what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 94 RSS Feed

Files Date: 2005-06-01

Fwknop Port Knocking Utility
Posted Jun 1, 2005
Authored by Michael Rash | Site cipherdyne.org

fwknop is a flexible port knocking implementation that is based around iptables. Both shared knock sequences and encrypted knock sequences are supported. In addition, fwknop makes use of passive OS fingerprinting signatures derived from p0f to ensure the OS that initiates a knock sequence conforms to a specific type. This makes it possible to allow, say, only Linux systems to connect to your SSH daemon. Both the knock sequences and OS fingerprinting are completely implemented around iptables log messages, and so a separate packet capture library is not required.

Changes: Added new authorization mode. Updated man page and there are a few other additions to the functionality.
tags | tool, scanner
systems | linux, unix
SHA-256 | 0e104718c305f413ce87cd7d283f8614932827f22ae91bff47223ca54cb47f56
ettercap-NG-0.7.3.tar.gz
Posted Jun 1, 2005
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap NG is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | c74239052d62565c13a82f9bbf217a4fdcce4b34949e361b53bb3f28e3168543
snortsms-0.11.3.tgz
Posted Jun 1, 2005
Authored by SmithJ108 | Site snortsms.servangle.net

SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and synchronize all sensor configurations.

Changes: Enabled logging. Various bug fixes.
tags | tool, web, sniffer
SHA-256 | 7b638837143a4cdb02e542f191dd034fc092bcf78529675774bc31eecfc0ca4c
logcheck_1.2.40.tar.gz
Posted Jun 1, 2005
Authored by Todd Troxell | Site logcheck.org

Logcheck parses system logs and generates email reports based on anomalies. Anomalies can be defined by users with 'violations' files. It differentiates between 'Active System Attacks', 'Security Violations', and 'Unusual Activity', and is smart enough to remember where in the log it stopped processing to improve efficiency. It can also warn when log files shrink, and does not report errors when they are rotated.

Changes: Various updates. See changelog.
tags | tool, intrusion detection
systems | unix
SHA-256 | 8ea069973658ec38364825e8c6aab694b935017b10a5c89e15c9b3f2ae2ec6dd
placid-2.0.7.tar.gz
Posted Jun 1, 2005
Authored by Phillip Deneault | Site speakeasy.wpi.edu

Placid is a Web-based frontend for Snort that uses MySQL. It supports searching, sorting, and graphing of events, and was designed for speed and to have little overhead.

Changes: Bug fixes. Minor additions and changes.
tags | tool, web, sniffer
SHA-256 | e5ceeab43d57c3933e018ffdcd3aa52b32c97295fff53e909fb6c497535cfbb1
SteGUI-0.0.1.tgz
Posted Jun 1, 2005
Authored by Nicola Cocchiaro | Site sf.net

SteGUI is a graphical front-end to Steghide that lets users view the images (in Bitmap and JPEG format) and play the sounds (in Wave and AU format) that Steghide allows as cover files. SteGUI also contains a simple text editor to manage text payload files (although any kind of file can be a payload to hide). The idea is to allow users to manage the supported file types and use Steghide from a single graphical tool.

tags | encryption, steganography
SHA-256 | 550fb33f0d47dbb9e8d6baff881ddcfba6eee53015a6f6cd75c249719ca9ad8a
yersinia-0.5.4.tar.gz
Posted Jun 1, 2005
Authored by David Barroso, Alfredo Andres Omella | Site yersinia.sf.net

Yersinia implements several attacks for the following protocols: Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking (DTP), 802.1q and VLAN Trunking (VTP), helping a pen-tester with different tasks.

Changes: A couple of bug fixes.
tags | tool, protocol
systems | cisco, unix
SHA-256 | 5b149fd33367fda98c96fc54eff80e9fa2d4091d9485545f18f053af05674444
ibsh-0.3d.tar.gz
Posted Jun 1, 2005
Authored by Attila Nagyidai | Site ibsh.sourceforge.net

Iron Bars SHell is a restricted Unix shell. The user can not step out of, nor access, files outside the home directory. Two ASCII configuration files are used for more control. The system administrator can define which commands may be executed by the user. No other executables are allowed. The admin also has the opportunity to define what kind of files the user may create. If a file has a certain extension (such as .mp3, .c, etc.), ibsh automatically erases it.

Changes: Fixed a format string vulnerability.
tags | shell
systems | unix
SHA-256 | 564f410fffd469de4d5689545f4a392e61e77ebeb6ac0fcbbbfa119f068ca836
plash-1.8.tar.gz
Posted Jun 1, 2005
Authored by Mark Seaborn | Site cs.jhu.edu

Plash (the Principle of Least Authority Shell) is a Unix shell that lets you run Unix programs with access only to the files and directories they need to run. In order to implement this, the filesystem is virtualized. Each process can have its own namespace, which can contain a subset of your files. Plash is implemented by modifying GNU libc and replacing the system calls that use filenames. For example, open() is changed so that it sends a message to a file server via a socket. If the request is successful, the server sends the client a file descriptor. Processes are run in a chroot jail under dynamically-allocated user IDs. No kernel modifications are required. Existing Linux binaries work unchanged.

tags | tool, shell, kernel
systems | linux, unix
SHA-256 | a6e327e4641c47eb04a6aaa489e1b964c6a8e799591ad61959af067078152d21
Vuurmuur-0.5.66.tar.gz
Posted Jun 1, 2005
Authored by Victor Julien | Site vuurmuur.sourceforge.net

Vuurmuur is a middle-end and front-end for netfilter and iptables that is aimed at system administrators who need a decent firewall, but do not have netfilter specific knowledge. It converts human-readable rules into an iptables ruleset (or optional a bash script), makes netfilter logs readable, and includes an ncurses GUI.

Changes: Various fixes, updates, and improvements.
tags | tool, firewall, bash
systems | linux
SHA-256 | a4ff68c34faac23779d07cc1f15092499e571e8ac10bf92cfd4fd8e16ece9987
os-sim-0.9.8.tar.gz
Posted Jun 1, 2005
Authored by Dominique Karg, David Gil, Fabio Ospitia Trujillo, Julio Casal, Jesus D. Munoz | Site sourceforge.net

Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.

Changes: Various bug fixes and feature enhancements.
tags | system logging
systems | linux, unix
SHA-256 | eb7ca786fb4fccf96569e9723489e4256e2ce255109fffe448d7d074b99a5534
Clam AntiVirus Toolkit 0.85.1
Posted Jun 1, 2005
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes and updates.
tags | virus
systems | unix
SHA-256 | f5e58b23aed35ff75a9039ce1931565be84653fc6474d395ebbb9bc9927136ae
silc-toolkit-1.0.tar.gz
Posted Jun 1, 2005
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.

Changes: Rewritten SILC Log API.
tags | protocol
SHA-256 | ff86828e70d5547a9263ea45f4339805e9611ddf2b5fedcd3ae5de2fdb049f90
vr-9.3c.tar.gz
Posted Jun 1, 2005
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: Maintenance Release.
systems | unix
SHA-256 | 2e843d3352ba65a6785170a2978a23c0e1d08982e6e90e315c9ddbe7d9ee22ca
nufw-1.0.5.tar.gz
Posted Jun 1, 2005
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Added nuauth_log_users_without_realm.
tags | tool, remote, firewall
systems | unix
SHA-256 | 0a9e16857ce1eb0f7531760ab4a4619874e9a4f775a44064143a415cc1e38f89
hatchet-0.8.tar.gz
Posted Jun 1, 2005
Authored by fuzzyping | Site dixongroup.net

Hatchet is a log parsing and viewing utility for OpenBSD's PF firewall software. It presents HTML output of logged events and utilization graphs using pfstat.

Changes: Reorganization of docs directory. Various bug fixes.
tags | tool, firewall
systems | unix, openbsd
SHA-256 | ea00c1426aeeb79907e6d6ebd6546ee3bbc75d2fcf9080013e5d7d196df46388
Openwall Linux Kernel Patch
Posted Jun 1, 2005
Authored by Solar Designer | Site openwall.com

The Openwall Linux kernel patch is a collection of security hardening features for the Linux kernel which can stop most 'cookbook' buffer overflow exploits. The patch can also add more privacy to the system by restricting access to parts of /proc so that users may not see what others are doing. Also tightens down file descriptors 0, 1, and 2, implements process limits and shared memory destruction.

Changes: This version adds a fix to the ELF core dump vulnerability.
tags | overflow, kernel
systems | linux
advisories | CVE-2005-1263
SHA-256 | 00633e5f2a6f35002c0690c4639fb5536f58638c9b1cc221c2a1bee7fa20b7c4
framework-2.4.tar.gz
Posted Jun 1, 2005
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. The Framework will run on any modern system that has a working Perl interpreter, the Windows installer includes a slimmed-down version of the Cygwin environment.

Changes: Five new exploits added.
tags | tool, perl
systems | windows, unix
SHA-256 | 6ce8397bb13a7f963d1755f789c9607ecc3e44356ffc8a81d9f9b58dbec6e98d
Nmap-Parser-0.80.tar.gz
Posted Jun 1, 2005
Authored by Anthony G Persaud | Site npx.sourceforge.net

Nmap Parser is a Perl module that simplifies the process of developing scripts and collecting information from the XML nmap scan data, which can be obtained by using nmap's -oX switch or from the file handle of a pipe to an nmap process. It uses the XML twig library for parsing, and supports filters.

Changes: Support for multiple instances of Nmap::Parser objects without overwriting data. Various other tweaks.
tags | tool, perl, nmap
systems | unix
SHA-256 | 71fc194baf3ceed9a2ff8f9c1b655891098f3ab906d35e9e3ec7c07f827e2def
netspoc-2.6.tar.gz
Posted Jun 1, 2005
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: Multiple bug fixes.
systems | unix
SHA-256 | 243418d60e57fa3bfa11190c0fb64b2485bddb5fd1ac19e2289b446db630a18a
afick-2.7-1.tgz
Posted Jun 1, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Various bug fixes.
tags | tool, integrity
systems | windows, unix
SHA-256 | 9f41debb19bde9b1d1da8fc9ca42d7f82c8cb9130a83962750212f8fa789c82c
Samhain File Integrity Checker
Posted Jun 1, 2005
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Various updates.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 5fd1ea6804f7289d380a3ed5189d08a61e03bcff759648804d8ddcdf558e1d5a
Pound-1.8.tgz
Posted Jun 1, 2005
Authored by roseg | Site apsis.ch

Pound is a reverse HTTP proxy, load balancer, and SSL wrapper. It proxies client HTTPS requests to HTTP backend servers, distributes the requests among several servers while keeping sessions, supports HTTP/1.1 requests even if the backend server(s) are HTTP/1.0, and sanitizes requests.

Changes: See the changelog.
tags | web
SHA-256 | 335249d2bb84a4474e8bb3eb880097f1e0d95b442016a1ce90c66ea73ae2c076
ifchk-0.95b4.tar.gz
Posted Jun 1, 2005
Authored by noorg | Site noorg.org

Ifchk is a network interface promiscuous mode detection tool that reports on the operational state of all configured interfaces present on the system. In addition, it will disable those interfaces found to be promiscuous if told to do so. Per-interface statistics can also be displayed, allowing administrators to perform traffic trend analysis, which could be an aid in the identification of possible inconsistencies or spikes in network traffic volume that may warrant further investigation.

Changes: Minimal updates.
systems | unix
SHA-256 | 53c9119449e8abd7a546074918d558c0dbee08c6851f5d742192f9d4a6c9f98d
umbrella-0.7.tar.bz
Posted Jun 1, 2005
Site umbrella.sourceforge.net

The Umbrella security mechanism implements a combination of process-based Mandatory Access Control (MAC) and authentication of files through Digital Signed Binaries (DSB) for Linux based consumer electronics devices ranging from mobile phones to settop boxes. Umbrella is implemented on top of the Linux Security Modules (LSM) framework. The MAC scheme is enforced by a set of restrictions on each process. This policy is distributed with a binary in form of execute restrictions (in the file signature) and within the program, where the developer has the opportunity of making a restricted fork.

Changes: Various fixes.
systems | linux
SHA-256 | faeb10d56d1de90fdbbed7805e978845fdc3ef6a6b662e432333a84ad68f04aa
Page 1 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close