exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2000-10-03 to 2000-10-04

claymore.tar.gz
Posted Oct 3, 2000
Authored by Sam Carter | Site linux.rice.edu

Claymore v0.3 is an intrusion detection and integrity monitoring system. To accomplish its task, it runs from cron and reads in a list of files stored in flat ASCII, and uses md5sum to check their integrity against that recorded earlier in a database. If the database is placed on a read-only medium such as a write-protected floppy, then it should provide an infallible record against remotely installed trojan horses.

Changes: This release adds ownership / permission tracking and switches to the Digest::MD5 instead of md5sum.
tags | tool, trojan, intrusion detection
systems | unix
SHA-256 | 06701ba8c09c935d0edafbc748a756d38164c63e1a93ae9b4b8fbc2a558da32b
openssh.reverse.tgz
Posted Oct 3, 2000
Authored by teso, Sebastian Krahmer | Site team-teso.net

Openssh-Reverse is a patched OpenSSH which goes in reverse, allowing outside users to connect to machines behind NAT firewalls. In reverse mode, sshd acts as a client and brings the connection to a modified ssh server.

SHA-256 | c83bf07ed61053f6c369bd3bd2c8252548532e232e27ee4365928a0691d9ff64
syslog-ng-1.4.7.tar.gz
Posted Oct 3, 2000
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: New stable release - Fixes memory leaks. Requires libol-0.2.17.
tags | system logging
systems | unix
SHA-256 | 3206d8d58deacf795b7364226adf6d2753d91319fadfccbc88ec09ed6cc1818e
bsd_chpass.c
Posted Oct 3, 2000
Authored by Caddis | Site team-teso.net

/usr/bin/chpass local EDITOR variable format string exploit for *BSD. Tested on OpenBSD, FreeBSD, and NetBSD.

tags | exploit, local
systems | netbsd, freebsd, bsd, openbsd
SHA-256 | 97b3137f4851f097d02215919feb794baf8bc78203a4d676704fcda9229e4198
Pcanyscan.exe
Posted Oct 3, 2000
Authored by Neon-Lenz

Pcanyscan.exe is a windows tool which uses nc.exe to scan for PC Anywhere hosts.

systems | windows
SHA-256 | 7119259f3b686900d20800e719be09c2a2eba006c0396f343ea9a98126f063d1
netsec32.txt
Posted Oct 3, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: SCP file transfer hole, Exploitable Netscape Navigator buffer overflow, Local linux traceroute vulnerabilities, Remote horde and imp vulnerabilities, Nmap dos against OpenBSD ipsec, remote format string bug in lprng, Media Player 7 "OCX Attachment" vulnerability, IE5.5/Outlook allows local reading of files, How Slashdot was hacked, Rijndael chosen as new US encryption standard, What are Digital Signatures, Hardening the BIND DNS Server, Carnivore review team exposed, Linux virus scanner placement, Firewall protection against macro viruses, FreeBSD 4.1.1 release, six headed spam monster, Online security breahes increase, and more.

tags | remote, overflow, local, vulnerability, virus
systems | linux, freebsd, openbsd
SHA-256 | e96c5be4d2ea6985e42e8eef575b1be4ed91ebca96d3da59e8b502514a4cdfef
inebriation.c
Posted Oct 3, 2000
Authored by synnergy, Scrippie | Site synnergy.net

Inebriation.c is a local linux/x86 /bin/su + locale libc functions exploit which has been written in response to previous unreliable exploits for this vulnerability. It includes a perl wrapper to find the correct offset, can use GOT overwrites to evade stackguard, stackshield, and libsafe, uses clean overflow string creation, and has documentation and several other usability improvements.

tags | exploit, overflow, x86, local, perl
systems | linux
SHA-256 | 79c94c5fa03623a02f4886cf1b9049e8f2ca654b18f436c51d3c88a2c462c274
bug-testing.txt
Posted Oct 3, 2000
Authored by synnergy, Dethy | Site synnergy.net

The Importance of Bug Testing - Includes discussion of alpha / beta releases, the importance of bug testing, software development goals, software testing strategies, functional prototypes, designing test sets, defect testing, acceptance testing, and structural prototypes.

SHA-256 | 8bc6adbc535cfdd7f4e996480e70c7cd1a8990ed92f93b47763a32b051f2ba6e
gasp-0.92.tar.gz
Posted Oct 3, 2000
Authored by Laurent Riesterer | Site laurent.riesterer.free.fr

GASP stands for 'Generator and Analyzer System for Protocols'. It allows you to decode and encode any protocols you specify. The main use is to test network applications : you can construct packets by hand and test the behavior of your program when faced with strange packets.

Changes: The network part was fully rewritten to add support for multiple interfaces and asynchronous capture.
tags | tool, protocol
systems | unix
SHA-256 | 13e1b5049da58ff8ed1115506076ee3f2984ba8633933c95304020bbfce0bb8e
scanssh-1.3.tar.gz
Posted Oct 3, 2000
Authored by Provos | Site monkey.org

scanssh scans a list of addresses and networks for running SSH servers and their version numbers. scanssh supports random selection of IP addresses from large network ranges and is useful for gathering statistics on the deployment of SSH servers in a company or the Internet as whole.

Changes: Random address generation now always tries to generate as many addresses as requested even if exludes have been encountered, and bug fixes.
tags | tool, scanner
systems | unix
SHA-256 | edbb7c4484e2d2b3417c86764297d7831da440414803bc4a7d535178b7f4b628
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close