The Design of GrIDS - A whitepaper on a graph based Intrusion Detection System. GrIDS is a prototype intrusion detection system that was designed to explore the issues involved in doing large scale IDS.
3f3bc5601c8210fe6ff0091402ea6c7c3012870e8d0117b8048f1f3864be3358
CIS vulnerability scanner Version 5.0.0 (formerly NTInfoScan) - Scans systems for remote vulnerabilities. Runs on Windows NT or 2000. Features a GUI, multi-threaded operation, and updates via DLL.
eeffa64245ee0859c441c1eee2eb3a7128c0df263ad45e9e0a406fdf2ce49850
Placing Backdoors Through Firewalls version 1.5 - Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which does its job is not easily detectable. The kind of backdoor needed depends on the firewall architecture used. As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included.
8ef7f3e0278b056d10da9fd260d41e5f483cc869ba0c8728679ae31bf89e3ad2
Removes ALL major Viewbars from your desktop, and hide/show all (hidden) windows. Reclaims the reserved desktop space taken up by the Viewbars!
15460c651269d5bdbf86ba931a9714101b5b3140994c37a5369602c22b319fb8
Shellcode programming for SCO. All examples are taken from a SCO OpenServer 5.0.4 machine so some of them may not work under another SCO type of Unix (like unixware) although I have tried to make it as portable as possible.
87c08b528d90150e54c5f23a73488490f89852b7c1807a80215a7bcfe1019c7f
Libicmp is intended to provide a simple interface for sending and reciving icmp datagrams. Beyond the obvious diffrence of using ICMP, applications Using this interface would behave much in the same way an UDP application behaves.
caf73b834865d152fbdc4c29280e768d01d742a5dc8baeef50f58a811ba44253
Explanation of the 'spank' attack - a new breed stream/raped. Stream/Raped mearly flooded the host with ack's (or no flags) and came from random ips with random sequence numbers and/or ack numbers. The difference now is that this not only does the previous stuff, but also directly attacks from and to multicast addresses as well.
25a37bfece0acbe778ee130601ca1fda0d9188d98eebaee75e1352130f531bbb
Solaris Solstice Internet Mail IMAP4 Server x86 exploit.
adcc570a64ad515dee55499942b44fc76607894ebc9c473d4d7a8654c863de59
Remote linux x86 exploit for Qpopper 3.0beta29 and below. (not 2.5.3) Overflows the LIST command and spawns a shell with the UID of the user who logged in (requires valid account), and GID mail.
6e03060d06070addc039c651e773cc7edd7dfdbf64902dcb1d4ab4b12b4e97df
w00w00 Security Advisory - qmail-pop3d may pass an overly long command argument to it's password authentication service. When vpopmail is used to authenticate user information a remote attacker may compromise the privilege level that vpopmail is running, naturally root.
3bd0074f38eb47b414a84c38444aed7fa25ca801a4f14f89d10b39ad7380dd2d
w00w00 Security Advisory - Linux VMware 1.1.2 Symlink Vulnerability. VMware stores temporary log files within the /tmp directory. It does not check whether all of these files exist prior to creation, resulting in the potential for a symlink attack.
da520fa5a7804353f424ed408de54dc3b46708d2f49b82447d0645507cc3049e
w00w00 Security Advisory - S/Key & OPIE Database Vulnerability affecting most Unixes (not NetBSD) running skey-2.2. (possibly earlier versions too) allowing offline password cracking.
3ae33764fe45486317d0735a5c5fbdb38edd2d5553c4c986a29216ee7e9b8124
Remote exploit for the inter7 supported vchkpw/vpopmail package for (replacement for chkeckpasswd). Tested on Sol/x86,linux/x86,Fbsd/x86 against linux-2.2.1 and FreeBSD 3.[34]-RELEASE, running vpopmail-3.4.10a/vpopmail-3.4.11[b-e]. Unofficial patch here.
96783f06acb089b526184c758e946ec901db1b61ec472cbee7dc24a2094b6765