what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 376 RSS Feed

Operating System: BSD

ttyrpld-2.10.tbz2
Posted Dec 9, 2005
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | efd1922d2885b1dc67a360cd76ba95395d45d05c66fe6e0fed2b5cb96817f223
Debian Linux Security Advisory 896-1
Posted Nov 20, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 896-1 - A buffer overflow has been discovered in ftpd-ssl, a simple BSD FTP server with SSL encryption support, that could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, bsd, debian
advisories | CVE-2005-3524
SHA-256 | 9eadfcd782ddd17713c708e3399d6d772bfd32759c34cca4b085e9dc470273f6
pandora1.1.tar.gz
Posted Aug 14, 2005
Site pandoramon.sourceforge.net

Pandora is a distributed system to monitor processes, performance, status, application or operating parameters of almost any system (AIX, Solaris, Linux, Windows, BSD and Nokia's IPSO). It has a decentralized management system, based in flexible user profiles, that allows generation of graphical reports, defined alarms, and a full incident management system to operate a 24x7 monitoring team.

systems | linux, windows, unix, solaris, bsd, aix
SHA-256 | 035d150cdeb3f1c623a7848c5399880684faabe349452205a7b3ae0b0da6ae11
devialog-0.8.5.tgz
Posted Jun 18, 2005
Authored by Jeff Yestrumskas | Site devialog.sourceforge.net

devialog is a behavior/anomaly/signature-based syslog intrusion detection system which can detect new, unknown attacks. It fits comfortably in a heterogeneous Unix/Linux/BSD environment at the core of a central syslog server. devialog can generate its own signatures and can act upon anomalies as configured by the system administrator. In addition, devialog can function as a traditional syslog parsing utility in which known signatures trigger actions.

Changes: See changelog.
tags | system logging
systems | linux, unix, bsd
SHA-256 | 39c2fcf2300693ea3700193cf40cb49c90c1e34d63567bef1891076db8e3f013
oinkmaster-1.2.tar.gz
Posted May 21, 2005
Authored by Andreas Oestling | Site oinkmaster.sourceforge.net

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

Changes: Slightly improved documentation and examples. Many other changes. Check the changelog for more.
tags | tool, perl, sniffer
systems | bsd
SHA-256 | a3e4e1a2f7eaed3aa441665188300abe1bc95a1f7b4929383af1184171b929e9
devialog-0.8.4.tgz
Posted Apr 18, 2005
Authored by Jeff Yestrumskas | Site devialog.sourceforge.net

devialog is a behavior/anomaly/signature-based syslog intrusion detection system which can detect new, unknown attacks. It fits comfortably in a heterogeneous Unix/Linux/BSD environment at the core of a central syslog server. devialog can generate its own signatures and can act upon anomalies as configured by the system administrator. In addition, devialog can function as a traditional syslog parsing utility in which known signatures trigger actions.

Changes: Enabled mail queueing, added suggested signature logfile.
tags | system logging
systems | linux, unix, bsd
SHA-256 | 3b9ebc92316afbb83ef18ce2cfd52735fdca5039bcf9064a06c82107f55ef35a
SCOSA-2005.21.txt
Posted Apr 18, 2005
Site sco.com

SCO Security Advisory - Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.

tags | advisory, remote, overflow, arbitrary, local
systems | bsd
advisories | CVE-2005-0469, CVE-2005-0468
SHA-256 | 47e004e77d661de8734283de6bd87cbb7957bfb833df1fdc601dad8e564ad138
Gentoo Linux Security Advisory 200504-1
Posted Apr 14, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-01 - A buffer overflow has been identified in the env_opt_add() function of telnet-bsd, where a response requiring excessive escaping can cause a heap-based buffer overflow. Another issue has been identified in the slc_add_reply() function, where a large number of SLC commands can overflow a fixed size buffer. Versions less than 1.0-r1 are affected.

tags | advisory, overflow
systems | linux, bsd, gentoo
advisories | CVE-2005-0468, CVE-2005-0469
SHA-256 | 8bcffc55a21a03c699efde904973c6c98e6c6c72680e822371928de3faa85894
iDEFENSE Security Advisory 2005-03-28.2
Posted Mar 29, 2005
Authored by iDefense Labs, Gael Delalleau | Site idefense.com

iDEFENSE Security Advisory 03.28.05 - Remote exploitation of a buffer overflow vulnerability in multiple telnet clients could allow the execution of arbitrary code. The vulnerability specifically exists in the env_opt_add() function of telnet.c. iDEFENSE has confirmed the existance of the vulnerability in the telnet client included in the Kerberos V5 Release 1.3.6 package and the client included in the SUNWtnetc package of Solaris 5.9. It is suspected that most BSD based telnet clients are affected by this vulnerability.

tags | advisory, remote, overflow, arbitrary
systems | solaris, bsd
advisories | CVE-2005-0468
SHA-256 | de99e8ea1329dbc1f15a968b8c0756e881aa440162190742655fdb287e67ea1c
iDEFENSE Security Advisory 2005-03-28.1
Posted Mar 29, 2005
Authored by iDefense Labs, Gael Delalleau | Site idefense.com

iDEFENSE Security Advisory 03.28.05 - Remote exploitation of an buffer overflow vulnerability error in multiple telnet clients may allow execution of arbitrary commands. The vulnerability specifically exists in the handling of the LINEMODE suboptions, in that there is no size check made on the output, which is stored in a fixed length buffer. iDEFENSE has confirmed the existence of the vulnerability in the telnet client included in the Kerberos V5 Release 1.3.6 package and the client included in the SUNWtnetc package of Solaris 5.9. It is suspected that most BSD based telnet clients are affected by this vulnerability.

tags | advisory, remote, overflow, arbitrary
systems | solaris, bsd
advisories | CVE-2005-0469
SHA-256 | 9a3b7b73eb08fc8817b92e7dac30a75b72f3c015d5bbd074dbfb8f930414a6f2
nessus-installer-2.2.4.sh
Posted Mar 24, 2005
Authored by Renaud Deraison | Site nessus.org

Nessus version 2.2.4 is a free, up-to-date, and full featured remote vulnerability scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available This is the automated *nix installer.

Changes: Fixed several bugs which may impact scanning performance. Reduced CPU usage. A new SMB API to log into the remote Windows hosts.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 8877db4220b9c258e9fc7326ad0f8aaec1f499ab218105a0d328b578c3e141f2
devialog-0.8.3.tgz
Posted Mar 2, 2005
Authored by Jeff Yestrumskas | Site devialog.sourceforge.net

devialog is a behavior/anomaly/signature-based syslog intrusion detection system which can detect new, unknown attacks. It fits comfortably in a heterogeneous Unix/Linux/BSD environment at the core of a central syslog server. devialog can generate its own signatures and can act upon anomalies as configured by the system administrator. In addition, devialog can function as a traditional syslog parsing utility in which known signatures trigger actions.

tags | system logging
systems | linux, unix, bsd
SHA-256 | a4e1ba35a0fc66d0d70d56746dd81d3a047c6d3e6cdd65d48dfef81c9da18a81
nessus-installer-2.2.3.sh
Posted Feb 25, 2005
Authored by Renaud Deraison | Site nessus.org

Nessus version 2.2.3 is a free, up-to-date, and full featured remote vulnerability scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available This is the automated *nix installer.

Changes: Nessus 2.2.3 contains a new option called silent dependencies which can be used to filter out the noise generated by some plugins not directly enabled by the user. It also contains a slightly more intuitive GUI which now contains a Credentials tab to put Windows and SSH usernames and passwords.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | d78a335599794d0a8aa0f10f1acd60c107d024383f25d7b085e35f1b66861d3a
arping-2.05.tar.gz
Posted Feb 10, 2005
Authored by Thomas Habets | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to, or to ping an ethernet address directly. Tested on Linux, {Free,Net,Open}BSD, MacOS X, and Solaris.

Changes: Quiet mode is now actually quiet.
tags | tool
systems | linux, unix, solaris, bsd, osx
SHA-256 | 552c1d34e49b540aa9044cbc376f041abe72c039c9d0006a1b16eb97a97d9996
bglimiter-0.1.tar.gz
Posted Jan 5, 2005
Authored by Albert S. Causing | Site coderhythms.com

Utility for limiting background processes on a per user basis on BSD platforms.

systems | unix, bsd
SHA-256 | 87efdec9a8c8dc19cc2e6a8efa2f03d19a8c4748eaee2b3c1d798bb7c86f4153
nessus-installer.sh
Posted Dec 30, 2004
Authored by Renaud Deraison | Site nessus.org

Nessus v2.0.9 is a free, up-to-date, and full featured remote vulnerability scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available This is the automated *nix installer.

Changes: The bpf sharing system now works fine on BSD systems, so Nessus now only requires one /dev/bpf to work correctly, no matter how many hosts are being tested, all SSL operations now use non-blocking sockets instead of the alarm() trick to handle timeouts, fixed a bug in tcp_ping() would make some probes have a source port set to 0, added functions to libnasl, and minor bug fixes.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 87ebe48fc8a8bcdcafd46a091fb214e8cf97949ea47eea38fa49e9b5f6506455
nessus-installer.sh
Posted Dec 30, 2004
Authored by Renaud Deraison | Site nessus.org

Nessus v2.0.10a is a free, up-to-date, and full featured remote vulnerability scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available This is the automated *nix installer.

Changes: Fixed MacOS X portability issues, Non-intrusive OS-fingerprinting (based on xprobe's techniques), DNS fingerprinting, longer connect() timeout for TCP sockets, fixed hydra.nes .
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 87ebe48fc8a8bcdcafd46a091fb214e8cf97949ea47eea38fa49e9b5f6506455
nessus-installer.sh
Posted Dec 30, 2004
Authored by Renaud Deraison | Site nessus.org

Nessus version 2.0.11 is a free, up-to-date, and full featured remote vulnerability scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available This is the automated *nix installer.

Changes: Compiles on Solaris again, GTK 2.x is now supported, fixed some HTML report problems, Minor performance improvements.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 87ebe48fc8a8bcdcafd46a091fb214e8cf97949ea47eea38fa49e9b5f6506455
nessus-installer.sh
Posted Dec 30, 2004
Authored by Renaud Deraison | Site nessus.org

Nessus version 2.0.12 is a free, up-to-date, and full featured remote vulnerability scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available This is the automated *nix installer.

Changes: Fixed a few bugs, including a race condition.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 87ebe48fc8a8bcdcafd46a091fb214e8cf97949ea47eea38fa49e9b5f6506455
nessus-installer.sh
Posted Dec 30, 2004
Authored by Renaud Deraison | Site nessus.org

Nessus version 2.2.2a is a free, up-to-date, and full featured remote vulnerability scanner for Linux, BSD, Solaris and other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over a thousand remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them. Windows version available This is the automated *nix installer.

Changes: Fixed nessus-fetch use on Solaris, fixed detached scans, and improved http-proxy support over SSL.
tags | tool, remote, scanner
systems | linux, windows, unix, solaris, bsd
SHA-256 | 87ebe48fc8a8bcdcafd46a091fb214e8cf97949ea47eea38fa49e9b5f6506455
tct-1.15.tar.gz
Posted Nov 19, 2004
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, Solaris, and SunOS. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

Changes: Big bug fixes, and really cool new features. Everyone needs to download and use this, right now. Do not delay.
tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | 4c8e343453332bd1fdf0627f9b888e2a4f597e70b367f124cc7f2562558213a1
tcpreplay-2.3.2.tar.gz
Posted Nov 11, 2004
Site sourceforge.net

tcpreplay is a BSD-style licensed tool to replay saved tcpdump files at arbitrary speeds. It provides a variety of features for replaying traffic for both passive sniffer devices as well as inline devices such as routers, firewalls, and the new class of inline IDS's. Many NIDSs fare poorly when looking for attacks on heavily-loaded networks. tcpreplay allows you to recreate real network traffic from a real network for use in testing.

Changes: This release fixes a crash when the pcap caplen > actual packet len. This should never happen, but apparently does. Fixed other minor bugs.
tags | tool, arbitrary, intrusion detection
systems | unix, bsd
SHA-256 | 0f2732c1b64fed61645d2db794a9029ad0a4621f6f38b0bbfc0c7e7c3e0de8fa
unixasm-1.0.0.tar.gz
Posted Oct 24, 2004
Authored by Ramon de C Valle | Site risesecurity.org

A collection of shellcode for various platforms bsd-x86, linux-x86, sco-x86, and solaris-x86.

tags | x86, shellcode
systems | linux, solaris, bsd
SHA-256 | 4ea425bd8e8add22af39fcb210a108dff108ad05535d97ce8c0b6f3b84699efc
oinkmaster-1.1.tar.gz
Posted Oct 24, 2004
Authored by Andreas Oestling | Site oinkmaster.sourceforge.net

Version 1.1 of Oinkmaster. Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

tags | tool, perl, sniffer
systems | bsd
SHA-256 | 60217e5b157b416fbf30272d50b237c49bf15f150e1f2e9b55e3619991f3f854
BSD_shellcode.c
Posted Oct 14, 2004
Authored by Clown

Very small BSD shellcode which does a seteuid(0), execve /bin/sh, exit.

tags | shellcode
systems | bsd
SHA-256 | e350833d1148aee89ff7a3fa83c248a0554102ff569ceb292e19abbd15b41b96
Page 6 of 15
Back45678Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close