SDC, or Self Decrypting Binary Generator, creates self decrypting binaries for common operating systems and architectures. The target file is encrypted using Blowfish in Cipher text Feedback Mode (CFB) and appended to an executable which reads itself and attempts to decrypt the appended data when it is run. Targets: Linux x86 (ELF), Windows x86 (PE-COFF), OpenBSD x86 (ELF), OpenBSD arm (ELF), OpenBSD sparc64 (ELF), FreeBSD x86 (ELF), NetBSD x86 (ELF), Solaris sparc (ELF).
f8223b21d9e0665d1c51a15c3ff8648c9be5ab04838d19b5a89c5059b1b40aff
Secunia Security Advisory - A security issue has been reported in NetBSD, which can weaken certain security features.
8d1fc904126dcb25d4249126aa9f7ec22c10e54b35da14058bd39af52843d816
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
3f2b15645bc76ff146839678164992fe688df5de8cbba2fc2ae9bb483cba9729
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
cba055d5fef8b0cfbec74e801de9c3cfa2846305961e125afbf1a2c8a0f65a8b
Secunia Security Advisory - NetBSD has acknowledged a vulnerability in racoon, which can be exploited by malicious people to cause a DoS (Denial of Service).
d6786ea2b671c97e194847413684a783cf7fb8ecb287b09f1de99b4c7f04168a
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information.
2ae1908f524b64f177e19f8e5ad50c8badea66a0fc67e118a469545af7f73e01
Secunia Security Advisory - A security issue has been reported in NetBSD, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information.
a86b978113b3890b522b24d99b8c6a827805cfa1bfd56d26be4cae9f1cbdcb03
Secunia Security Advisory - NetBSD has acknowledged a vulnerability in sendmail, which can be exploited by malicious people to compromise a vulnerable system.
b7a79d18f740f1d13009ae53940387613bdb1d9fbc6368b550f1045caa766547
p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris.
41d5cff0c19ab4add7345ce4326250d294cc6dec98912b229234e413320f7fff
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
7a8c364fe1653c8f9d64054d07d2272ea239a5225ce2044024d79467df873c18
Due to a flaw in the original patch implemented by the NetBSD team in release 2.0.3 the kernfs_xread function was still vulnerable to exploitation. OpenBSD's 3.8 kernel release contained the same vulnerability and the same type of patch as NetBSD 2.0.3.
8fe555f8c520379aa28614c76969106b728b7c0809137d7782deff1798f0da9b
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to disclose potentially sensitive information.
b0c1bc0b179dfeb0abd3d5fb1f59f350bdf5a0a70a77b1b33c40f3b2f6bc1830
NetBSD Security Advisory 2006-002 - The prohibition against setting the system time backwards at securelevel > 1 can be circumvented.
33a33c215be8aa045ca247a1c0e1ac47c59ae2bd144cf0a07a66691b4e87e4ae
NetBSD Security Advisory 2006-001 - The kernfs filesystem does not validate file offsets properly and a userlevel non-privileged process can read arbitrary kernel memory locations.
56fccbb5673d5da87cdc6963c43be8e91b263483cf2743118931ef3514e00591
The implementations of securelevels on NetBSD and Linux contain an integer overflow, allowing the protection of system time to be completely circumvented.
5d86a7cf0432dc4890c84c7e30065c97959f3e07f3b3ce13d5a6856179985dcf
NetBSD/i386 2.0, callback shellcode (port 6666);
985380f3d689bef3424d8fbcad233c5443e4fe61f00063be20e410f22ba6af7e
NetBSD/i386 2.0, setreuid(0, 0); execve("/bin//sh", ..., NULL); shellcode. 29 Bytes.
2361c89276305bd09af3f19909dd5cda1173703a34b42ec8f14d0baaec5e090a
NetBSD/i386 2.0, setreuid(0, 0); execve("/bin//sh", ..., NULL); shellcode. 30 Bytes.
117af4cd119203328bda7ac1a71cede1ce1eff0d09363550faf1f7a805060a54
NetBSD versions 2.1 and below ptrace() local root exploit.
e206abdb40eb38c1a16aff4226d7394d290524b17f83c8baa92a4a7a2137452e
Secunia Security Advisory - Some vulnerabilities have been reported in NetBSD, which can be exploited by malicious, local users to gain escalated privileges, or by malicious users to cause a DoS (Denial of Service) and compromise a vulnerable system, or by malicious people to bypass certain security restrictions and compromise a user's system.
8beba4ad50a3c7e98f7b31295a9185fa7a52a310510e13baa45d01ba5460b0d6
Secunia Security Advisory - A vulnerability has been reported in NetBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
4c572f6258c5604a7be9d68632589c3878f65abb10f95ca1d36dd5dee1186e8f
NetBSD Security Advisory 2005-001 - The Pentium CPU shares caches between HyperThreads. This permits a local process to gain a side-channel against cryptographic processes running on the other HyperThread. Testing for cached data can be accomplished by timing reads. Under some circumstances, this permits the spying process to extract bits of the key. This has been demonstrated against OpenSSL.
1b841f93dab7671b35f142bbbc58e744bd20646981c20572bd1835e0628b395c
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
469e0087f9ab460d901241b6d80b1ad341ba5827e643127c68c4b865bc9e1972
Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.
4fa1e262dff5b6a08f1e81a625e335d9a832f445116798c5350dc8f72694fdcc
Chkrootkit checks locally for signs of a rootkit. Chkrootkit includes ifpromisc.c to check and see if the interface is in promisc mode, chklastlog.c to check lastlog for deletions, and chkwtmp.c to check wtmp for deletions, strings.c for quick and dirty strings replacement, check_wtmpx.c to check for wtmpx deletions and the files chkproc.c and chkdirs.c to check for LKM trojans. Tested on Linux 2.0.x, 2.2.x and 2.4.x, FreeBSD 2.2.x, 3.x, 4.x, and 5.x, BSDI, OpenBSD 2.6, 2.7, 2.8, 2.9, 3.0 and 3.1, NetBSD 1.5.2 and Solaris 2.5.1, 2.6 and 8.0, and HP-UX 11.
67ce369dee026bd488baa977483c0d9784bc6763c815f6018ce19227669ec926