The SPIRO-Linux EZ-Way Firewall allows you to setup and maintain a firewall easily, and without much strain on resources. It can be set up on a 486 with 8MB RAM, although a much more robust system is recommended for larger networks. This is meant to be a drop in replacement for the expensive and restrictive Firewall products available on the commercial market today.
8d6d1966bba150a3e05cf9d920d1e66b8925c4f538115995f91ff8983dc5898f
AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.
af2ff14b1282eb4eec684527efc80a5eed6d6aa593bc1deaf750c53c7e858ecf
Squidtaild is a Squid log file monitoring program that will crosscheck new access.log entries with user-defined filters and report all hits (using HTML pages, email, or winpopups). It is ideal for schools and businesses that wish to monitor their Internet activity for policy violations (that can be custom generated).
69ea94c4f4114ae4b6794ebd25342ec938a49dec6a24b2ba3d886d16b7ed466f
Psftp is an FTP client that uses ssh 1.x as its backend. Thus, all file transfers and communications using it are encyrpted and secure. It provides a command-line FTP interface on top of scp and ssh.
3119e5c2dbad3d22bc9bf19a9a2ac0cd79f382efe8bf4f597e7e344560a7c654
nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces and capabilities. Thus I incorporated virtually e very scanning technique I know into nmap.
f695161b7ac460fa16af3e2d2a8122155e8de4b0dc70f421d473dda550e86134
Aps is a small tool for analyzing network traffic. It prints out a great deal of information about the relevant protocols including TCP, UDP, and ICMP. It allows you to filter IP addresses, hardware addresses, ports, and specific protocols.
ca484204bc0d4fd84ac6bf60f06addabd8ea75f3f95464ab50cbb7ee99c40707
Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1. Windows 95 is confirmed vulnerable, possibly other platforms.
f32cc26c35f248387c89abcf98c9b455c102dc43abfc74dc606030682ad55800
A vulnerability in Netscape FastTrack 2.01a will allow any remote user to execute commands as the user running the httpd daemon (probably nobody). I've only tested the version of Netscape FastTrack that comes with SCO UnixWare 7.1, 2.01a. I'm not sure what other platforms, if any, are vulnerable. Unixware exploit included.
d75d7676e9ba884cae00eb12d442f7c46825fe70ae4746948d00b7756b541383
FileTraq is a shell script designed to be run periodically from the root crontab. Each time, it compares a list of system files with the copies that it keeps. Any changes are reported in diff or patchfile style, and dated backup copies are kept. It lets you keep an eye on intruders who might change system files, or other sysadmins who don't tell you about changes. It even helps you keep track of your own changes, along with dated backups.
6856dbdfc8208286cc43ff7ed8143c73d86748f7c47c64198df95e456d77758a
Paper detailing a successful attack against a NT server running the avirt mail service. In powerpoint, html, and text format.
05dd4f84800e47a958684354f2cdd13df2ce3b91bf48643d83f12d755dae7c78
Linux WU-IMAPD 4.1 remote root exploit.
e3a218fa16e6fb76980fa8726376f11d499254027a11f1359b7f1cbf6682251b
Microsoft Office Converter Module Overflow - Using a hexadecimal editor to insert specially-malformed information into a document, a malicious user could cause Word to run code of his or her choice when the document was opened using an affected version of the converter.
38680ce05f6c7c9ba1cb735183c3398d03f5bfb18e93dc6d8644303fe0d9615a
This program is a beefed up classic denial of service fork(). Tested on linux/sysv/bsd. Kills most boxes.
f78da6be7c31526b15fc3c5a990b184941051070650b25a4d1f52bf94063adea
A look at whisker's anti-IDS tactics. Anti-Intrusion Detection System (IDS) tactics were one of the original key features of my whisker web scanner. The goal of any anti-IDS tactic is to mutate a request so much that the ID systems will get confused, but the web server will still be able to understand it, hence the subtitle "just how bad can we ruin a good thing?".
f9e654a0fc127dcf27a1beb7e8a32d1157b5138bca0b71216771555c32113361