exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-10-01

netsec31.txt
Posted Oct 1, 2000
Site net-security.org

Weekly Newsletter from Help Net Security - Covers weekly roundups of security events that were in the news the past week. In this issue: Building a DHCP server under Linux, :CueCat privacy advisory, Carnovore FAQ, VBS.Disabled.Worm, Detection of unknown viruses, Major vulnerability in Alabanza control panel, E*Trade login/passwords remotely recoverable, Ciscosecure ACS vulnerabilities, Browsegate v2.80 dos, Red Hat Glint symlink vulnerability, Extent RBS directory transversal, exploit using Eudora and the Guninski hole, Wincom LPD dos, DG/UX kdebug daemon remote vulnerability, and more.

tags | worm, remote, vulnerability
systems | linux, redhat
SHA-256 | 51b6b27c22f175737877cc0d9468dcdc77c0ac0cd039baae902daa9a6a126768
Internet Security Systems Security Alert September 25, 2000
Posted Oct 1, 2000
Site xforce.iss.net

New versions of Stacheldraht and Trinity distributed denial of service (DDoS) attack tools have been found in the wild. The new versions of Stacheldraht include Stacheldraht 1.666+antigl+yps and Stacheldraht 1.666+smurf+yps. A variant of the Trinity tool called entitee has also been reported.

tags | denial of service
SHA-256 | bf70582377dd6c20bb49cdd77ca3e0c56492dfd692b6275a785542a9865f27f6
dnshoe.pl
Posted Oct 1, 2000
Authored by Xram_LraK

DNSHoe.pl v1.0 is a perl script which looks up hostnames for a range of IP addresses. Good for doing low profile network reconnaissance. Requires NET::DNS perl module.

tags | tool, scanner, perl
systems | unix
SHA-256 | 8ec26f5c8d81342f7b0b163a761ae8c07e21c96033d3c3937f3b27cbed37ebd5
ms00-069
Posted Oct 1, 2000

Microsoft Security Bulletin (MS00-069) - Microsoft has released a patch that eliminates the "Simplified Chinese IME State Recognition" vulnerability in Windows 2000 which allows a malicious user with access to either a physical keyboard or a terminal server session to gain LocalSystem privilege, without logging onto the machine. Microsoft FAQ on this issue available here.

systems | windows
SHA-256 | e6561dc5d442f32b4b2b9f66505a703d117d83ea92d5675bd658cd94ab2b12e3
sendmail.8.11.1.tar.gz
Posted Oct 1, 2000
Site sendmail.org

Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.

Changes: Mostly minor bug fixes.
systems | unix
SHA-256 | ae34096c24be271f4b2392de0b8671255ddbdfd32938193760530348d23d0325
bfbtester-2.0B-20000709.tar.gz
Posted Oct 1, 2000
Authored by Mike Heffner | Site my.ispchannel.com

BFBTester is a utility for doing quick, proactive security checks of binary programs by performing checks of single and multiple argument command line overflows and environment variable overflows. It will also watch for tempfile creation activity to alert the user of any programs using unsafe tempfile names. While BFBTester can not test all overflows in software, it is useful for detecting initial mistakes that can red flag dangerous software. Tested on FreeBSD and Solaris. Some overflows found with BFBtester are here.

Changes: Bug fixes and small enhancments.
tags | tool, overflow
systems | unix, solaris, freebsd
SHA-256 | 352e56368cecec67fcf3f4d50db5519b0d27e2ca85fdeb5e38df1ce311dfdbf9
wsc11.zip
Posted Oct 1, 2000
Site winsniff.hypermart.net

Winsniffer is a packet sniffer for the Windows console designed to be effecient and flexible. Screenshot available here. This is a trial version.

tags | tool, sniffer
systems | windows
SHA-256 | 2faa11fb3655d3a03324f268eb9e9a99c2ad0d94184b6968ee4ce8417fe1078d
Spade-092200.1.tar.gz
Posted Oct 1, 2000
Authored by Stuart Staniford, James Hoagland | Site silicondefense.com

Spade stands for Statistical Packet Anomaly Detection Engine. It is a Snort preprocessor plugin to report and score unusual, possibly suspicious, packets. The anomaly score that is assigned is based on the observed history of the network. The fewer times that a particular kind of packet has occurred in the past, the higher its anomaly score will be. Based on the SPICE Whitepaper.

tags | tool, sniffer
SHA-256 | 2d6fa9e406470ef908f831043f095d3795da1bdc0dcb001c6ef8411dfc6f8b38
spice-ccs2000.pdf
Posted Oct 1, 2000
Authored by James Hoagland | Site silicondefense.com

SPICE Whitepaper - The Stealthy Portscan and Intrusion Correlation Engine is a project at Silicon Defense to detect portscans, even those in which the attacker has attempted to make the scan stealthy. For example, they may have slowed down the scan or randomized it. The basic idea with Spice is to monitor a network's packets. Each packet is assigned an anomaly score based on the normal traffic observed on the network. The higher the score, the more unusual and possibly suspicious the packet it. These are then passed to a correlator which groups related packets together and reports portscans. The correlator is under active development but an implementation of the anomaly sensor called SPADE has been released.

tags | paper
SHA-256 | c99f6f93498d742845e7c30fc7a248c8ed4aea75426f04e9ec5ace07517adf05
siden-0.1.0.tar.gz
Posted Oct 1, 2000
Authored by Lawrence Teo | Site siden.sourceforge.net

SIDEN is a distributed network discovery tool which allows you to simulate coordinated/distributed network probes by a group of attackers against one or many target machines. It uses a client/agent architecture where the agents are installed on multiple hosts. Works well on OpenBSD and FreeBSD.

tags | denial of service
systems | freebsd, openbsd
SHA-256 | 71edb23b755f7de1eaaf2e5199b905da4676113137ff32ee57c6c86680f60d80
filewatch-0.09.tar.gz
Posted Oct 1, 2000
Authored by Lasse Kaislaniemi | Site sourceforge.net

Filewatch is a perl script which watches the CTIME of your files and alerts you to any changes.

tags | tool, perl, intrusion detection
systems | unix
SHA-256 | e9b0b9efd07c128e57f46f40b0b2e0a783de6b4293eef730676aacb551c53e92
lids-0.9.9-2.2.17.tar.gz
Posted Oct 1, 2000
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection.

Changes: This is a bugfix and code cleanup release.
tags | kernel, root
systems | linux
SHA-256 | e275ddc9295a2fddee1e45c565df3832e526ec7cb6b0c378c9aa85ebbb90e5b1
arping-0.93.tar.gz
Posted Oct 1, 2000
Authored by Marvin | Site habets.pp.se

Arping is an arp level ping utility which broadcasts a who-has ARP packet on the network and prints answers. Very useful when you are trying to pick an unused IP for a net that you don't yet have routing to.

Changes: Fixes for FreeBSD.
tags | tool
systems | unix
SHA-256 | 976349baa74d7c9985fcc53b8c28077afa403438fcce93e278e32ae3198d6aa6
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    12 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close