Lcrzoex, created with the network library lcrzo, allows to test an Ethernet/IP network. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris.
4bce1871e9070f58a19274f388d386efd09ffd43a20d8a18da5b8d1cdf7554f9
This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
f88112aeffc79d320fb58519696dd2735579369d1ed999abfa28a0a2d8d6d3af
tcpflow is a program that captures data transmitted as part of TCP connections (flows), and stores the data in a way that is convenient for protocol analysis or debugging. tcpflow understands TCP sequence numbers and will correctly reconstruct data streams regardless of retransmissions or out-of-order delivery. Each stream is stored in a separate file for later analysis. tcpflow is designed to be portable, using the LBL packet capture library and GNU autoconf. It works under most UNIX platforms and for most common network interface types (Ethernet, PPP, loopback, etc.).
00030946e406182d650e55dcfc5867cc3e903d0ade7b3c772e75753f36a09d18
Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.
a3598061e70656607aa06522613f605e9d71ed4e232d5e33841dc9011d729548
Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed.
900e438c79a4cfc98e3eb0c815fd340abf459a4e3c587b5fe2c692efc62dc882
Ngrep is a powerful network sniffing tool which strives to provide most of GNU grep's common features, applying them to all network traffic. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP, FDDI, and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.
1cd51ddd214976ea15d7d267f37d07423b637e3fd4c4ab1658866581e2532ba8
NBpyder, or NetBios Spyder is a suite of NT batch files that take advantage of Windoze netbios connections to glean information about a corporation's network. NBSpyder works by first enumerating domains that the computer can see over a LAN. It then proceeds to get a comprehensive list of machines for that domain, their domain controllers, local administrators and domain admins, and a comprehensive list of IP addresses for that domain. It then attempts to gain administrative access on the domain controllers by semi-intelligent brute force password guessing , and, if successful, goes ahead and downloads the domain user and policy list.
f63eb52728feae6bc1a31c5f1b67d614d3f5bf5a5d684f040e00c47e08413e87
SFGate v5.1 p11 gives sensitive information by allowing one to view a few lines of text from a file via an error message. Exploit URL included.
23b5c6dbb7d9d41d0c055527d9384a23aad5711aa8f39bede3e03ed4ad3d3715
PHP-Nuke v4.4.1a contains remote vulnerabilities because arbitrary information can be passed to MySQL via the saveuser() function and several others. It's possible for the attacker to change the e-mail address of one of the users and ask for the password to be sent to the e-mail address that the attacker have provided. Exploit URL included.
f3655876593a5a07c6c44ecd5198383aba17f78fc2b0cb266d390629ca65c07b
Red Hat Security Advisory RHSA-2001:024-03 - When starting, joe looks for a configuration file in the current working directory, the user's home directory, and /etc/joe. A malicious user could create a .joerc file in a world writable directory such as /tmp and make users running joe inside that directory using a .joerc file that is customized to execute commands with their own userids.
8b5a10a9804ce067254628d3ab15350f4142534e18a05cdbc16ad6644fe09ef0
Mass LPD scanner - Scans a domain or class of addresses.
c40ce70ac94770034bd2e870dc88b51fbf3e7839f1bd3d59edc71c6f248792cb
Mimic.pl steganography to encode a message into spam, similar to here.
05a30e0e9c88888f46067add13bd9195e2336fb86aead42eb463f54f855de9a6
Squat.pl sends protocol 1 threw 255 all fragmented, causing *BSD kernels to lock up the interface.
d653a1f12c63390cb17e31751fb8141353d28c2598dc490d4030bf745c2021d2
ScoopLM searches out the password from LM/NTLM authentication information (LanManager and Windows NT challenge/response). Tested on Windows 2000.
f39ca5e398ae52541d68831f7efde7fdcb5c4b6f61b4b1286208864f5878a1f9
BeatLm searches out the password from LM/NTLM authentication information (LanManager and Windows NT challenge/response). Tested on Windows NT and 2000.
f7ec0a6a65b7324009c133597b0ed26cd038cf4d2608ebef027b8633530afdbb
Microsoft Security Advisory MS01-014 - IIS 5.0 and Exchange 2000 are vulnerable to remote denial of service attacks. If a certain malformed URL is repeatedly sent to an affected system, it will cause a memory allocation error that will result in the failure of the IIS service. Exchange 2000 is affected by the same vulnerability which can crash the Exchange 2000 webmail service. Microsoft FAQ on this issue available here.
7e7e961b27aafc3eb72e2d0b5a3aebddbe33062cd71ba2ce552a7a2c19f596b4
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6.
990646118fc67738df6e20049f2f0b490c9268689ad4d8830bf778393b11b9a2