all things security
Showing 51 - 75 of 329 RSS Feed

Operating System: BSD

rathole-1.2.tar.gz
Posted Nov 30, 2007
Authored by Incognito/STK

RatHole is a unix backdoor which compiles cleanly on standard Linux and OpenBSD (probably other BSD flavors also) without additional libraries. It features blowfish encryption, process name hiding and definition of a preferred shell. It spits no error messages (like for sockets already bound) because it is supposed to be stealth. When a client connects to the backdoor a new shell process and two pipe files are created. The I/O of the shell is duped to the pipes and the daemon encrypts the communication.

tags | tool, shell, rootkit
systems | linux, unix, bsd, openbsd
MD5 | c652966a5d9a09c29369794979d4ac6b
iDEFENSE Security Advisory 2007-11-14.3
Posted Nov 15, 2007
Authored by iDefense Labs, Sean Larsson | Site idefense.com

iDefense Security Advisory 11.14.07 - Local exploitation of a heap based buffer overflow in Apple Inc.'s OS X may allow an attacker to execute arbitrary code in kernel context. The vulnerability exists within a function responsible for allocating an mbuf. mbufs are a BSD concept, long used by BSD kernels to allocate buffers for storing network related data. iDefense has confirmed the existence of this vulnerability in Mac OS X 10.4.10, Workstation and Server editions. Previous versions may also be affected.

tags | advisory, overflow, arbitrary, kernel, local
systems | bsd, apple, osx
advisories | CVE-2007-4268
MD5 | 6de650a9d042d02fefa2db42ec8f8855
mobilemail_libtiff.rb.txt
Posted Oct 23, 2007
Authored by H D Moore, Kevin Finisterre | Site metasploit.com

This Metasploit module exploits a buffer overflow in the version of libtiff shipped with firmware versions 1.00, 1.01, 1.02, and 1.1.1 of the Apple iPhone. iPhones which have not had the BSD tools installed will need to use a special payload.

tags | exploit, overflow
systems | bsd, apple, iphone
MD5 | 92e658f30a2a455067ca9db033446795
safari_libtiff.rb.txt
Posted Oct 23, 2007
Authored by H D Moore, Kevin Finisterre | Site metasploit.com

This Metasploit module exploits a buffer overflow in the version of libtiff shipped with firmware versions 1.00, 1.01, 1.02, and 1.1.1 of the Apple iPhone. iPhones which have not had the BSD tools installed will need to use a special payload.

tags | exploit, overflow
systems | bsd, apple, iphone
MD5 | a52fa90d5222ed2fd16f87b679276bad
ttyrpld-2.19.tar.bz2
Posted Sep 19, 2007
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: The kernel interface has been reduced. Various other tweaks and fixes.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | ca4d1473082eb5a38582a626d5b9360d
devialog-0.9.0.tgz
Posted Jul 7, 2007
Authored by Jeff Yestrumskas | Site devialog.sourceforge.net

devialog is a behavior/anomaly/signature-based syslog intrusion detection system which can detect new, unknown attacks. It fits comfortably in a heterogeneous Unix/Linux/BSD environment at the core of a central syslog server. devialog can generate its own signatures and can act upon anomalies as configured by the system administrator. In addition, devialog can function as a traditional syslog parsing utility in which known signatures trigger actions.

Changes: See changelog.
tags | system logging
systems | linux, unix, bsd
MD5 | 23a4ddf4b5e27adb4d2a2f2244ad1f73
googlegath.txt
Posted Dec 8, 2006
Authored by Matteo Cantoni | Site nothink.org

googlegath is a free open source utility to obtain informations through Google searches. It could be useful for penetration testing, security scanning, etc. googlegath has been tested on GNU/Linux, *BSD systems.

tags | web
systems | linux, bsd
MD5 | 7258710bb9b915f89b5a84dcbc1c06ae
snmpcheck-1.6.txt
Posted Dec 6, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a free open source utility to get information via SNMP protocols. It works fine against Windows, Linux, Cisco, HP-UX, SunOS systems and any devices with SNMP protocol support. It could be useful for penetration testing or systems monitoring. snmpcheck has been tested on GNU/Linux, *BSD and Windows (Cygwin) systems.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | 9545e5fd6e9f8ee19414e98d6fe0756c
sharpener.txt
Posted Nov 21, 2006
Authored by Jesus Oquendo | Site infiltrated.net

Sharpener is an ssh brute force blocking tool for Linux and the BSD's (Open/Net/Free). It runs in cron and parses out the brute force attempts to your server and automatically blocks those hosts from connecting. The script will also send an email of the attackers address to an account.

systems | linux, unix, bsd
MD5 | 14a3549a3f18dbb5349ee5323a4044db
bsd.patch
Posted Nov 16, 2006
Authored by Rodrigo Rubira Branco | Site kernelhacking.com

Firewire patch for BSD kernels that fixes an improper length check.

tags | kernel, patch
systems | unix, bsd
MD5 | ee54941f2801ae7dffe4bf7236120a89
sh2log-1.0.tgz
Posted Nov 9, 2006
Authored by Christophe Devine

sh2log is a PTY sniffing program that captures all keystrokes and console output of physical and virtual consoles. sh2log works as a userland keylogger and does not require installation of a kernel module. Consequently, it can be run on a wide range of different UNIX platforms: Linux, SunOS, BSD, AIX, etc. The essential method of use here is that it man in the middles standard shells.

tags | shell, kernel, system logging
systems | linux, unix, solaris, bsd, aix
MD5 | 3742a060f5fdc97ee21bd8387a4bb80b
prdelka-vs-SUN-telnetd.c
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

Solaris in.telnetd 8.0 and prior remote exploit. A boundary condition error exists in telnet daemons derived from the BSD telnet daemon. Under certain circumstances, the buffer overflow can occur when a combination of telnet protocol options are received by the daemon. The function responsible for processing the options prepares a response within a fixed sized buffer, without performing any bounds checking. This exploit has been tested against Solaris 7 & Solaris 8 (sparc).

tags | exploit, remote, overflow, protocol
systems | solaris, bsd
MD5 | 113abf242f87ad50cf0bf00692925a89
ocpbof.zip
Posted Aug 17, 2006
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept exploit for buffer overflows in Open Cuber Player versions 2.6.0pre6 and below on DOS/Windows and versions 0.1.10_rc5 and below on Linux and *BSD.

tags | exploit, overflow, proof of concept
systems | linux, windows, bsd
MD5 | ed0df8779b22c223e018a948da795ad8
ocpbof.txt
Posted Aug 17, 2006
Authored by Luigi Auriemma | Site aluigi.org

Open Cuber Player versions 2.6.0pre6 and below on DOS/Windows and versions 0.1.10_rc5 and below on Linux and *BSD suffer from buffer overflows.

tags | advisory, overflow
systems | linux, windows, bsd
MD5 | b439a9d96a0628fa0e476123d348d45e
snmpcheck-1.5.txt
Posted Jul 24, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | a014c48f9bfa42555918cdb6d3170222
ttyrpld-2.18.tar.bz2
Posted Jul 2, 2006
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Fixed OpenBSD 3.9 kpatch. Readded workaround for OpenBSD/NetBSD EINTR signal handling that got lost in 2.17.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | b704ad4834e4b88c8979f5daf8f53ed1
ttyrpld-2.17.tar.bz2
Posted Jun 20, 2006
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Added support for Linux 2.6.17, FreeBSD 6.1, OpenBSD 3.9.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | 490714fea6757cb72876bbacf9466963
ttyrpld-2.16.tbz2
Posted Apr 29, 2006
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Added various support and tweaks.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | 7b64785ff828c4f93341afbbe07186cc
libShellCode-0.3.2.tar.gz
Posted Apr 28, 2006
Authored by ORK | Site orkspace.net

libShellCode is a library that can be included when writing Linux and BSD i386 based exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Completed support for BSD shellcodes.
tags | shellcode
systems | linux, bsd
MD5 | 41d56a5783b07edf92d15bc80134d968
Gentoo Linux Security Advisory 200603-26
Posted Apr 1, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-26 - Tavis Ormandy of the Gentoo Linux Security Audit Team discovered that the checkscores() function in scores.c reads in the data from the /var/games/tetris-bsd.scores file without validation, rendering it vulnerable to buffer overflows and incompatible with the system used for managing games on Gentoo Linux. As a result, it cannot be played securely on systems with multiple users. Please note that this is probably a Gentoo-specific issue. Versions less than 2.17-r1 are affected.

tags | advisory, overflow
systems | linux, bsd, gentoo
MD5 | abff991f33fcb4f2f9629e0bda27869f
snmpcheck-1.3.pl.txt
Posted Apr 1, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
MD5 | 78c3e12d760a9bbb0ad0c3e121e00634
Secunia Security Advisory 19442
Posted Mar 31, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tavis Ormandy has reported some vulnerabilities in the bsd-games package, which potentially can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
systems | bsd
MD5 | 5ac9557b50c93cfd21e5175cec802bae
ttyrpld-2.15-src.tbz2
Posted Mar 15, 2006
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Added support for NetBSD 3.0. Various fixes.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
MD5 | 4e4c8ffa170ea1cd7c31e5443d39039c
oinkmaster-2.0.tar.gz
Posted Mar 9, 2006
Authored by Andreas Oestling | Site oinkmaster.sourceforge.net

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

Changes: Major version bump to celebrate that Oinkmaster has now turned 5 years old! Check the changelog for more.
tags | tool, perl, sniffer
systems | bsd
MD5 | d2a1b56f51cf40e919c63206ca4ec8f8
fupids2-0.8.5.tgz
Posted Feb 16, 2006
Authored by Steffen Wendzel

fupids2 is a so-called human oriented IDS based on the FUPIDS project. fupids2 calculates an attacker level for every user on all Unix/Linux/BSD systems in the network. It looks at the behavior of the user (the programs the user uses, the daytime the user is active, the building and room the user uses, the part of the room in which the user sits, and so on) and reports if the user engages in behavior that is unusual for that person. This method can often detect accounts overtaken by attackers.

tags | tool, intrusion detection
systems | linux, unix, bsd
MD5 | 99b34dafee4ef81a3ec9b008071a12b8
Page 3 of 14
Back12345Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    8 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close