Shag simulates an additional ethernet device over an existing one. It is useful for testing the security of your switch, or if your machine is on a private VLAN and you want to see another VLAN without another ethernet card.
7ee510e4bce9e523c9758c513e500833529544f55659916fc3dcbb673b915c83
Iptables is built on top of netfilter: the new packet alteration framework for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects.
1eaa9c5ee21455918fad19ee71cf9de7079abaac0e8f4807bf9f6223d6458b43
PAM/userhelper exploit - Ported to Mandrake 6.1. Also works on Red Hat 6.0 and 6.1, gives uid 0.
60f084b01a6b90f83d4afb30f04c2890fc63b2a6583017757d8572b289e798b3
gp4pine is a script that automatically encrypts and decrypts mail under Pine using PGP. The user is not separated from things that PGP does. The program is compatible with PGP versions 2.6.3, 5.0, 6.5.1 and GNUPG 1.0, has support for an aliases file and signature-rotating programs, and can remember your passphrase for a session if you need.
10240e332b56baf1d913fcebd10027efc25e3eabff07f28476aaf4d7b0c1872f
Nessus is a free, up-to-date, and full featured remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface, and currently performs over 340 remote security checks. It has powerful reporting capabilities (HTML, LaTeX, ASCII text) and not only points out problems, but suggests a solution for each of them.
f9f5973da2fae095fe2d786a297237838089fca47ab485ff736b56432d34c7c7
Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated frequently to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins.
d538800c967a63a4ed1ebc5d086124ac73eea401187ce93d55555b2a31379a2d
Microsoft Security Bulletin (MS00-016) - Microsoft has released a patch for the "Malformed Media License Request" denial of service vulnerability within the Microsoft Media License Manager. The vulnerability allows a malicious user to prevent the license server from issuing further licenses to customers for protected digital content (music and video). Microsoft FAQ on this issue available here.
625a48c3d270bc6deaac511662ec6f28868be94a8605a42d1fcb909680f3a294
Snort is a libpcap-based packet sniffer/logger which can be used as a lightweight network intrusion detection system. It features rules based logging and can perform content searching/matching in addition to being used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, and much more. Snort has a real-time alerting capabilty, with alerts being sent to syslog, a seperate "alert" file, or as WinPopup messages via Samba's smbclient.
d1197a62590c2b6dfc978fd3c4cf1e82d8e2fbbbd35a5c0f1887101311459725
spoon.c - (ab)use dig.cgi to proxy DNS dig requests. Useful to request a zone transfer without revealing your IP.
bed34a7508213f2937d73bf1e00100537cc8f3ff8ce9ac45961c75bcec76988e
Microsoft Security Bulletin (MS00-018) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server 4.0. The "Chunked Encoding Post" vulnerability allows a malicious user to consume all resources on a web server and prevent it from servicing other users. Microsoft FAQ on this issue here.
e67925cf162159a7b9d9bd43f6d24b7696a9b1cdb7a2174c33c929d14020faed
Bastille Linux aims to be the most comprehensive, flexible, and educational Security Hardening Program for Red Hat Linux 6.0/6.1. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security.
3a1cccf8b3cde63ff58053d86ea14e3095cec9af0b7a79363bea0f9deac27ebe