This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
42809a94a8db02acdf52353523b4e063ef735a949796ca0a3fc3695a2cbe0a86
HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories iff they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.
26e213583a40c8da84ee0f58e090065625adfafc3bb4fe27bbc33426328f874f
HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories iff they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.
e4308abac01e5491aacb30967a7fd233944e2cd1fe0c9cce3558b119b04f5382
Merant Micro Focus Cobol 4.1 local root exploit - Writes to /var/mfaslmf/nolicense.
b3e6feb09ab94e71a3134d21b92fbc379b90d55ded65c2e679fcd15a4ef25b91
FreeBSD X key lock (xklock) v2.7.1 and below local root exploit - Tested on FreeBSD ports collection v3.5.1 and v4.2.
c4dd124149e7e5bf8e081992f5222838ea736a6a2d2fb554c015d78b41490b57
Microsoft Security Advisory MS01-011 - A core service running on all Windows 2000 domain controllers contains a flaw in the processing of requests which allows remote attackers to use up most of the CPU, limiting the number of logins the machine can process. Microsoft FAQ on this issue available here.
4f2a7e699ba6d383a5a2c3e8690ab871e83dce3ab2b17788fc1f20921baeea60
Red Hat Security Advisory RHSA-2001:014-03 - A locally exploitable buffer overflow was found in the crontab command in the handling of long usernames - If the system administrator has created usernames 20 characters long, it is possible for those users to gain elevated privileges.
c9d942e6d811a70f2061f713b8b18bc5e93bc8d091867ffd6a3f723608aeeddc
Securing IGS Cisco Routers v1.00 - This paper will describe how you should obtain remote and local, information about an IGS Cisco Router. After we have collected some information that is useful to us, we'll try to secure the router as much as possible.
562e7903c6f08e878af7573561022cf9f8609367a50b3705518f6e6ab89765f3
CBD.c is a simple backdoor which allows machines behind firewalls to be controlled via outgoing connections.
72680bcedec7e00dde9290e30fe7813178a5b8cda122558b6d3a49b9871d7c3c
Doorwatch is a tool for Windows 95/98/ME/NT/2000 which does IP scanning, port scanning, NetBios scanning, Trojan scanning, and more. Documentation in Korean - English here..
4c7bc5596f2c64e3aacdbe80cc5d8c322c0b4c6234f35f3aaf6279ed2a15d80b
TWWWscan is a Windows based www vulnerability scanner which looks for 400 www/cgi vulnerabilities . Displays http header, server info, and tries for accurate results. Now features anti-IDS url encoding and passive mode scan. Tested on win95 osr2 win98,win98se,win nt4,win 2k/Me.
0759feb28ca9e981a6a5df1a4ce9234f54b9bb0df874159150b208e2c52cb3bd
Lpdfp is a perl script which sends a malformed query to TCP port 515 in an attempt to determine the remote OS. Whitepaper available here.
5aba8532c4351159c472bcfbf2237056ad0f1d10dcae1ced7682f8068c5a94ed
Remote OS Detection using LPD Querying - Line printer daemons listening on TCP port 515 can give away information about which OS is running. Proof of concept code which contains a database of LPD returned messages and OS matches here.
cded128bdfd32167081a2f12af24098e14d48c17d622174b582fc793b3e6d45d
Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Screenshot available here.
80dc1e92e456d139488c3d46a07f85edc99f24c693be2abffe7d1e19da8e6146