.x. It works on regular files, sockets, directories, pipes, etc.
7e8579d112cfa2997f916dcd06416a458ac32692645c6ce587b357f40e93b8fe
Denial of service exploit for CiscoSecure ACS for Windows NT Server prior to release 2.4(3), as described in cisco.00-09-21.ciscosecure. Sends an oversized URL to TCP port 2002, causing the CSAdmin module to crash.
d76e6d70deea1e08c86802aa50e2b1dc8d782a0cb82ae1a351ea663e9c68ef64
Cisco Security Advisory - This advisory highlights three vulnerabilities found in the CiscoSecure Access Control Server for Windows NT. The first bug is a buffer overflow in the CSAdmin module that allows a malicious user to execute arbitrary code or crash the module by sending an oversized packet to TCP port 2002. The second vulnerability involves sending an oversized TACACS+ packet to the CiscoSecure ACS thereby creating an unstable condition within the system conducive to denial of service attacks. Lastly, the enable password can be bypassed to gain unauthorized access to a router or switch if the interaction is between an LDAP server that allows null passwords and a CiscoSecure ACS for Windows NT. All releases of CiscoSecure ACS for Windows NT Server up to and including 2.1(x), 2.3(3), and 2.4(2) are vulnerable. CiscoSecure ACS for UNIX is not affected.
c230ea8e43185ba2ece9c31b2ac308f4498d45ee881a3a4a2f35e0351d9bdc5f
Microsoft Security Bulletin (MS00-067) - Microsoft has released a patch for the "Windows 2000 Telnet Client NTLM Authentication" vulnerability in the telnet client that ships with Microsoft Windows 2000. The vulnerability allows a malicious user to obtain cryptographically protected NTLM logon credentials from another user by creating a HTML document that, when opened, attempts to initiate a Telnet session to a rogue telnet server. Microsoft FAQ on this issue available here. By
34c0e50c48ca898fba0caa41c3a1760910f4f14b482584bf5b5a60d7a1017fb5
The virtual private network daemon vpnd is a daemon which connects two networks on network level either via TCP/IP or a (virtual) leased line attached to a serial interface. All data transfered between the two networks are encrypted using the unpatented free Blowfish encryption algorithm. Functional overview available here.
06c9ef950e12a1ff05a6ef5cb69bbc937c548492d3d5baa9cec8315e126f9cd6