what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 161 RSS Feed

Files Date: 2003-11-01 to 2003-11-30

tcpstatflow_v1.1.tgz
Posted Nov 21, 2003
Authored by fryxar | Site geocities.com

TCPStatFlow is a tool for network administrators which detects covert network tunnels running on ports which are accepted by most outbound firewalls by sniffing the network and measuring the symmetry of the data sent. HTTP / HTTPS / FTP / SMTP / POP3 protocols send much more data one direction than the other, and if a ssh server is set up on these ports, this tool will detect it by noticing that the amounts of data sent don't look like the protocol which is supposed to run on that port.

tags | tool, web, protocol, intrusion detection
systems | unix
SHA-256 | edb152cf1f06f1962ff42720fbff6cfbd9daa4d1d85ea1d53115ce88c1b4b64d
dcc-dccd.tar.Z
Posted Nov 21, 2003
Authored by Vernon Schryver | Site rhyolite.com

The Distributed Checksum Clearinghouse, or DCC, is a cooperative and distributed system intended to detect bulk mail coming into a system and will reject it.

Changes: Fixed broken whitelist database entries in prior versions, various bug fixes.
systems | unix
SHA-256 | 2f476de13060b278cb221d669067e66c09195b7dcecfec7dcc04ef5cfee1d3d0
cryptofs-0.2.1.tar.gz
Posted Nov 21, 2003
Authored by Christoph Hohmann

CryptoFS is an encrypted filesystem utility for Linux that makes use of a normal directory to store files encrypted.

tags | encryption
systems | linux
SHA-256 | ae2f691a9721e9208cc390c6d006895155fc2518ad2da913cf5ed1c0c1674fdd
pmacct-0.5.3.tar.gz
Posted Nov 21, 2003
Authored by Paolo Lucente | Site ba.cnr.it

Network tool used to grab IP traffic and keep track of data counts. Makes use of libpcap with a network interface card in promiscuous mode.

systems | unix
SHA-256 | ab75c578a74824c7ab52a814a16237cb83af9f0389b8ed8e2ef897b019c54aab
WifiScanner-0.9.3.tar.gz
Posted Nov 21, 2003
Site wifiscanner.sourceforge.net

WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.

Changes: Various code clean ups and fixes.
tags | tool, wireless
systems | linux
SHA-256 | 2922011841b10545e3600b736c01294e263378a69b8cb0786618609b7add895a
afick-1.4-0.tgz
Posted Nov 21, 2003
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Added an auto-control to check afick changes, various code tuning and bug fixes.
tags | tool, integrity
systems | windows, unix
SHA-256 | a9418042c3490f68bb352a42942e86fffb10c67a8e8be9dc065aa60b8d9a1ebc
rkdet-0.54.tar.gz
Posted Nov 21, 2003
Authored by Andrew Daviel | Site vancouver-webpages.com

Rkdet is a small daemon intended to catch someone installing a rootkit or running a packet sniffer.

Changes: Various bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 70566370454539579616899488fd4883ab43de0eba344590afd540a01ddd50b6
amap-4.5.tar.gz
Posted Nov 21, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Application Mapper is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Added portability fixes for OpenBSD and Cygwin.
tags | tool, protocol
SHA-256 | 4923561c01a4c32b8a2d4f42772f5d3002c1c22b849d7cbf665111013dba4682
THC Secure Deletion v3.1
Posted Nov 21, 2003
Authored by van Hauser, thc | Site thc.org

THC-Secure Deletion v3.1 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: Linux LKM for secure file deletion included. Bug fixes.
systems | unix
SHA-256 | 84723b3bc93dbba5d4c86c232ca6c84566ef1cbf281823588a7b902a539b70ac
Low-Level_Enumeration_With_TCP.txt
Posted Nov 20, 2003
Authored by djrand

A thoroughly written paper that covers the discussion of SYN, FIN, Null, Xmas, Idle, and Zombie scanning. It gives strong compare and contrast insight on methodologies to use when determining open ports on a host and remote operating system detection. It shows example scans and discusses IP enumeration along with the utilization of tools like hping2 and nmap to dig deeper.

tags | paper, remote
SHA-256 | 94fdfe8c27434702f45ddf6f796fca9e7deafcac818de86e1ae4dce9246bcc94
85mod_gzip.c
Posted Nov 20, 2003
Authored by Crazy Einstein

Remote exploit for mod_gzip when in debug mode for versions 1.2.26.1a and below. Yields user id of the webserver. Tested against RedHat 8.0 and FreeBSD 4.7.

tags | exploit, remote
systems | linux, redhat, freebsd
SHA-256 | 84af6d61c9fc50f2b274b91ce6e52fe5474e910aad12553f3e47926b21d32e6e
djohn-0.9.8.1.tgz
Posted Nov 19, 2003
Authored by Luis Parravicini | Site ktulu.com.ar

With Distributed John (DJohn) you can crack passwords using several machines to get passwords sooner than using a single machine. The cracking in itself is done by John The Ripper and djohn's server (djohnd) divides the work in work packets and coordinates the effort among the clients (djohn), which are the ones who do the work. Readme available here.

Changes: Major bug fix - The client didn't send the notification to the server when it didn't find any passwords; thus making the cracking process fail.
tags | cracker
SHA-256 | 706959c41a8c5af41dc7bece54cd562282a245ba2029979c068206628158b55b
msuxobsd2.c
Posted Nov 19, 2003
Authored by Georgi Guninski | Site guninski.com

OpenBSD v3.3 and below local root and v3.4 local denial of service exploit which uses a kernel based stack overflow vulnerability in ICBS. Patch available for v3.3 here. Also works against OpenBSD v2.x.

tags | exploit, denial of service, overflow, kernel, local, root
systems | openbsd
SHA-256 | 02d1b6e6fd805a42150e80b21f685c51c4db5a62cb4d1d9e22b42e2992724a5c
iawebmail.pl
Posted Nov 19, 2003
Authored by Peter Winter-Smith | Site elitehaven.net

IA WebMail Server v3.1 and below (iaregdll.dll version 1.0.0.5) remote exploit in perl. Tested against Windows XP Home SP1 and Windows 2000 Pro SP4. Included shellcode downloads netcat and spawns a shell.

tags | exploit, remote, shell, perl, shellcode
systems | windows
SHA-256 | 46b9847fb05761825572db77b563585c6c829d08fe1ddd7ba09ddacbc98ff73b
djohn-0.9.8.tgz
Posted Nov 19, 2003
Authored by Luis Parravicini | Site ktulu.com.ar

With Distributed John (DJohn) you can crack passwords using several machines to get passwords sooner than using a single machine. The cracking in itself is done by John The Ripper and djohn's server (djohnd) divides the work in work packets and coordinates the effort among the clients (djohn), which are the ones who do the work. Readme available here.

tags | cracker
SHA-256 | f1a63546aef80577490d25c91d94da6e0845e55278f8c4aaa35ff85e14ecab30
dazuko-2.0.0-pre4.tar.gz
Posted Nov 19, 2003
Authored by John Ogness | Site dazuko.org

Dazuko is a kernel module which provides 3rd-party applications with an interface for file access control. Useful for on-demand virus scanning, as a file-access monitor/logger or external security implementations. It operates by intercepting file-access calls and passing the file information to a 3rd-party application. The 3rd-party application then has the opportunity to tell the kernel module to allow or deny the file-access. The 3rd-party application also receives information about the file, such as type of access, process ID, user ID, etc.

tags | kernel, virus
systems | linux
SHA-256 | 1ef829a3436cfc5494c895c4a054b9ef9df8ef3b6a60daad6b7e1379717ca70d
mod_security-1.7.3.tar.gz
Posted Nov 19, 2003
Site modsecurity.org

Mod_security is an Apache module whose purpose is to protect vulnerable applications and reject human or automated attacks. In addition to filtering requests, it also can create Web application audit logs. Understands regular expressions and POST payloads and runs on both branches of Apache.

Changes: The number of variables whose contents are normalized before rules are applied has been increased, resulting in more predictable regular expression matching. Binaries for Windows were made available and bugs were fixed.
tags | web
SHA-256 | 7f4114a4d7b2e7b8ab0bdd6fbdf6d1caedaf7212fb4e0e943edcb73c5b0d8d4d
renattach-1.2.0rc2.tar.gz
Posted Nov 18, 2003
Site pc-tools.net

RenAttach is an e-mail filter/processor which runs from a user's .forward file. It is designed to protect end users (particularly those using Windows) from malicious e-mail attachments. It does not scan specifically for viruses, but rather renames e-mail attachments so that they can not be accidentally executed. It handles both UUencoded and MIME-encoded attachments. It can be used from within sendmail, postfix, procmail, or pretty much anywhere else.

Changes: Bug fixes.
systems | windows, unix
SHA-256 | b18b17b7a99ab8ab472976a76d69a1001caa47cb921d48c33d8d4e48b1483b52
cyclone.c
Posted Nov 18, 2003
Authored by Pink-cashmere

Cyclone floods a victim host with UDP packets on a user specified port.

tags | denial of service, udp
SHA-256 | bfec24b2894a36df29f47b8ed1e00f731fba39f9c1c521d6761a39ae553f6a58
LogrepSource-1.4.2.tar.gz
Posted Nov 18, 2003
Authored by Tevfik Karagulle | Site logrep.sourceforge.net

Logrep is a secure multi-platform tool for the collection, extraction, and presentation of information from various log files. It includes HTML reports, multi-dimensional analysis, overview pages, SSH communication, and graphs. Supports 18 popular systems including Snort, Squid, Postfix, Apache, Sendmail, syslog, iptables/ipchains, xferlog, NT event logs, Firewall-1, wtmp, Oracle listener, and Cisco Pix.

Changes: This version can produce size statistics as well as count/hit statistics. Performance is improved. logrep can now be used as a trend analysis tool. Cisco PIX support is also improved.
tags | system logging
systems | cisco, unix
SHA-256 | c7f283d96c2a7f1fe0ac0419e299b027c11711a8a41959e483161e2c90b361dc
rush13.txt
Posted Nov 17, 2003
Authored by idtwolf | Site rsteam.ru

Rolis Guestbook version 1.0 is susceptible to php injection cross site scripting attacks.

tags | exploit, php, xss
SHA-256 | 79e815ebb7be676e76426a0e17297e327cf6c44d0c6d1dacc79e8088de2b8dc8
rush12.txt
Posted Nov 17, 2003
Authored by idtwolf | Site rsteam.ru

phpWebFileManager version 2.0.0 is susceptible to a directory traversal attack due to a lack of input validation.

tags | exploit
SHA-256 | 11a43dc0602f1582c83e6543b3980c8c54dc65ad457fb56add731e8860a3b758
netserve107.txt
Posted Nov 17, 2003
Authored by nimber | Site nimber.plux.ru

NetServe version 1.0.7 suffers from a directory traversal vulnerability that allows a remote attack to download any file outside of the webroot. Using this knowledge, a remote attacker can exploit this vulnerability to access the config.dat file that holds the login and password for the administrative account. Tested on Microsoft Windows XP and 2000.

tags | exploit, remote
systems | windows
SHA-256 | 852c4463ccb97a58ecaf9041db4c846ee003660cb27e1d5da9855d1d9bf1cbe7
pserv.c
Posted Nov 17, 2003
Authored by jsk

pServ 2.0.x Beta webserver remote exploit that makes use of the User-Agent HTTP Header buffer overflow.

tags | exploit, remote, web, overflow
SHA-256 | 5c7a46786ee5ec0c5d78688145e1527fbd30b89d6df3a01b81f5ebb54be1a36d
Atstake Security Advisory 03-11-17.2
Posted Nov 17, 2003
Authored by Atstake, Ollie Whitehouse | Site atstake.com

Atstake Security Advisory A111703-2 - A directory traversal vulnerability lies in the web-tools component of the SAP database server that enables any remote attacker to gain access to any file on the host due to the server running as SYSTEM. The Web Agent Administration service pages are also open by default, allowing any remote attacker to reconfigure the server as they see fit and the service also has at least one buffer overflow vulnerability. Default services within the Web Agent, such as waecho, contain buffer overflows that can be exploited remotely. The session identification generated is also considered to be unsafe since they are stored in the URL and not kept in a cookie either.

tags | advisory, remote, web, overflow
advisories | CVE-2003-0940, CVE-2003-0941, CVE-2003-0942, CVE-2003-0943, CVE-2003-0944, CVE-2003-0945
SHA-256 | cfe1dbd3931e689a57bfc15b63567e94bcca765a6d0bc9f4b283731e4015c6bd
Page 3 of 7
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close