More information on the vulnerability described in ms99-061, a problem in IIS that causes it to parse invalid escape sequences, allowing a carefully made string to bypass IDS systems, ISAPI filters, and extension handlers. Includes a perl script to test for vulnerability.
ef40568ad6b25c2ee06d8471ee964346dcb723886938cecd3b91cb78e396a9a0
Unixware 7 Vulnerability - Any local users can exploit a bug in rtpm to gain "sys" privileges.
67a0fa19005aafa9242d3fbfa9e854feb7e4cfe89d0badb133bbc369c9e2471e
Recovery of supposedly erased data from magnetic media is easier than what many people would like to believe. A technique called Magnetic Force Microscopy (MFM) allows any moderately funded opponent recover the last two or three layers of data written to disk. Wipe repeadetly overwrites special patterns to the files to be destroyed, using the fsync() call and/or the O_SYNC bit to force disk access.
80556ae453a20cddc8f5722425fb2bd0f65d1c6a47fed3a6f710036dfdc64aca
reltunnel - Offers a reliable data channel over unreliable protocols.
441ede0a7fa2af972ab873891120c2ef966f24a225fcbbd4ca2fc7cc2a51320d
icmptunnel encapsulates data in ICMP frames. The usual mode of operation is tcp/ip forwarding, one icmptunnel will be set up on a blocked machine (behind a firewall) listening on TCP/IP port X. The other icmptunnel will be set up on a nonblocked machine (somewhere on the internet) connected to a local service (such as port 23, telnet). Data received on the blocked machine's tcp/ip socket will be encapsulated in an ICMP packet of users choice (ICMP_ECHO, ICMP_ECHOREPLY, ICMP_TIMESTAMP, etc..) and sent to the nonblocked machine. This machine will identify the packet as encapsulated data, decapsulate the data and forward it on to its tcp/ip socket connected to the telnet daemon. The telnet daemon responds with some data, icmptunnel on the nonblocked machine encapses the packet and sends it back to the blocked machine (ICMP type still user definable).
e414eb5c22d711054cf1a16559c6d88f0e38880d80e83e40f639eca897217a32
LinGate is a powerful network gateway software. It provides security to your networks, allowing access to external world in safe and secure manner. LinGate has access control mechanism to restrict access to its services. It can even perform different services for requests from different IPs on the same LinGate port. Once setup, LinGate requires no operators, and can be configured remotely using KLinGate interface which will be designed for KDE and jLinGate which will be designed for the Java platform.
899374fb1e9db1eada77929718f86176ae9e101b02e78b44115646b49085903a
Firewalking is a technique developed by Mike Schiffman and David Goldsmith that employs traceroute-like techniques to analyze IP packet responses to determine gateway ACL filters and map networks. Firewalk the tool employs the technique to determine the filter rules in place on a packet forwarding device. The newest version of the tool, firewalk/GTK introduces the option of using a graphical interface and a few bug fixes.
abca0e11c8a13b172277159c158ef59459718014b5ddb721b1854918bb4d79e9