what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 1999-10-13

pepsi.txt
Posted Oct 13, 1999

Sil of AntiOffline has discovered a disturbing bug in cans of Pepsi and Diet Pepsi. Apparently he has notified the vendors of this problem, yet they steadfastly refuse to release a patch. All known versions are affected. With Coke and Pepsi having most of the market share in cola drinks, surely this is an another argument for more soft drink diversity!

tags | exploit
SHA-256 | d269a0eb52cf0d0eab565a5afb0264fff9a992aef99a2ba9e47ea522849a6eee
lisapaper.ps
Posted Oct 13, 1999
Authored by Martin Roesch

PostScript version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.

tags | paper
SHA-256 | 07ce0af9507b3d59633a10839dec73e882872e79cab1fd4d98721ac7e992577d
lisapaper.txt
Posted Oct 13, 1999
Authored by Martin Roesch

Text version of "Snort - Lightweight Intrusion Detection for Networks" by Martin Roesch! This paper discusses the architecture, performance, and uses of Snort. If makes a comparative analysis of Snort to some other wellknown programs used for similar purposes. There is also a nice rules tutorial contained in the document for those of you wanting to know how the rules system works.

tags | paper
SHA-256 | 4af7dd6373c07359980c03139c1927b168d13a6111720b6467405f02a2200192
hunt-1.4.tgz
Posted Oct 13, 1999
Authored by Pavel Krauz

Hunt is a program for intruding into a connection, watching it and resetting it. (source code package). It has several features, which I didn't find in any product like Juggernaut or T-sight that inspired me in my development. Note that hunt is operating on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. The hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Changes from 1.3: eth tap relay - transproxy support without my eth mac spoofing, support for spoofing range of IP addresses, relaying packets in arp-relayer that are sent from/to routers, support for arp-spoof of hosts that are currently down, tpserv/tpserv.c transproxy testing program tpsetup/transproxy script for setting transproxy support mode.

tags | tool, local, spoof, sniffer
SHA-256 | 67bf57a29fe9cba3fbf27789e5ca66a5b59eb00eccb4775058cd8013fdd2288c
hunt-1.4bin.tgz
Posted Oct 13, 1999
Authored by Pavel Krauz

Hunt is a program for intruding into a connection, watching it and resetting it. (linux binary distribution). It has several features, which I didn't find in any product like Juggernaut or T-sight that inspired me in my development. Note that hunt is operating on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. The hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Changes from 1.3: eth tap relay - transproxy support without my eth mac spoofing, support for spoofing range of IP addresses, relaying packets in arp-relayer that are sent from/to routers, support for arp-spoof of hosts that are currently down, tpserv/tpserv.c transproxy testing program tpsetup/transproxy script for setting transproxy support mode.

tags | tool, local, spoof, sniffer
systems | linux
SHA-256 | 4fbc536818885a42c005c10ae3f0bf335a07d693ae2b5626b127ad46db0f40b4
snort-1.3.1.tar.gz
Posted Oct 13, 1999
Authored by Martin Roesch

Version 1.3.1 of Snort, the lightweight network intrusion detection system. Version 1.3.1 fixes an annoying crash bug, plus enhances a number of features of the program. Invalid ICMP types/codes can now be filtered or monitored, the tcpdump file playback facility can use BPF filters, and the packet payload size check keyword now accepts greater than/less than modifiers.

tags | tool, sniffer
SHA-256 | 6a7e0f7ecefe5665e005a26a74d0f35b9b2e824811ed00eef81ffb1e6a9b589b
bo120p07.zip
Posted Oct 13, 1999
Authored by su1d sh3ll

Patched version of back oriface which is not detected by DrWeb 4.x,sPIDER, AVP 3.0, or Norton Antivirus 5.0 win (base 18.11.98). BO version 1.20 patch 7. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
SHA-256 | fcf192e868551e1cd5a3215303ca93595b2992b105541f6e76633cfffacb16e1
ucgi1565.zip
Posted Oct 13, 1999
Authored by su1d sh3ll

CGI vulnerability scanner version 1.56. Checks for over 90 CGI vulnerabilities. Tested on slackware linux with kernel 2.0.35-2.2.5, Freebsd 2.2.1-3.2, IRIX 5.3, DOS, and windows.

tags | kernel, cgi, vulnerability
systems | linux, windows, unix, freebsd, irix, slackware
SHA-256 | d7b293de5c0726621fc1fb781af0ef65a2cb57ac2a7465b5520f3f022b7a4f76
winfingerprint-218.zip
Posted Oct 13, 1999
Authored by Vacuum

Winfingerprint 2 is a console based Win32 discovery tool. It is written in VC++ 6, and is currently in the process of being developed.

systems | windows
SHA-256 | c6a1d75b61c3aac9f360d6afc530bc566057e23afa408505e3b508f155f0b914
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close