A fundamental flaw in SCO UnixWare's security model will allow any user to gain root, read system files, etc. Any process that gets extra privledges from /etc/security/tcb/privs is vulnerable. Exploit included.
e43f1d71568f42ead69639f27b46f790fcc45e7e0ab1b76a9ed368206e498a62
The Veganizer is a spam counter-attack. It searches the headers of a specified message for all associated IPs and Domains, then sends mail to pre-specified addresses at those servers (abuse@, postmaster@) as well as addresses found by a whois query on the IPs/Domains. The mail sent will also include the original message with full headers.
12be230243de38b36ce6a056597ca7dd9489a919c87f72354aa4d61dabbcadd6
Syn Flooder source code with spoofed source address, much like slice2.
d6a6d7a82f7dc0864f7c24e7e1f513ad891e93fbe7a64c44801e8f3eb4f44778
Vulnerability scanner which scans for 97 CGI Vulns, 7 FTP Vulns, All known QPOP vulns, 7 Named vulns + prints out which ver the host is running on, 9 IMAP vulns, 16 mail vulns (sendmail, etc..), Checks if host suffers from tcp chorusing, Checks for vuln kernel, and 16 RPC vulns.
07ae0beafbd5b92a6d9676fff6a92186f56097f1dd7a29aa57d5426ba71ca0ad
WindowMaker 0.60.0 DoS attack - Windowmaker commits a suicide when trying to open a window with a very long name.
31f95956e2bcf591a588c524cb8faebc30fca063c78b47e4ff10b3df47893d36
fw_module is a Linux 2.0.x kernel module which allows you add extra code for checking of packets.
75896006039a31853829e4c16e03b3bea781072a9aa70ceb78e0bc1f0dbd212b
rpc.AutoFS tiny Scanner.
6543e8fd68585ef33ff411466c95a93e90f2b75b3949e021d1dbf492faa5bebc
Linux IDS Patch - Version 0.6 - Dec 9, 1999. Lids is an intrusion detection system in the Linux kernel. This patch (Version 0.6) is for the Linux kernel 2.2.13. LIDS 0.6 has a brand new design. When LIDS is in effect, no one (including root) can change the protected files or directories and their sub-directories, and the protected append-only files can only be appended. It can also protect the hard disk's MBR, and can also disallow sniffing while the NIC is in promiscuous mode.
388ed9342b0ac8d59cd7bebbb538fb0e595b1d6dbf9cc8cb7b20d391cb75f651
The SINUS firewall is a free and easy way to protect your network from the daily threats of the Internet. Features filtering of all header fields in the IP,TCP,UDP,ICMP,IGMP packets, intelligent RIP and FTP support, easy to understand, text-based configuration, graphical management interface for configuration of several firewalls, dynamic rules, including counters and time-outs, extensive logging, alerting, and counter intelligence, and prevention of packet and address spoofing. Works with the linux 2.2.x kernels.
da752f3bc0a279a3a34ff8dba4fe7133d939c81b8f5246a4299918da9f05ea47
If you're tired fingering your local server to see if your friend is logged on this program is for you. It will stay in background waiting for the specific users to come. If the user arrive you'll see a small message in the upper right corner of the screen.
e4c2a89994828644087cd0951f7e8b1b615e1157c1885b4c7aced9575f3d976d
Whowatch is a ncurses who-like utility that displays information about the users currently logged on to the machine, in real-time. Besides standard information (login name, tty, host, user's process), the type of the connection (ie. telnet or ssh) is shown. You can toggle display between users' command or idle time. You can also view processes tree and send INT and KILL signals.
c0305ae9774f9652325025084821d5835882589cf2b3ebf3c0143089435bfc71
Simple program similar to 'w'. Written because sometimes it is good to know which users uses ssh and which uses telnet.
2369995c34dce77bfc6292a0762cb66636703386ff47f91e19eb0c82c42e52f1
logit is a drop-in replacement for syslog - claims 100% klogd/syslogd compatibility. Supports md5 crypto for data sent over the network to the loghost, limits access to community log files to a group, and other functionality.
c9edc534a939ea0a5808d41b09f0b93895fa2a1bb493f764377b29ae17ae1cf1
Remote buffer overflow exploit in perl for QPOP 3.0b<=20 running on Linux.
eb0c60576a529c4ae0797845177279d282a6760eaa5b490fa76e10749e16f68e
Synnergy Logo
7f4dc86b1699f79f287979fb5965ebcbcb44700c6c727c0f27567bfc66c6dbf6
Microsoft has released a patch for IE 4.01, 5, and 5.01 that allows a malicious web site operator to view a file on the computer of the visiting user, assuming he knew the path. Microsoft FAQ available here.
8eacdeca0e0f75ad3bd833ea35d1e245a359624cd682b6031cf7f999549eb8e3
Patch Available for "Malformed Resource Enumeration Argument" Vulnerability in Windows NT. When a malformed argument is supplied to a resource enumeration request, the Windows NT Service Control Manager can fail. The primary effect of the failure is to cause named pipes to fail, which prevents many other system services from operating. This can be exploit remotely through NetBios. Microsoft acknowledges Rain Forest Puppy for bringing this issue to our attention. Microsoft FAQ on this issue available here.
d7fbeec3506c840e47d9da85bf4d561fada95e8cdf22e37c316360cbabde4fde
IIS4 reveals full path name because it does not check for the existance of a local file before calling CGI.
83151e7aab34f0807ad2152c87df75da00c744aeea468d27a95bca1c092ca040
[w00giving #8] Here's a new version of my snoop exploit, it seems that it will work on the new patched version of snoop aswell, and actually, the target host dose NOT have to be running with -v. Snoop is a program similar to tcpdump that allows one to watch network traffic. There is a buffer overflow in the snoop program that occurs when a domain name greater than 1024 bytes is logged, because it will overwrite a buffer in print_domain_name. This vulnerability allows remote access to the system with the privileges of the user who ran snoop (usually root, because it requires read privileges on special devices). Remote Solaris 2.7 x86 snoop exploit included.
99717fd62e6c6114deeea939793ba768fffa61af82db1312bc92a5d2d6438cf0
Bastille Linux aims to be the most comprehensive, flexible and educational Security Hardening Program for Red Hat Linux. Virtually every task it performs is optional, providing immense flexibility. It also educates the user regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.
d8003ab1fe42cfb69e6615f60e92413a60c2d6906044064fca30b5bc71f1b844
Remote exploit for VDO Live Player 3.02 for Windows95/98/NT. If VDO Live Player is installed on the system and the browser is configured default, .vdo file is downloaded and executed without confirmation. So, if the clients visit the webpage which is written the automatic download code of vdo file (such as META tag) that contains the attack code, the client machine will be cracked by the instructions which are written in vdo file.
f15115d6af33eda19fe9ada84b2ba454b0f0ec8435fd4fa8e073faaf327c2680
FAQ: Firewall Admins Guide to Porn version 1.0.1 (Jan 15, 2000). One of the more frequent problem security administrators will face is porn. It is a popular Internet application, and even when restrictions are put into place, users find ways of getting around them. At the same time, users tend to be clueless as to the knowledge firewall admins have of their surfing habits. Every administrator of a large company that I know of has had to confront this issue, but not much is discussed about the topic in the literature. This document is intended as a guide for firewall admins in this area.
c7e8e4ee97eecd6b0034d5f1d436c7d88a12892ca8b83350f168f72896e95e5c
Building Your Firewall Rulebase - One of the largest risks with a firewall is a misconfigured rulebase. The most expenseive firewall in the world does not help you if you have a rule misconfigured. "Building Your Firewall Rulebase" helps to address this problem. The paper focuses on the concepts of how to build a secure rulebase. It goes step by step through the design process, explaining each rule and it signifigance. The paper is focused for beginner/intermediate firewall admins, but even the gurus can hopefully learn a trick or two (I know I did).
9dde1b219909aac384fb5e8cfec30116ca44bb073137d65a24699e4dc861a70e