exploit the possibilities
Showing 76 - 82 of 82 RSS Feed

Files Date: 2003-02-01 to 2003-02-28

widzv1-5.zip
Posted Feb 4, 2003
Authored by Mark Osborne

WIDZ version 1.5 is a proof of concept IDS system for 802.11 that guards an AP(s) and Monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus/Rogue AP's. It can easily be integrated with SNORT or RealSecure.

Changes: Rewritten to work with the HOSTAP driver, Configurable MAC black list, Configurable SID black list, Custom script directory to process specific events.
tags | tool, local, proof of concept, wireless
SHA-256 | bba8b890ad9df45e6ae49f336a63ff99c182541545f7c64b5f1175fb906b5632
proxychains-1.8.tar.gz
Posted Feb 4, 2003
Authored by Net Creature | Site proxychains.sourceforge.net

Proxychains is a command line tool for Linux and Solaris which allows TCP tunneling trough one or multiple (chained) HTTP proxies.

Changes: Support for SOCKS4 and 5 protocols, more options, a proper installation guide, and more.
tags | web, tcp
systems | linux, unix, solaris
SHA-256 | 3001047568c857efbd33c86231094ba5d90d5523e4bb6f8c456c4e8c7fc9153c
fstream-overflows.txt
Posted Feb 3, 2003
Authored by Killah | Site hack.gr

This paper describes FILE stream overflow vulnerabilities and illustrates how they can be exploited. The author uses a FILE stream overflow in dvips as a case study.

tags | paper, overflow, vulnerability
systems | unix
SHA-256 | 1ba52e016c0392136d39eef96e00aa376e076ea025a6eab55d090bf725634635
prosrc.zip
Posted Feb 3, 2003
Authored by Egemen Tas

proDETECT 0.1 BETA is an open source scanner that uses an ARP packet analyzing technique to detect network adapters which are in promiscuous mode. This tool can therefore be used by security administrators to detect sniffers in a LAN. It can be scheduled for regular scanning over periods and includes advanced reporting capabilities. This is the source code package, the binary package is available WinPcap.

SHA-256 | 8c220e4a8ece0b3345779c7d664763941acede1e82e154c85b9dcb3123eb34e3
ettercap-0.6.9.tar.gz
Posted Feb 2, 2003
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap 0.6.9 is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | 26fc8397c8baae41d13085e0d784640916bbe906b44ba5a9166f126f7cda2252
fwreport-1.0.1.tar
Posted Feb 2, 2003
Authored by Chris Travers | Site sourceforge.net

FWReport 1.0.0 is a log parser and reporter for IPTables. It generates daily and monthly summaries of the log files, allowing admins to free up substantial time, maintain better control over security of the network, and reduce the likelihood that attacks will go unnoticed.

systems | unix
SHA-256 | 4733e349da3d5359a1ead6e850b3715845498392bf612582792c369c45bcd4cd
chkrootkit-0.39a.tar.gz
Posted Feb 2, 2003
Authored by Nelson Murilo | Site chkrootkit.org

Chkrootkit v0.39a locally checks for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x and 4.x, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0.

Changes: Solaris bugs where fixed in chkdirs.c, HP-UX support was added to chkdirs.c, A new Adore version was added to chkproc.c, ps thread error fixed in chkproc.c, a Red Hat 8.0 bug was fixed in chkproc.c and detection for several Slapper variants is added to the package.
tags | tool, trojan, integrity, rootkit
systems | linux, netbsd, unix, solaris, freebsd, openbsd
SHA-256 | c6290a41059d4f3660b135a3cbecaae68e5ad29c3168843f77373a5d6691a710
Page 4 of 4
Back1234Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    12 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close