what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2001-05-23

modhide1.c
Posted May 23, 2001
Authored by Nijen Rode

Modhide1.c demonstrates a new method of hiding kernel modules which does not trigger any normal detection techniques because it does not change lsmod or the system call table. Instead it hacks the kernel's memory to make it "forget" the module.

tags | tool, kernel, rootkit
systems | unix
SHA-256 | 0a87b973516873f2b069e3b3d61def3144776cfcecb3dec5ab65fdef5d8cfd01
ms01-028
Posted May 23, 2001

Microsoft Security Advisory MS01-028 - Microsoft Word contains a vulnerability in RTF documents linked to templates which allows malicious users to run macros without the users knowledge or approval. The macro would be able to take any action that the user herself could take. This could include disabling the user's Word security settings so that subsequently-opened Word documents would no longer be checked for macros. Microsoft FAQ on this issue available here.

SHA-256 | 23d0500e57635f970a6cdb057331b5ed4edae2ecd473703ac2900e4611f3eeb0
RHSA-2001:069-02.man
Posted May 23, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:069-02 - The man package which is included with Red Hat 5.x, 6.x, and 7.0 contains a buffer overflow which allows local users to gain gid=man privileges.

tags | overflow, local
systems | linux, redhat
SHA-256 | b3528cab8e9854e0aea2f67b8bfbda58041f4184d82c1caf896cc0386f8802d6
RHSA-2001:063-02.gnupg
Posted May 23, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:063-02 - When modifying an unsuspecting user's private keyring, an attacker can cause a user to generate incorrect signatures for data. If a user generates both a correct and an incorrect signature for the same data, the different signatures can be used to compute the user's secret key. This is fixed in v1.0.5.

systems | linux, redhat
SHA-256 | f0495b4a79ee9ef8d5489f6b7cff1ee6128afd0bad6c90054acfcb63d3f51f65
RHSA-2001:060-04.kerberos5
Posted May 23, 2001
Site redhat.com

Red Hat Security Advisory RHSA-2001:060-04 - Updated Kerberos 5 packages are now available for Red Hat Linux 6.2, 7, and 7.1, due to the discovery of several buffer overflows.

tags | overflow
systems | linux, redhat
SHA-256 | a485986767aedff1e0389289f0c1cfd5aba7bde259b7928671e3053a2fa52f0b
LinkMax.txt
Posted May 23, 2001

The WebAvail LinkMax2 (ASP) allows website visitors to view the LinkMax2 admin login and password. Fix included.

tags | exploit, asp
SHA-256 | bc49f92d642851afebdaa716c8669034d092c6652034fd4a9c0ddaa830453e4f
FGC_tools_v1.zip
Posted May 23, 2001
Authored by Frost Byte

FGC_Tools exploits Fortress security by simply making calls to the DLL used by their program. Disables security or overwrites the password without prior knowledge of the current password. Includes TASM source.

SHA-256 | 69b6b254e5158ea06287477874dc92414293ce96c8c13eb98dcc2cb7925247ec
icmp-log-0.4.2.tar.gz
Posted May 23, 2001
Authored by Zucco | Site w3.swi.hu

Icmp-Log v0.4 is a simple ICMP logger.

Changes: GPL license, coding style changed, uses automake script from netscript 1.6.0 by v9.
tags | system logging
systems | unix
SHA-256 | 26034114f4f2e03badef9ea5d53b3fbb65e94c2cf0a0db00c5d7da43fa7045cb
freevsd-1.4.8-1.tar.gz
Posted May 23, 2001
Authored by Mark Sutton | Site freevsd.org

FreeVSD facilitates true Linux Virtual Servers within a 'chroot' environment, allowing Web servers and other applications to be deployed and administered discretely, without compromise to security. Each Virtual Server has its own IP address(es), Apache webserver, and view of the process table. FreeVSD expands the Linux system by creating a pseudo-'super user' (admin) for each Virtual Server. The admin user has the ability to create extra POP3/FTP and Telnet users and also administrate vital services such as the webserver.

Changes: Improved OpenSSL support, improved SSL certificate handling, PAM-based privileges, upgraded 'addon' packages, and added multiple skel support.
tags | web
systems | linux, unix
SHA-256 | 03d3bb19a8cc0553d34c00ccab0151b47ae1cc4f32e47c354adbf742bea1b200
Samhain File Integrity Checker
Posted May 23, 2001
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain (development branch) is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, tamper-resistant log file, and syslog) are available. Tested on Linux, AIX 4.1, HP-UX 10.20, Unixware 7.1.0, and Solaris 2.6. The devel version has more advanced features, but not all options are thoroughly tested yet.

Changes: Now detects Linux LKM rootkits. Problems with repetitive reports by the daemon have been fixed, the installation has been streamlined, init scripts for Linux (SuSE, Redhat, and Debian) have been added, and the docs have been revised.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 5d1dad7c0b0a2a4dd188767a5f3f037cf9749b1bb98b06900f7c8d21c445aba1
lids-1.0.8-2.4.4.tar.gz
Posted May 23, 2001
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off on the fly and you can hide sensitive processes and prevent anyone from using ptrace or any other capability on your system. LIDS can also provide raw device and I/O access protection. LIDS FAQ available here.

Changes: Updated for kernel v2.4.4. Most of the "-EROFS" have been changed to to "-EPERM" (the output of the violation would be "permission deny", not "Read only file system").
tags | kernel, root
systems | linux
SHA-256 | c55524357504029edc8df12d1f74d0fae50aa031bb0a75ab64e4e96ad05757ee
authforce-0.9.6.tar.gz
Posted May 23, 2001
Site kapheine.hypa.net

Authforce is an HTTP authentication brute forcer. Using various methods, it attempts brute force username and password pairs for a site. It has the ability to try common usernames and passwords, username derivations, and common username/password pairs. It is used both to test the security of your site and to highlight the insecurity of HTTP authentication due to the fact that users just don't pick good passwords.

Changes: Fixed a bug which caused it to crash on large datafiles.
tags | web, cracker
SHA-256 | 96b48c77c92a128f92d0a7016d8908de006ed99506c0e506524d4b59ca531c92
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close