The Code Red worm is likely to start spreading again on July 31, 2001 at 8:00 EDT. All IIS 4 and 5 users MUST upgrade immediately! Fix for NT 4.0 available here.
6c9c02a04bec8e369b5d9d6a559029473f1a46e95779d6c1759e5299505cb94c
Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex.
94464b6f9d468a51a8a2798e52ea2eb306b48426cc45b4b160f85f31d603e6a3
The Windows 2000 telnetd service is vulnerable to a remote denial of service attack. The service crashes when scanned for the recent AYT telnetd vulnerability discovered by Scut. Includes SPtelnetAYT.c, a scanner for the AYT vulnerability in telnet daemons build upon the BSD source.
0ef77272ca00d7561e2ec1a992da524fa9ac1e25f7723de4dd30a596d8a408ce
Saint Jude LKM is a Linux Kernel Module for the 2.2.0 and 2.4.0 series of kernels. This module implements the Saint Jude model for improper privilege transitions. This will permit the discovery of local and remote root exploits during the exploit itself. Once discovered, Saint Jude will terminate the execution, preventing the root exploit from occurring. This is done without checking for attack signatures of known exploits, and thus should work for both known and unknown exploits.
10ed91c76ecba958bba10ae5f2976871efdc47add4787b162dbce8be5ca574c9
/usr/bin/pileup local root exploit. Tested against Debian 2.2.
91ffd9b5c600d6641fc76b93d1585a6c5bdb92d4d9d1ce2ffd0e8c74e173e9b9
Squid can be used to port scan if set up as a httpd accelerator (reverse proxy). Tested on Redhat 7.0.
40e7bb73d56456e9d9dcc70a1024c98673b814cb113d372d8513594c244df0fb
TESO Security Advisory #11 - Multiple vendor Telnet Daemon vulnerability. Most current telnet daemons in use today contain a buffer overflow in the telnet option handling. Under certain circumstances it may be possible to exploit it to gain root privileges remotely. Affected systems include BSDI 4.x, FreeBSD, IRIX, Linux with netkit-telnetd < 0.14, NetBSD, OpenBSD 2.x, and Solaris.
4849ac76d26caec6f947c4879fceb873db9d4fbf399d4ebadda0a88587f6c0ba
Adore is a linux LKM based rootkit for Linux v2.[24]. Features smart PROMISC flag hiding, persistent file and directory hiding (still hidden after reboot), process-hiding, netstat hiding, rootshell-backdoor, and an uninstall routine. Includes a userspace program to control everything.
bc8ab5303f03a7435098e0a13569dd423675198c8181472e3c458b68a2296ecf
DEStroy-0.6.pl is a perl script which uses DES to encrypt files and makes an attempt to securely remove the plaintext. Works with ASCII and binary files.
11476384e0f48e50c3ef8ba4c6c9a0cbdc290fc72fbfafaabf30522981a88223
IBM DB2 (which works under W98/NT/2000) Proof of concept Denial of Service. Sending 1 byte to port 6789 or 6790 IBM DB2 crashes, as described in ibm.db2.dos.txt.
44d64dfbdbb1557b294143c33f8c5588ad8abdebac45e6280e99353be9cf7797
The Stealth HTTP Security Scanner v1.0b30 provides more than 12000 http vulnerability checks. Runs on Win32 and Linux under Wine. Free.
548363d5e0b64dfa72beaad99e0981ca6ba08436231b2089abf33b96f7c55072
The IP Personality project is a patch to Linux 2.4 kernels that adds netfilter features: it enables the emulation of other OSes at network level, thus fooling remote OS detection tools such as nmap that rely on network fingerprinting. The characteristics that can be changed are TCP Initial Sequence Number (ISN), TCP initial window size, TCP options (their types, values and order in the packet), IP ID numbers, answers to some pathological TCP packets, and answers to some UDP packets.
e48ed49e11daf6287541ef54e52353431bba2aae7226fda5c1a75d43f7ffc8d7
Windows NT Rootkit v0.04 alpha - Hides processes, files, directories, has k-mode shell using TCP/IP - you can telnet into rootkit from remote. Hides registry keys - (keyboard patch disabled in this build.) Includes execution redirection.
383977e8f03d50438f27eb405e673676a70a76c7ce2b9be0aa18be86fa14f306
This package contains all codes prepared for technical paper - UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes. For every discussed processor architecture samples of various assembly components are included.
b198c0c0a17e1e73d1170ac01516e46602412eb03ffe85f6eeb00bf35c7ed193
Unix Assembly Code Development for Vulnerabilities Illustration Purposes v1.02 - Covers IRIX / MIPS, Solaris, HP-UX, AIX, Ultrix, Linux, BeOS, and BSD. Includes system call invocation information, code specifics, "Zero free" code, ASM functionality, and examples.
62d2e8de6232b3ff6562e6a1ae2a27a030259d2647d85ffb2ae413a70b82d7e1
Microsoft Security Advisory MS01-041 - Several of the RPC servers associated with system services in Microsoft Exchange, SQL Server, Windows NT 4.0 and Windows 2000 do not adequately validate inputs, and are vulnerable to a remote denial of service attack. Microsoft FAQ on this issue available here.
e1f72be59317f491b185d7e733c56ed904195aa7bc19d7c27dc88996e81a8a70
Microsoft Security Advisory MS01-042 - Windows Media Player v6.4, 7, and 7.1 contains a buffer overflow which allows remote code execution through opening an email or visiting a malicious web site. Microsoft FAQ on this issue available here.
dddbc16c5f5eac0683d11962bf6043a8609e6811299a36d8a3fb2053528d80b5
Pic / LPRng format string remote exploit. Pic is part of the groff package. It is used by troff-to-ps.fpi as uid lp when perl, troff and LPRng are installed. Tested against Redhat 7.0 (groff-1.16-7).
7f88ccf027b5e0d7c51b9f01279051f34a9d4df2f8d1ae6ccce5a1fbec9db7ff
Firewall Builder consists of object-oriented GUI and set of policy compilers for various firewall platforms. In Firewall Builder, firewall policy is a set of rules, each rule consists of abstract objects which represent real network objects and services (hosts, routers, firewalls, networks, protocols). Firewall Builder helps user maintain database of objects and allows policy editing using simple drag-and-drop operations. Firewall Builder can be used to manage firewalls built on variety of platforms including, but not limited to, Linux running iptables and FreeBSD or Solaris running ipfilter.
e30bd52563786f6d9f986c32527c8aa3beba154bee412ef0ecea1b7fb4acc793
Jail Chroot Project is an attempt of write a tool that builds a chrooted environment. The main goal of Jail is to be as simple as possible, and highly portable. The most difficult step when building a chrooted environment is to set up the right libraries and files. Here, Jail comes to the rescue with a tool to automatically configures & builds all the required files, directories and libraries.
7ba4b44fa94c0777e038d48198ae15d92e952d9097253e0bf6587e09f3111cce
The Mambo Site Server v3.0.0 - 3.0.5 contains a vulnerability which allows users to gain administrative privileges by changing global variables via URL parsing.
130f26d521cff30052559a9d02cc0b8dd1f05866aefac6e2932959bd6a3d136d
Ettercap is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.
dd20286014808bf9dcf00a3cc04ac9b3a0a6933c84d6415df46137b0504ea4a0
Jail Chroot Project is an attempt of write a tool that builds a chrooted environment. The main goal of Jail is to be as simple as possible, and highly portable. The most difficult step when building a chrooted environment is to set up the right libraries and files. Here, Jail comes to the rescue with a tool to automagically configures & builds all the required files, directories and libraries.
38dd1866f81fbed0721377b5badc529448c06f26e935ec0eb2f2eed9bb8150c0
Protecting Corporate and Enterprise Networks Against Insider Threats - The aim of this text is to provide a basic understanding of how important it is to maintain security within the corporate network, and to offer some theory and technique that the Hacker (The insider) may use or may be using to penetrate vital systems within your organization.
5ec4948937dc717974ed6bdf19e5686ce4a02c357d7f5f0ea6003868dc54d808
Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.
d77c1d52b7ede8d864490d563f7de3841605942ac9922a458ccce1868d830305