Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.
122fd74f8bb7a14efb96e83bb10e1377d3bf012cc7df10b846b95b88699602e1
Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.
218a1b1a1cb9e9fe90523aa1a18134960e4046d350c1d0465cc5c9b194fcfa1d
Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.
a4f6d5b81e9f2a49908356154dfda3286665922c5f7a08d62c9bcc3ba79d4929
Watchguard SOHO remote denial of service vulnerability - All versions prior to v5.0.35 crash when tcp traffic with bad IP options are sent. The Watchguard Soho firewall does not perform parsing of IP options unless the packet has to be forwarded. This means that most home users will not be affected by this vulnerability, unless they have a service running behind the firewall, that is enabled through port- forwarding (eg. FTP, HTTP).
d4e57f6e99405813301b492710370b3c468cb976efffd0630b0f2a18edb29d82
Bindview Security Advisory - The Funk Proxy Server v3.x for Windows contains vulnerabilities that allow local and remote attackers to change and even obtain configuration settings and passwords for the Proxy Host software. This could allow unauthorized remote control access to the Windows GUI, which could be used to further compromise the system. Many vendors, including Veritas, On Technology, Bendata, and BindView include the Proxy remote control software (under different names) within their desktop management or help desk product suites to aid in remote administration.
7ffbd47166cc6bb6ec085e5cb4a9dce57f109577ba77e07cee12766c14ab03c4
Webr00t.pl is used to discover hidden directories and 'interesting' files on webservers. Use it when pentesting applications and servers to find that one directory or script left by mistake.
2b51ee05b6db72bbd2b05bdd857b76edb8d29838837a027b1f8ea9378ff02c78