exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 1999-12-03 to 1999-12-04

obscure.htm
Posted Dec 3, 1999
Authored by Pchelp

How to Obscure Any URL: How Spammers And Scammers Hide and Confuse. There are several tricks that can be used to make it nearly impossable to recognise a URL.

tags | paper
SHA-256 | 80c93bd618f9bacdf4e5e0332f855a589fd0810f8bb177d90735b20ddccaf233
snortlog.pl
Posted Dec 3, 1999
Authored by Angelos Karageorgiou

snortlog.pl is a Perl script which looks up the hostnames of machines mentioned in a snort IDS alert and outputs the relavent information in a nice list.

tags | tool, perl, sniffer
SHA-256 | 98dfade3c57569947f129626d47b4be6447d590f6a3ba798295069ceb33e8950
cocaine.pdf
Posted Dec 3, 1999
Authored by Frank Stajano | Site cl.cam.ac.uk

The Cocaine Auction Protocol: On the Power of Anonymous Broadcast. This paper builds on a case study, of an anonymous auction between mistrustful principals with no trusted arbitrator, to introduce "anonymous broadcast" as a new protocol building block.

tags | paper, protocol
SHA-256 | 2f16d0a33c26665f4722f2e8a65ae5abe50817696ba1995bbed8c0b49e19e0bf
lookout-1.2.zip
Posted Dec 3, 1999
Authored by Jeremy Iverson

Lookout version 1.2 is a Windows tool which sends raw data over a tcp connection, allowing the inspection of protocols and the testing of buffers. Lookout connects to a foreign host's port and allows you to communicate with the host. Alternatively, Lookout can listen on a port and wait for another host to connect. Once connected, you can send raw data (including an option for a variable-length string) to the remote host.

Changes: Minor bug fixes, including a fix to allow 5 digit port numbers. Screenshot here.
tags | remote, tcp, protocol
systems | windows
SHA-256 | a7d75136b4fc6be92ad9bf22b7354f8a741f588c62101e1a1e983cb454a03c1b
evdsb7re.zip
Posted Dec 3, 1999
Authored by Zyklon B | Site memsoft.cjb.net

This program lets you comfigure and remove a SubSeven server, including some of its hidden features. Main purpose is changing settings that server editor and client dont allow you to alter. Works with SubSeven 2.1, 2.1b, and 2.0. Shows notification info (uin, email, irc). Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | 6ec35e83bbd20741ab81dc899d5c3d1fa59e08a9460e8c5851a020eef261893a
subseven-2.1.txt
Posted Dec 3, 1999
Authored by Acidtracers

Information on the removal of Subseven 2.1. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | cbd376667b7ab0f1081e91a4aa0565754b4046f8e4163759027cb2f2ae0d4e26
Bastille-0.91.tar
Posted Dec 3, 1999
Authored by Jay Beale | Site bastille-linux.org

Bastille Linux aims to be the most comprehensive, flexible and educational Security Hardening Program for Red Hat Linux. Virtually every task it performs is optional, providing immense flexibility. It also educates the user regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.

Changes: Enhanced and improved logging, an automation feature via a log of all input (for testing), native Perl code to replace the wget call, and bug fixes.
systems | linux, redhat
SHA-256 | d200416a1d8428b573d8ae3049b70f3cd23118c6800d2d3134856baf9648da52
syslog-ng-1.2.3.tar.gz
Posted Dec 3, 1999
Authored by Balazs Scheidler | Site balabit.hu

syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful.

Changes: Fixes for a SIGHUP-handling bug and an assertion failure in both the Development and Stable series.
tags | system logging
systems | unix
SHA-256 | c849d92e357e7556a3bfac1ca210678d6f43965a900b2bd57cdd787bc66fcc7b
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close