exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2004-07-09 to 2004-07-10

lids-2.2.0rc2-2.6.7.tar.gz
Posted Jul 9, 2004
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.

Changes: Minor bug fixes, feature enhancements.
tags | kernel, root
systems | linux
SHA-256 | fc21d49d58b215f92d63f8e494423e769ad2948b23c0413be2c2a3568d494a1e
mozShell.txt
Posted Jul 9, 2004
Authored by Liu Die Yu

Mozilla has a flaw that allows for a remote attacker to trick a user into launching an executable via the SHELL: directive.

tags | advisory, remote, shell
SHA-256 | fd7d9b4c544c63f7beb0438f89709b6c5360fb586f6c3dd818704e9f0530c84a
noranvDoS.txt
Posted Jul 9, 2004
Authored by Bipin Gautam | Site geocities.com

Symantec Norton AntiVirus 2003 Professional Edition and Symantec Norton AntiVirus 2002 suffer from a denial of service condition when scanning files deeply embedded in directories.

tags | advisory, denial of service
SHA-256 | 98ca88296b853b3c220b0bb40bb8a43ab6781054eab9c20398d4b1984888d3d0
glFlow-0.0.2.tar.gz
Posted Jul 9, 2004
Authored by Vlad GALU | Site night.rdslink.ro

glFlow is a pcap-based traffic analysis tool intended for monitoring high speed links. The detection algorithm is based on realtime NetFlow traffic aggregation and analysis. The code is portable across platforms, it should work on every system with working md4/md5 and pcap implementations, with very little modifications.

systems | cisco
SHA-256 | b4d4af5cf3891475b9a0f9ae591a79cd1583d1895b3e95d3acbab9fee2758b06
bios_synscan.tgz
Posted Jul 9, 2004
Authored by Doctor BIOS

BIOS is a fast SYN scanner designed to be quick and sufficient. Source and binary included.

tags | tool, scanner
systems | unix
SHA-256 | b9474d21843daad0679e385ce0f0f9cb302c8a3d75d9e6692c999c48f1178bbe
DHCPing 0.90
Posted Jul 9, 2004
Authored by Gregory Duchemin | Site dhcping.openwall.net

DHCPing 0.90 is a tool that can be used for various security audits allowing an engineer the ability to create valid and invalid DHCP/BOOTP traffic via hping. It also features several exploits for the latest ISC Infoblox and DLink vulnerabilities.

tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 754cd512468cc79d48d24f85f510728175eb4d01826e600d9c314f8af692341f
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close