what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2001-10-18 to 2001-10-19

Posted Oct 18, 2001
Site mavetju.org

Ipfw-graph displays a graphical overview of the amount of bytes going through your FreeBSD ipfw-rules and a piled overview of the percentage based on which rule it happened.

tags | tool, firewall
systems | unix, freebsd
SHA-256 | 445cc53409fdf516cf5fb1af20253331265a2fdc9e36c81458fa9389da3fcaca
Posted Oct 18, 2001
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: New dissectors include GIOP CosEventComm, Quake 3 Arena, GMRP, GTP, HMIPv6, OSPFv3, MMSE, UCP, and the Skinny Client Control Protocol. Many other dissectors were enhanced, and updates were made to the user interface.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 41665c8dc7ea0746a504ecf19cc4a77f307fed8ffc8c1d1bac3d4b2a19710780
Posted Oct 18, 2001
Site cse.fau.edu

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: RWHOIS is now being used for ARIN as well as domain lookups. Bugs have been fixed.
tags | tool, remote, sniffer
SHA-256 | f3d2808aedba283d932feccb92c56fc6400bf41a09006aa8dab2182362aec3ca
Firewall Builder With GUI
Posted Oct 18, 2001
Site fwbuilder.org

Firewall Builder consists of object-oriented GUI and set of policy compilers for various firewall platforms. In Firewall Builder, firewall policy is a set of rules, each rule consists of abstract objects which represent real network objects and services (hosts, routers, firewalls, networks, protocols). Firewall Builder helps user maintain database of objects and allows policy editing using simple drag-and-drop operations. Firewall Builder can be used to manage firewalls built on variety of platforms including, but not limited to, Linux running iptables and FreeBSD or Solaris running ipfilter.

tags | tool, firewall, protocol
systems | linux, solaris, freebsd
SHA-256 | 56427fb7fe0bb13b185e6ab52a016f4c7ec66424a49639c32ffc4708631d711a
Posted Oct 18, 2001
Site netdude.sourceforge.net

Netdude is the NETwork DUmp data Displayer and Editor for tcpdump tracefiles. It is a GUI-based tool that allows you to make detailed changes to packets in tcpdump tracefiles. It can set the value of every field in IP, TCP, and UDP packet headers, copy, move, and delete packets in the tracefile, and fragment and reassemble IP packets. Netdude addresses the need for a tool that allows developers of networking code to easily create specific traffic patterns in order to test features of their software. Tested on Linux and FreeBSD.

tags | tool, udp, sniffer, tcp
systems | linux, freebsd
SHA-256 | f34961b4787080babac787618b4f2457859ed5b6ef94719455a03419aec8131a
Posted Oct 18, 2001
Site atstake.com

SPIKE is an attempt to write an easy to use generic protocol API that helps reverse engineer new and unknown network protocols. It features several working examples. Includes a web server NTLM Authentication brute forcer and example code that parses web applications and DCE-RPC (MSRPC).

tags | web, protocol
systems | unix
SHA-256 | 7e69f5a7ea1c2db4f13b9a857608b55c2483d9a7cac5201fa6c77932596fff0e
Posted Oct 18, 2001
Site atstake.com

Sharefuzz is a shared library which automatically detects environment variable overflows in Unix systems. This tool can be used to ensure all necessary patches have been applied, or as a reverse engineering tool.

tags | overflow
systems | unix
SHA-256 | 0480a8b835c431bca82601dd41dc51c21bcc45bbe1255266dc0b363224021c64
Posted Oct 18, 2001
Site atstake.com

Dcetest is a tool which probes a windows machine over TCP port 135, MSRPC endpoint information. It can be though of as the equivalent of rpcinfo -p against a Windows box. Dcetest can also be very useful once inside a DMZ to fingerprint Windows machines on the network.

tags | tool, scanner, tcp
systems | windows, unix
SHA-256 | ffbb04526ee0bf44a9473b3dcc612da556022d5a3544d152f88fba267258ba75
Posted Oct 18, 2001
Site modssl.org

mod_ssl provides provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1). It is based on the SSL/TLS toolkit OpenSSL and supports all SSL/TLS related functionality, including RSA and DSA/DH cipher support, X.509 CRL checking, etc. Additionally it provides special Apache related facilities like DBM and shared memory based inter-process SSL session caching. per-URL SSL session renegotiations, DSO support, etc.

Changes: Updated to work with Apache 1.3.22. Some bug fixes were made.
tags | encryption
SHA-256 | 258d6de5c22c0dd6882ba379b29ecf97f133631f9c1b14f950ae016c6034b098
Posted Oct 18, 2001
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed.

Changes: Two security updates - Closed autoindex /?M=D directory listing hole reported in bugtraq id 3009 which returned directory listings if multiviews and indexes are enabled.. Made split-logfile use the default logfile name if "/" or "\" are present in the virtual host name. This prevents the possible use of specially crafted virtual host names in some configurations to allow writing to any .log file on the system. Fixed quite a few minor bugs. Changelog available here.
systems | unix
SHA-256 | a62d1ce96e01b798f8d6ef33269508e96d8d8149f2d068dcc212d1697a82d06d
Page 1 of 1

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    15 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By