what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2001-11-14 to 2001-11-15

swatch-3.0.4.tar.gz
Posted Nov 14, 2001
Authored by Todd Atkins | Site stanford.edu

Swatch, the Simple Watch Daemon is a program for UNIX system logging, originally written to actively monitor messages as they are written to a log file via the UNIX syslog utility. Swatch was designed to keep system administrators from being overwhelmed by large quantities of log data. It monitors log files and acts to filter out unwanted data and take one or more simple user specified actions based upon patterns in the log. Swatch can monitor information as it is being appended to the log file and alert system administrators immediately to serious system problems as they occur.

Changes: Fixed a big bug involving key value assignment when throttling.
tags | tool, intrusion detection
systems | unix
SHA-256 | 3f3225f58781b125ec0025ae69ddac82e9e8a2e0b1b3bb4b116021812053dfd7
openssh-3.0p1.tar.gz
Posted Nov 14, 2001
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: The default protocol is now SSH protocol v2. Support for Rekeying in protocol v2 was added. Dynamic forwarding added useing ssh(1) as your socks server. Extended AllowUsers user@host syntax added to sshd(8). ssh-keyscan(1) now supports protocol version 2. Full changelog available here.
tags | encryption
systems | linux, openbsd
SHA-256 | 4a0aee685874a64fcc96bd36f2ed4f341709d9191ef730e7b405de32e87241eb
incident-2.0.tar.gz
Posted Nov 14, 2001
Site cse.fau.edu

Incident.pl is a small script which, when given syslogs generated by snort or other tools, can generate an incident report for events that appear to be attempted security attacks, gather information on the remote host, and report the attack to the appropriate administrators.

Changes: Switched back to WHOIS for IP lookups with a fallback to RWHOIS due to the fact that rwhois.arin.net is so often overloaded.
tags | tool, remote, sniffer
SHA-256 | 46adf59384df5ca7c2c095ffeccfb3c7e7ad2d0beb49cb9f31f7dd68985ac1bd
ipsorc-1.2.tar.gz
Posted Nov 14, 2001
Site legions.org

IP Sorcery is a TCPIP packet generator which allows you to send TCP, UDP, and ICMP packets with a GTK+ interface.

Changes: Repaired the ability to send data within the packets in the GTK version.
tags | udp, tcp
systems | unix
SHA-256 | 128427aa2c9f567d35671fdb436ca66aa14301c90b9cee6ca7ac222e41c6eb9d
stunnel-3.21c.tar.gz
Posted Nov 14, 2001
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code. Windows binaries available here.

Changes: Includes DLLs for OpenSSL 0.9.6b. Updated autoconf scripts and docs.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
SHA-256 | 46b40e6c5e18997904ac098eb57f3c539feb3c92fdf18c475e4524a3b97ceb8c
floppyfw-1.0.12.img
Posted Nov 14, 2001
Authored by Thomas Lundquist | Site zelow.no

Floppyfw is a router and firewall on one floppy disk. It uses Linux basic firewall capabilities, and has a simple packaging system. It is ideal for masquerading and securing networks on ADSL and cable lines, using static IP, DHCP, and PPPoE. Installation involves editing of only one file on the floppy.

Changes: New stable release! A DHCP server and DNS cache were added. Kernel 2.2.20 is now included.
tags | tool, firewall
systems | linux
SHA-256 | 656537f156e158ceb049740eee387415c59f412c978d35ae9e0a1a73a55aa6af
SUN MICROSYSTEMS SECURITY BULLETIN: #00212
Posted Nov 14, 2001
Site sunsolve.sun.com

Patch advisory for Sun Microsystems. Please read for details.

tags | remote, root
systems | solaris
SHA-256 | fdb48f205b9093efa4f6227ea7def7424f4461b07154dea026d00d83941e9ec3
hp-ux-bdf.c
Posted Nov 14, 2001
Authored by Brainstorm, electronicsouls | Site es.xor.ru

Hp-ux-bdf.c is a local root buffer overflow exploit for HP-UX's /usr/bin/bdf.

tags | exploit, overflow, local, root
systems | hpux
SHA-256 | 0e8e2833f271db51967945879c37ea8b040d8a327992db7a84525fd4e618c1ce
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close