Cisco Security Advisory - The Cisco Secure PIX firewall feature "mailguard" which limits SMTP commands to a specified minimum set of commands can be bypassed. To exploit this vulnerability, attackers must be able to make connections to an SMTP mail server protected by the PIX Firewall. All users of Cisco Secure PIX Firewalls with software versions 6.0(1), 5.2(5) and 5.2(4) that provide access to SMTP Mail services are at risk.
844d365f0b47bcd0fed7bc74723706ea4c035e7ea51e5d953adcdb2706897b20
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
3dd87a3456ea61151d0bd2287b3d8b9e9371d8472d0f756b9fe3ac2800478e1a
THC-RUT (aRe yoU There) is a local network discovery tool developed to brute force its way into wvlan access points. It offers arp-request on ip-ranges and identifies the vendor of the NIC, spoofed DHCP, BOOTP and RARP requests, icmp-address mask request and router discovery techniques. This tool should be 'your first knife' on a foreign network.
57ed9bd93003205ae3738dab5fe7d6c2d887404f5fcbc0a7ef08c05f22715a55
Hydra v1.4 is the world's first parallel login hacker. With this tool you are able to attack several services at once (FTP, POP3, IMAP, Telnet, HTTP Auth, etc).
1e7c26a3b9c5840830cbfe4b20c5f8dc16d52e1db7dc42711e493c8035da5d70
THC-WarDrive v2.0 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.
867fdb212fef9c2ee86ba52fd23b7ca63a5d5187f61ddb0c34345adb112a82cf
iptables is the new packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.
565eabdc7cea7f1203810b37c30dfedc37fb979e145ffa30b7c25d5a9c21d48a
The Linux Port/Socket Pseudo ACLs project is a patch to Linux kernel v2.4 which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.
a73ebf143d0739e1eb292453bf559c1f9cdec32058f30c2394eb8715caa2e556
Firestorm is a Network Intrusion Detection sensor which is multi-threaded, fast, and is pluggable at almost every point.
25d1a40d6e0adbf5ed62b143d1f7a0e416617b5b67d9c4f0e55d11e094db97b4
802.11b Network Discovery Tools is a gtk tool to scan for 802.11b networks using wavelan/aironet hardware and Linux wireless extensions. It includes the ability to log coordinates of found networks from a NMEA compatible GPS device, and can be linked to a serial port.
1fd449b3cfcfecf2aff18bf6d9c0c6c0363c62e10cd530785328adb191408365
Proxy Toolkit is coded in Java and checks to see what information a web proxy forwards.
29df10b97dc837a93d9fbf6d310c5ccfc8236ae4560a8bdac470fa265c494422
Microsoft Security Advisory MS01-049 - A security vulnerability exists in Exchange 2000 Outlook Web Access, because it will accept and process a request for an item in an authenticated user's mailbox without verifying first that the folder structure is valid. An attacker can mount a denial of service attack by repeatedly levying a request for a non-existent but deeply nested folder in his own mailbox. Microsoft FAQ on this issue available here.
94946005340865173ae7c47cce980ae07ca0a2c50db2342cc2005aa10fb1d1f3
FreeBSD Security Advisory FreeBSD-SA-01:60 - Procmail versions prior to procmail 3.20 performed unsafe actions while in the signal handlers. If a signal is delivered while procmail is already in an unsafe signal handler, undefined behavior may result, possibly leading to the ability to perform actions as the superuser under unprivileged local user control.
a15e547ec286cb5b926fcb77bad3b9f6485a830f74e96e8d626520438447fb28