exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 69 of 69 RSS Feed

Files

logs.txt
Posted Dec 7, 1999
Authored by Mixter | Site members.tripod.com

Commonly overlooked audit trails on intrusions. This is my attempt of compiling a 'top list' of audit trails that are being left after intrusions where the intruders try to cover their tracks but don't do a good job. To put it short, there are actually a lot of audit trails on a normal UNIX system, which can almost all be overcome, but with some effort, that most intruders evade.

tags | paper
systems | unix
SHA-256 | 62983ffce65d3105e159e3fe5efb6acaa712499108530acd484c96b44d5f628b
exploit.txt
Posted Nov 29, 1999
Authored by Mixter | Site members.tripod.com

A tutorial on how to write shellcode and exploits, and how buffer overflows work in general. It aims to be detailed and suitable for novice exploit coders with some C understanding.

tags | paper, overflow, shellcode
systems | unix
SHA-256 | a589b984950281228fe3fb2d410cdf7e78ec852c53089f751095fb344aeea882
unixsec.txt
Posted Nov 22, 1999
Authored by Raven

A tutorial for a Unix newbie or semi-newbie who is interested in computer security and/or networking. Basic Local/Remote Unix Security: Change default configurations, basic packet filtering, how to secure your system's networking services (or completely remove them or some of them, in case you don't need them, in order to increate your computer's security), how to use, how to avoid trojans, what are sniffers, how to maintain local security between different users in your system (if you're not the only one using this system, whether it's locally or remotely), some stuff about SSH, how to protect yourself against computer viruses under the Unix system, what are security scanners and how to use them, why you should encrypt your important data and how etc'.

tags | paper, remote, local, trojan
systems | unix
SHA-256 | 752f8d456cd2997c648ad6a15e70646527e51406f91a4e955ca9031248eac546
ppc.shellcode.txt
Posted Nov 17, 1999
Authored by Palante

Power PC shellcode. LinuxPPC and BSD (darwin?) versions are included.

tags | paper, shellcode
systems | unix, bsd
SHA-256 | 90c4607349c3839a253a0f9763beb1cc9b88e2bca9499223eb1a0fc0cb33140a
alpha-bof.txt
Posted Nov 16, 1999
Authored by Taeho Oh

This paper will attempt to explain how to exploit a buffer overflow under alpha linux.

tags | paper, overflow
systems | linux, unix
SHA-256 | 9dfb70b64ed44d377e06b5bc10d95c210b241c1438af704d524d60f1bec84e18
Secure.Linux.for.Newbies.v1.1.txt
Posted Oct 25, 1999
Authored by Sil

Well written paper on securing linux for newbies. Lots of good and updated info. Version 1.1.

tags | paper
systems | linux, unix
SHA-256 | dd27f287c4429d8d76381c494dc21d247077b1a81c69eb8810e41786d60f5274
omega.txt
Posted Oct 22, 1999
Authored by Lamagra

Tutorial on a new way of exploiting buffer overflows (ret-into-libc).

tags | paper, overflow
systems | unix
SHA-256 | 71f6c76b0584c12d0217a57f3052e0e21eedfa5cd3d63661e5ed666690b0ac17
adv.overflow.paper.txt
Posted Oct 21, 1999
Authored by Taeho Oh, Postech Laboratory for Unix Security, Postech Linux User Group

Paper on writing advanced buffer overflow exploits. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nice features. For example, passing through filtering, opening a socket, breaking chroot, and so on. This paper will attempt to explain the advanced buffer overflow exploit skill under intel x86 linux.

tags | paper, overflow, shell, x86
systems | linux, unix
SHA-256 | 2e4ea3806ea648290a4bc015d162ee5889ff5d38e9961098e03e606b4897fb15
farmer.txt
Posted Oct 1, 1999

Improving the Security of Your Site by Breaking Into It: Discussion of a number of commonly used attacks on UNIX systems, and how to check your systems for vulnerability to them

tags | paper
systems | unix
SHA-256 | 91575d495d1b3e2b463590766dd0e0d9decf8bbda0098a26dd02299032050ffa
noroot.ps
Posted Oct 1, 1999

Life Without Root: A method for authorizing users to perform certain system administration tasks without giving them the super-user password

tags | paper, root
systems | unix
SHA-256 | 1eb687167cf38607327b0dffdfffb201603cdecff0fd3e279a5d2693e9c543cc
password.ps
Posted Oct 1, 1999

UNIX Password Security: A discussion of the importance of well-chosen passwords, and how passwords are cracked

tags | paper
systems | unix
SHA-256 | c8678acf4db6fbbcf4059305c7eb88ac5074fcae1a7fcb777e91c3266724a7a5
ritchie.ps
Posted Oct 1, 1999

On the Security of UNIX: The original UNIX security paper

tags | paper
systems | unix
SHA-256 | 9bac6dc5097a779ea1b31d7a8d59616f5a483035a7656d85804d9499b9756499
sessext.ps
Posted Oct 1, 1999

The 'Session Tty' Manager: A method for controlling access to terminals by background processes after the user has logged out

tags | paper
systems | unix
SHA-256 | 01c6c6bc12c50876866b7790da23dd24f9ab1fce3b6729ea09f373fb1bdddb33
sri.ps
Posted Oct 1, 1999

Improving the Security of Your UNIX System: A description of many of the security features of the average UNIX system, and how to use them

tags | paper
systems | unix
SHA-256 | ac6a287a207b886234055b73195a4b6a479c48620622fbc073ebb326cd1d3c10
tools.ps
Posted Oct 1, 1999

UNIX Security Tools: An excellent summary of most of the public domain UNIX security tools, and where to obtain them

tags | paper
systems | unix
SHA-256 | 8bbc1bad23f06169999247844f491e0e8bc93c8a88f9bbccd8f1b3406c2fb695
tripwire.ps
Posted Oct 1, 1999

The Design and Implementation of Tripwire: A File System Integrity Checker: Tripwire computes checksums of files on the system, and then scans later for any changes to those files

tags | paper
systems | unix
SHA-256 | 768a877b3004018b547cc85d84bf3dd6c9e1db681c3bc97732be51fa06d4c9f4
twexper.ps
Posted Oct 1, 1999

Experiences With Tripwire: Using Integrity Checkers for Intrusion Detection: A description of how the Tripwire integrity checker has performed in the field

tags | paper
systems | unix
SHA-256 | 8d8b9f731800b6d33b36914837e8b4e6e31fc84e3e150e4193f65913797964b4
unixsec.ps
Posted Oct 1, 1999

UNIX & Security: Describes many of the security features of the UNIX operating system, as well as features that could be added to result in an evaluatable system at Class C2

tags | paper
systems | unix
SHA-256 | 9433eb30b43a6a42cbab2f250a0686e8fc5a5728264013f40223d05b8ea52fb9
utnet.ps
Posted Oct 1, 1999

UTnet Guide to UNIX System Security: A guide to UNIX security resources

tags | paper
systems | unix
SHA-256 | 19a337915b2aad3f2e1f2969ae7473002bf8a0b984d5e2351a03956c43008433
Page 3 of 3
Back123Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Says Fix For Two Exchange Zero Days On Accelerated Timeline
Posted Oct 1, 2022

tags | headline, hacker, microsoft, email, data loss, flaw
Rights Groups Say Pentagon Is Buying Its Way Around The 4th Amendment
Posted Oct 1, 2022

tags | headline, government, privacy, usa
This Is The GrayKey 2.0, The Tool Cops Use To Hack Phones
Posted Oct 1, 2022

tags | headline, government, privacy, phone, google, password, spyware, apple, cryptography
Gone In A Day: Ethical Hackers Say It Would Take Mere Hours To Empty Your Network
Posted Oct 1, 2022

tags | headline, hacker, data loss, flaw
NYPD Considers Using Encryption To Block Public From Radio Scanner Broadcasts
Posted Sep 30, 2022

tags | headline, government, usa
Microsoft Warns Of North Korean Crew Posing As LinkedIn Recruiters
Posted Sep 30, 2022

tags | headline, microsoft, cyberwar, korea
Exchange Server Zero-Day Being Actively Exploited
Posted Sep 30, 2022

tags | headline, hacker, microsoft, email, flaw, zero day
MI5 Website Briefly Hit By Denial Of Service Attack
Posted Sep 30, 2022

tags | headline, government, britain, denial of service, spyware
FBI Arrests Former NSA Employee For Trying To Sell Top Secret Documents
Posted Sep 30, 2022

tags | headline, government, usa, data loss, spyware, fbi, nsa
Ex-eBay Execs Jailed For Cyberstalking Web Critics
Posted Sep 30, 2022

tags | headline, privacy, spyware, ebay
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close