what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2004-07-13

psad-1.3.2.tar.gz
Posted Jul 13, 2004
Site cipherdyne.org

Port Scan Attack Detector (psad) is a collection of four lightweight daemons written in Perl and C that are designed to work with Linux firewalling code (iptables and ipchains) to detect port scans. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options, email alerting, and automatic blocking of offending IP addresses via dynamic configuration of ipchains/iptables firewall rulesets. In addition, for the 2.4.x kernels psad incorporates many of the TCP, UDP, and ICMP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap. Psad also uses packet TTL, IP id, TOS, and TCP window sizes to passively fingerprint the remote operating system from which scans originate. Changelog available here.

Changes: Bug fixes and other improvements.
tags | remote, kernel, udp, perl, tcp
systems | linux
SHA-256 | e6447d4842b6e3c1dad9bc8268edb9d3c08ff57486dc37dcdd5f2c4f90eae031
fedora_im-switch_tempfile_race.txt
Posted Jul 13, 2004
Site bugzilla.redhat.com

Tatsuo Sekine has reported a vulnerability in Fedora, which can be exploited locally to increase privileges via a file race condition.

tags | advisory
systems | linux, fedora
SHA-256 | b37540bb077cfdff9b2923cb16f524415a038f569af71f7ffcf0548e53efad9c
twoMoz.txt
Posted Jul 13, 2004
Authored by Mindwarper | Site mlsecurity.com

Mozilla and Firefox are susceptible to a couple of flaws that allow for remote code execution under the guise of the local zone.

tags | advisory, remote, local, code execution
SHA-256 | 91aed3631daa564efb231ee3fd4a66218ac72fd75cfc8bcf98ec0c7ca75996bb
0x00_vs_ASP_File_Uploads.pdf
Posted Jul 13, 2004
Authored by Brett Moore SA | Site security-assessment.com

White paper covering the topic of upload systems written in ASP. Many upload systems written in ASP suffer from a common problem whereby a NULL byte can be inserted into the filename parameter leading to any extension, after the null byte, being ignored when writing the file. This means that in some cases it is possible to bypass checks for valid extensions, even if one is appended by the application.

tags | paper, asp
SHA-256 | e3b3b4f30a2a0648c126c82e8737baf56f8691cabd9319b9cf8a4dd23890ba6f
phrack62.tar.gz
Posted Jul 13, 2004
Authored by phrack | Site phrack.org

Phrack Magazine Issue 62 - In this issue: Bypassing Win BO Protection, Kernel Mode Backdoor for NT, Advances in Windows Shellcode, UTF8 Shellcode, Attacking Apache Modules, Radio Hacking, Win32 Portable Userland Rootkit, Bypassing Windows Personal Firewalls, A DynamicPolyalphabeticSubstitutionCipher, and more.

tags | kernel, shellcode, magazine
systems | windows
SHA-256 | ce5a1cdbcd88fe8e1bdaebec9d5a15714f8d4c25d94312740b9f0e86ad2f877c
iDEFENSE Security Advisory 2004-07-12.t
Posted Jul 13, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 07.08.04: Exploitation of a buffer overflow vulnerability in Adobe Reader 6.0 could allow remote attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
SHA-256 | 383f49d320c1476f969425a1c81ec1d0967ef361ec302931087af4274d7646eb
iDEFENSE Security Advisory 2004-07-09.t
Posted Jul 13, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 07.09.04: The wv library has been found to contain a buffer overflow condition that can be exploited through a specially crafted document.

tags | advisory, overflow
advisories | CVE-2004-0645
SHA-256 | 8e6f42ccaddef8a6b4007bf499d26f516872c7ced4979868d2e3839a3fa4ce4d
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close