Three vulnerabilities have been identified in WU-FTPD and other ftp daemons based on the WU-FTPD source code.
314cdbabefb2fd1a366c6c7a8928005c0869880293006ac05ea1331cf7ba7078
weedlog is a packet logger designed to help in debuging network connections on non-router systems. It currently supports the ICMP, TCP, and UDP protocols, but is still early in development. weedlog supports sending output to stdout, a file, or to syslog.
4af20a3f32c977be013ef49b7281dfa1d164849226ad1734d8406b36d7697291
Net::RawIP is a Perl extension for easy manipulation of raw IP packets with an interface to libpcap. This package provides a class object which can be used for creating, manipulating and sending raw IP packets and optional manipulation of ethernet headers.
e0bbe7a9d1a230489cc894a9cab1bfb990f2cf34c00443fe2c8e43dbd4ac02d1
Ricochet is an automated agent for tracing and reporting internet junk mail (a.k.a Spam). Ricochet analyses the headers of a spam to identity the machines used for its injection, looks up the email addresses of the machine owners and mails out a complaint to them. Ricochet uses various network information resources like nameserver records, MX records and Whois databases worldwide to collect and verify this information.
2477d1f734ac9aefe76f35d11e2f03d1e18a6ddde71f2e20b39a218b2f5e53a9
Linux Administrator's Security Guide - Newest snapshot. Updated October 21st 1999, 15:24 EST. The LASG has been updated some more, and the license has changed. The LASG is now OpenContent, I am doing this in the hopes it will encourage the community to contribute.
364bf63df4d0edb9f33de00dc7b3b625f0a0db164b25d8971319353e4d1a075d
The version of screen that shipped with Red Hat Linux 6.1 defaulted to not using Unix98 ptys. Since screen is not setuid root, this means that it leaves the ptys with insecure permissions. The updated packages restore the Unix98 pty support. Red Hat 6.1 security advisories
f33ebb3f1b35ebf58232d75ce2af6c8a8396a3cdf5da9ead2d3659feb29b75cd
Rpc_Gotcha is a network based intrusion detection tool for detecting rpc based scans and attacks (buffer overflows). The program will passively sit on the network perimeter and process packets while analyzing the rpc message data payload looking for signs of a possible attack. Rpc_Gotcha will log all rpc calls made to the network and display payload data for possible attacks. Changes : This version has some major bug fixes , memory leaks and signature issues. It will also read tcpdump capture files in a batch mode.
47e916295ba31b13f5d2c3e1ee1298ccbaa67084f08de4d1c4ed07f5a57002d2
Paper on writing advanced buffer overflow exploits. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nice features. For example, passing through filtering, opening a socket, breaking chroot, and so on. This paper will attempt to explain the advanced buffer overflow exploit skill under intel x86 linux.
2e4ea3806ea648290a4bc015d162ee5889ff5d38e9961098e03e606b4897fb15
Generic shellcode for i386. Supports FreeBSD, netBSD, openBSD, and linux. CyberPsychotic
221de581651c3ee9ebc9f9eb960abe2560e3e4d9fbc246668595b818a6544346
NT OBJECTives, Inc. Presents - Seek and Destroy Network Tools. NTO Tools includes four new tools: Lservers[tm], NTOLog[tm] and NPList[tm] and NTODrv[tm]. NTOLog[tm] is a Powerful, network wide backup/clear utility for NT logs.i LServers[tm] is a NetBIOS name dumper. NPList[tm] is a NT network process dumper. NTODrv[tm] is a NT network driver/service dumper. Download NTO Seek/Destroy Tools[tm].
ed8828e22d4b2702b5da0a6830008e334e58b0e5d79651ef004727657c22c2e0
Decrypt MSN passwords from the registry.
39d31c20ce35636f487d14d1a9689cd6c76ec2a764f117a267a0289c392355c2
Winfingerprint 219: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQL SERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, Enumerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes. New features: contains new GUI frontend and some bugfixes.
637342d7cba4ea483d9ce52a271eaab3a898997dc8dcb6ab3c71f4dbe833f86f
Versioner 0.3: Source code. Versioner is a command line tool that traverses directories gathering the file properties described below. Versioner will output its information in a human readable text format as well as a comma seperated version that can be imported directly into MS-Excel or MS-Access. It is useful to anyone who wishes to maintain control over file versions from either a security or compatibility aspect.
28bbb22f26396a6e8197e439794bb2e3e2a85e69452559a6606698ebb15ffda9
Simplified Restricted Shell 0.1.3. Major purpose of this shell is to maintain 'not permitted explictly then not allowed' policy on machines which provide shell access to users, which can not be trusted, while trying to keep KISS rule. Of course you should carefully check up and configure applications, which you allow your users to run, otherwise it still would be trivial to break your policy with badly configured pine or lynx for example. Some day this will be a full-fledged user tracking system.
1a0fdbb6fcfad3e948679681898566a7394e700dce9b2bc9d7f59344b50373d8