Kismet is an 802.11b wireless network sniffer. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.
4210118493aece128667e5ee06bb4738541b3ed774f2e91bdcf4437e6b790e9c
IPTables log analyzer displays Linux 2.4 iptables logs (rejected, accepted, masqueraded packets...) in a nice HTML page. This page shall be easy to read and understand to reduce the manual analysis time. This page contains statistics on packets and links to more detailed information on a given host, port, domain and so on. Screenshot available here.
4fd30f4b30ce34e48fbd6dc461f80e94b035021d98193ee59f25a5ed35b088f7
Sendmail 8.11.5 and below local root exploit. Tested against Red Hat 7.0 and 7.1, SuSE 7.2, and Slackware 8.0.
91760643cbea23f0d407bfbe6adb92fff440f2e21775e64c29e8d836351f91b9
Citrix is a Remote Desktop application that is becoming widely popular. It is similar to Microsoft's Terminal Services, RDP (Remote Desktop Protocol). Unlike Terminal Services, Citrixs' lines of products allow the administrator to specify certain applications to be run on the server. This allows them to control which programs they want to allow the end user to execute. There exists an interesting gray line for the security of Citrix applications due to the mixing of both Citrix technology, and Microsoft technology. With an application that allows users remote access to not only published programs, but remote desktops, a serious threat arises.
f66ebd0278ec5919fe8ede3d0ec55a3aa78b31d7b9b07b606409974660c1ca5f
Bind v8.2, 8.2.1, 8.2.2, and 8.2.2-PX remote root exploit for Solaris 2.7 x86.
ae23adfe8e413cf29b90daaa2aa3fa68779d3affba2a40e82e14dc7e57560754