Connlogd is a detailed TCP/UDP connection logger with the ability to filter what information is logged. It can log to syslog or stderr so that it can be used with other logging packages such as D.J. Bernstein's multilog program. In addition to address and port information, it logs all TCP header flags (SYN, FIN, etc... as well as bogus flags) and the TCP window size. It uses the pcap library for packet capture and runs on most systems that support the pcap library. NOTE: Included in the source distribution is a script to help convert the logs into the format used when reporting attacks to dshield.org.
864dfbe8e77ac73e591422b48eaff63f4d2778eb91cb34c1e15e03e54890c7fb
Pjam, the UDP packet flooder for windows, which now has multithreaded support and additional bug fixes.
29722f9c32c2bea5b77479cac3d352acdcbcfbb2e574d892dc148a05d2370207
The P.A.T.H. project is a collection of hijacking tools written in Perl. There is a terminal and a GUI version programmed with Perl/Tk for each tool. This suite of tools allows for the testing of firewall and IDS rules, sniffing your network traffic, and injection of resets to block unwanted traffic in your internal network.
914b21ed0bc088b1bb1704cd9a84adf6351244421ec1c9e3571b2531eee084c9
A paper released by Relevant Technologies discussing ways and means to combat Spam using various filters available.
f9225336dd0fe9690207e4daf5130cb98c478b6a3c29732d0ccbb08c5944aa64
The CGI script whereami.cgi that gets distributed by CCBill lacks input validation and in return allows for remote command execution as the web uid.
ce15f8d74362f11898352d1bbf86d0330e48248dd00ae31bec0febbb7a67da0c
50 byte Linux x86 shellcode that connects to the shared memory segment matching the key and executes the code at that address.
066f2b136b8976babe8f1c96c5f93e13618c63434ba50aebceb60448097c29eb
Exploit for the win32 Sphere Server .55i from the Ultima Online Server Emulator.
c61f895011cca1cf9179eac1583450d27e65398ee74ab2bebbbc0cc2f78f02e7
Exploit for remote administrative access on the freeware Ultima Online server emulator from sphereserver.com. Tested against axissvr 0.13.3.0.
1e2e497dc7b1abee56419b300adc740941e8fbad2c4768089ac1e0f1a2735a3f
Quick analysis of the Mindjail worm being distributed by the trojan sdbot 0.5b.
26ebc9f01fd758864df70c938ca2efe7b474be66d6b56fa845180199b9dcda51
Yahoo Messenger 5.5 and below suffers from a buffer overflow that was originally discovered and fixed in May of 2002, but has since resurfaced. Systems Affected: Windows NT/2000/SP1/SP2/SP3, Windows ME, Windows 95/98, Windows XP.
3dbd08466a589690e261f4eb0f747ba191bda6e704b3f88ec4d48204eb593792
A paper that details the manipulation of the destructor when utilizing a buffer overflow, a format string attack, or corrupting a malloc chunk.
9ca183559ae54fd97c38cdc1cdabdfb443407e4dead2e88e1c635a606ab6c42d
NetPipe is a redirector. It takes a socket in on one port, and reconnects that data out on the second port. It is multi-threaded, and supports UDP, TCP, and ICMP. It is a fully functioning socket redirector, the aim of which is to open ports on a firewall without needing the access to manipulate firewall ACLs.
00c3ddf079b87394db62e8ac080a815aeef0cee809dd45163241b1992ea98f74
DTORS Security - First Security Agent, the first screen locking tool for win32 is vulnerable to a local user changing or disabling the password via the system registry.
658980c23c1c70311de70e308d4e010c29a4e526b9221aee3b44e87b040fb2ef
The ColdFusion Server versions 4.5 and 5 suffer from multiple vulnerabilities. They range from the default RDS password being blank by default to allowing a normal remote user to reconfigure their website properties to put and get any file on the server.
faa0a31742d24a814cbf24ab9f645633cf615b253c7800154079460c4cdc420b
Disco is a passive IP discovery utility designed to sit on segments distributed throughout a network and discover unique IPs. In addition to IP discovery Disco has the ability to passively fingerprint TCP SYN packets to determine the host operating system.
0cb6cf5974b9f12310a453d71387bf3d827b4c4e0461ac4594cd72f53f4f1055