what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2001-07-11 to 2001-07-12

StMichael_LKM-0.04.tar.gz
Posted Jul 11, 2001
Authored by Tim Lawless | Site sourceforge.net

StMichael is a LKM that attempts to detect and divert attempts to install a kernel-module backdoor into a running linux system. This is done by monitoring the init_module and delete_module process for changes in the system call table. This is a experimental version, and a spin off from the Saint Jude Project.

Changes: Added the SHA1 checksum to complement the md5's, added timers to periodically revalidate the kernel, added a configuration script, and added some demos which will trigger StMichael.
tags | kernel
systems | linux
SHA-256 | a0d290b17442053787c6652f23397b32b04e3066b225c9bafc040f367dd857d5
inaddyscan-beta-0.2.tgz
Posted Jul 11, 2001

InaddyScanner is a port scanner that uses pthreads, and can scan 500 ports in 10 seconds in a good connection (112 kbp/s). Using the MIT-pthreads library and GTK, it includes a friendly interface with advanced stuff for scanning.

tags | tool, scanner
systems | unix
SHA-256 | c870983583afa8034f6debaa6a2612d8e13e5c4706740d64880006cee9264176
logs2intrusions.zip
Posted Jul 11, 2001
Site trsecurity.net

Logs2Intrusions v1.0 parses IIS or Apache web server logfiles then create possible intrusions report.

tags | web
SHA-256 | 3f40f66b2115df1396b1b9a360d57330fab28da0db21fcf67fe7e9a5375dd39d
irpas_0.8.tar.gz
Posted Jul 11, 2001
Authored by FX | Site phenoelit.de

IRPAS is a suite of routing protocol attack tools which sends custom routing protocol packets from the unix command line. It is very useful for searching for new routing protocol vulnerabilities. Included is a tool for sending Cisco Discovery Protocol (CDP) messages, one for injecting IGRP routes, and a scanner for IGRP autonomous systems. Documentation available here.

tags | vulnerability, protocol
systems | cisco, unix
SHA-256 | 137b8a73f18383a037c5e6af51cfe6d29c72f38628bd5ce38f1864cf91a8e559
Stealth-1.0-b29.zip
Posted Jul 11, 2001
Authored by Felipe Moniz | Site hideaway.net

Stealth HTTP Security Scanner 1.0 build 29 - Checks for 5677 CGI vulnerabilities. Run on Win32 and Linux under Wine. Free.

Changes: Checks for Microsoft FrontPage 2000 Server Extensions Buffer Overflow, MS Index Server and Indexing Service ISAPI Extension Buffer Overflow, CGI Decode, and IIS 4.0 ISAPI Buffer Overflow.
tags | web, cgi, vulnerability
systems | linux, windows
SHA-256 | dfd5a362ab45ee605e5c6e601ae5eba7ed6f320e00d9ca8c260e2a5fa4e44f92
antexp.zip
Posted Jul 11, 2001
Site elcomsoft.com

Advanced NT Security Explorer (ANTExp) is an application for Microsoft Windows NT, Windows 2000 and Windows XP system administrators for finding holes in system security. It analyses user password hashes, and tries to recover plain-text passwords. If it's possible to recover the password in a reasonable time, the password should be considered to be insecure. ANTExp is very fast - tries about 900,000 passwords per second on a Pentium-III/450 CPU. Tested on Windows 95, Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP.

systems | windows
SHA-256 | cda4559e128daee59d7f154bb5d74f9cedc7a06826e88dd0bdfda3843e65f6ee
ftester-0.1.tar.gz
Posted Jul 11, 2001
Authored by Andrea Barisani

Firewall Tester v0.1 consists of two simple perl scripts, the client part (ftest.pl) and the listening "daemon" (ftestd.pl). The client injects custom packets with a signature in the data part while the daemon listens for such marked packets. Requires Net::RawIP, Net:PcapUtils, and Net::Packet.

tags | tool, perl, firewall
systems | unix
SHA-256 | b2d084cb97e57d877312862c2a15d12a330a9e005401c04c1c23373f57edf56f
kppp.c
Posted Jul 11, 2001
Authored by Doom, Smashstack | Site nbs.extremenetworking.net

Kppp (/usr/local/kde/bin/kppp) v1.1.2 and below local exploit. Tested against x86 and Sparc Linux.

tags | exploit, x86, local
systems | linux
SHA-256 | 6955c7c52f2070a0081b8194b5b560371868aee5f2f1508b33fcd2c8d10a32f7
malice-7.0b.tar.gz
Posted Jul 11, 2001
Authored by Natas

Malice v7.0 beta is a perl CGI scanner with an updated CGI list. Includes many anti-IDS functions, IIS checks, and more.

Changes: New anti-IDS techniques, updated CGI's, and IIS checks.
tags | cgi, perl
systems | unix
SHA-256 | 791d4a441af1936dedc5bf7495a5f3603d46c1f0dfd905bf0a8f15a4a1633efe
lcrzosrc-3.14.tgz
Posted Jul 11, 2001
Site laurentconstantin.com

Lcrzoex is a toolbox for network administrators and network hackers. Lcrzoex contains over 200 functionalities using network library lcrzo. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris. This archive contains Lcrzo and Lcrzoex.

Changes: New tool - Backdoor webserver to execute commands remotely. Also includes new tools to send mail and news with attachments, check mail server relaying, list newsgroups, and download articles. Many bugs were fixed.
tags | udp, spoof, tcp, protocol, library
systems | linux, solaris, freebsd
SHA-256 | 9dd0e763d15fb5c35153497f64e90bb52fb6123f375bad38d56b063969f8f6a5
pikt-1.14.0.tar.gz
Posted Jul 11, 2001
Authored by Robert Osterlund | Site pikt.uchicago.edu

PIKT is a cross-platform, multi-functional toolkit for monitoring systems, reporting and fixing problems, security management, and updating system configurations. PIKT comprises an embedded scripting language with unique, labor-saving features. Binaries available here.

Changes: New stable release - Piktx was rewritten. The script parser has been simplified. Added lots of new options and bug fixes.
tags | tool
systems | unix
SHA-256 | a68325fcd762dc2dba836045b8ce188f9637f11f7a9f0f0944080e9947be6a59
IM2001.pdf.gz
Posted Jul 11, 2001
Site ntop.org

Monitoring Networks Using ntop - How to monitor networks using the security tool ntop. Includes information on how to use it as a lightweight IDS.

tags | paper
systems | unix
SHA-256 | 8fab586e80d7808fa072e8c914fb00ef79573c88cc88de648f64595124e333e7
ntop-beta-2105.tgz
Posted Jul 11, 2001
Site ntop.org

Ntop is a very useful Unix / Windows network sniffing tool that shows the network usage, similar to what the popular top Unix command does. Has an interactive mode and a web mode for greater functionality and options, shows network traffic sorted according to various criteria, displays traffic statistics, shows IP traffic distribution among the various protocols, analyses IP traffic and sorts it according to the source/destination, displays IP Traffic Subnet matrix (who's talking to who?), reports IP protocol usage sorted by protocol type.

Changes: Fixed a security flaw - ntop now check whether the requested URL does not contains strings such as '..' that may violate system security. Added SSL and QNX support. Fixed PPP glitch and graphs.
tags | tool, web, sniffer, protocol
systems | windows, unix
SHA-256 | e707c5bc5e52fb6021280ce2cf3edb41d7da18ce67bff64736256dcf75b4a35a
ngrep-1.40.tar.gz
Posted Jul 11, 2001
Authored by Jordan Ritter | Site ngrep.sourceforge.net

Ngrep is a powerful network sniffing tool which strives to provide most of GNU grep's common features, applying them to all network traffic. ngrep is a pcap-aware tool that will allow you to specify extended regular expressions to match against data payloads of packets. It currently recognizes TCP, UDP and ICMP across Ethernet, PPP, SLIP, FDDI, and null interfaces, and understands bpf filter logic in the same fashion as more common packet sniffing tools, such as tcpdump and snoop.

Changes: Added option to set BPF caplen, fixed header for glibc 2.2, license changes, and bug fixes.
tags | tool, udp, sniffer, tcp
SHA-256 | fd9beee51894b3a6dca2d7e5a344111ae18c2d6670773cba789e27e91b65dbf4
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close