what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2002-04-09

sendmail.8.12.3.tar.gz
Posted Apr 9, 2002
Site sendmail.org

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: This version fixes a long-standing MIME (7 to 8-bit) conversion bug, a possible communication problem between the MTA and libmilter, bug in handling (invalid) addresses containing 8-bit characters, a possible problem with small timeouts being lost on slow machines if itimers are used, and handling of the 421 reply code and timeouts in the SMTP delivery code.
systems | unix
SHA-256 | 122fd74f8bb7a14efb96e83bb10e1377d3bf012cc7df10b846b95b88699602e1
lcrzoex-4.08-src.tgz
Posted Apr 9, 2002
Authored by Laurent Constantin | Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex. Windows binaries available here.

Changes: It's now possible to compile the shared version liblcrzo.so. Lcrzo_stringlist functions were created to store lists of strings.
tags | udp, spoof, tcp, protocol, library
systems | linux, windows, solaris, freebsd
SHA-256 | 218a1b1a1cb9e9fe90523aa1a18134960e4046d350c1d0465cc5c9b194fcfa1d
netspoc-1.1.tar.gz
Posted Apr 9, 2002
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: This release fixes bugs with the pix security levels.
systems | unix
SHA-256 | a4f6d5b81e9f2a49908356154dfda3286665922c5f7a08d62c9bcc3ba79d4929
watchguard.dos.txt
Posted Apr 9, 2002
Authored by Andreas Sandor

Watchguard SOHO remote denial of service vulnerability - All versions prior to v5.0.35 crash when tcp traffic with bad IP options are sent. The Watchguard Soho firewall does not perform parsing of IP options unless the packet has to be forwarded. This means that most home users will not be affected by this vulnerability, unless they have a service running behind the firewall, that is enabled through port- forwarding (eg. FTP, HTTP).

tags | remote, web, denial of service, tcp
SHA-256 | d4e57f6e99405813301b492710370b3c468cb976efffd0630b0f2a18edb29d82
adv_funk.txt
Posted Apr 9, 2002
Authored by Chris Coffin | Site razor.bindview.com

Bindview Security Advisory - The Funk Proxy Server v3.x for Windows contains vulnerabilities that allow local and remote attackers to change and even obtain configuration settings and passwords for the Proxy Host software. This could allow unauthorized remote control access to the Windows GUI, which could be used to further compromise the system. Many vendors, including Veritas, On Technology, Bendata, and BindView include the Proxy remote control software (under different names) within their desktop management or help desk product suites to aid in remote administration.

tags | remote, local, vulnerability
systems | windows
SHA-256 | 7ffbd47166cc6bb6ec085e5cb4a9dce57f109577ba77e07cee12766c14ab03c4
Webr00t.pl
Posted Apr 9, 2002
Authored by B-root

Webr00t.pl is used to discover hidden directories and 'interesting' files on webservers. Use it when pentesting applications and servers to find that one directory or script left by mistake.

tags | cgi
systems | unix
SHA-256 | 2b51ee05b6db72bbd2b05bdd857b76edb8d29838837a027b1f8ea9378ff02c78
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close