SnowDisk takes an input file, then uses GPG and the random device to write the file in encrypted form to a unix device (a floppy for example), followed by random data from /dev/urandom. The result is a floppy filled with apparently random data, with no partition information that can leak the size or structure of the encrypted information.
7926c086bb0894d99ae7343d55b7d56665cb59c8f73d51c7829a831ce394ce54
HiSecure provides secure encrypted communication betwenn hosts over an insecure network. You can redirect any TCP/IP ports over this secure encrypted channel. It works with Citrix and SAP R/3, and only the powerful web SSL-proxy is included. Solaris and NT versions available on the homepage, here.
b628069f4705c76db0a6bf4308de62e0a60c087bd5caf29b85d2b731d34defa9
Recycle-logs is a logfile manager written in Perl that attempts to overcome the limitations of other system log utilities. File rotation and other customization is based on control information specified in one or several configuration files.
cd94875514ca874dd5eb2b0842385cf91e4f2fccbe1f0b7ffeac263070fe39be
This document is a technical analysis of the Tribe Flood Network 2000 (TFN2K) distributed denial-of-service (DDoS) attack tool, the successor to the original TFN Trojan by Mixter.
cfd9ab39b27fdf49f0cb4d3d8c500997b796dad7ca44d25f3176e7b85dabcb83
Backdoored Sendmail 8.9.3 - Enter a special SMTP command and it opens a root shell.
89cbf9568042d8e2c5da41f5baf9aef42ed00a1209495954e4de99ccad6eff5c
Sendmail bruteforcer to look for valid accounts. Uses the RCPT command.
15f70acbf9f93a3e8b2d5dd1526e48ec7ac1f5f62831204e0b5400972bc42b46
Windows Security Digest update - Four new risks were discovered: A DoS condition within BTT Software's SNMP Trap Watcher, two DoS conditions within True North Software's Internet Anywhere mail server, a means to open unauthorized TCP ports on Checkpoint's Firewall-1, and a means to bypass complete password authentication on MySQL.
bcb4143ae284ce2188d3038dd05e44ef427558d1f9c0b020e168c5c0e4d5e49a
Proftpd (<= pre6) linux ppc remote exploit.
6794b66bd9b67beb831092c9ee6bb6d6a88f66d33536244eea1007cad32cadba
proftpd exploit for 1.2.0pre3 linux x86
6edee0d79957dc29f1b881883812df5000054566a9ed218b5d2bd52d14c2619a
Patch for linux kernel 2.2.14 to discard packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets.
9c0ecff20731cb815594f081b4d9b1b3f9c2d6985a5315b1fa95aec2c1ae3fcf
pcfs.c is a tool that creates a fake CFS (cryptographic file system) encrypted directory tree, which is reasonable indistinguishable from a real CFS directory. It proves that just having a CFS styled directory doesn't prove it actually contains real encrypted data.
cb278ff823f8b81b672492dcb35960e85ed6420efa14288465dab6f4d48d20ae
Mixters guide to defending against DDOS - 10 Proposed 'first-aid' security measures which should be implemented by anyone at risk.
a45bc9efc6b77fa911f41e367dd8ef7a0a6a867f5d47435a7fe799d7074c2ae5
Zombie Zapper v1.0 Windows NT Source Code - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.
64ecfba45eafc81f39e5ef7e52af912125ececd41f48648ccb5b2eaf216a790f
This paper describes a technique for tracing anonymous attacks in the Internet back to their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed", source addresses. In this paper we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by an attacker without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed "post-mortem" -- after an attack has completed. We present one implementation of this technology that is incrementally deployable, (mostly) backwards compatible and can be efficiently implemented using conventional technology. In pdf and postscript format.
bb7e781a8fbc104cfd9119ecf7c8caf54c5aab786c654c2d11dd9b87b1c48922
Many sendmail daemons can be abused to get information about what accounts exist. By following basic RFC standart procedues - without VRFY and EXPN - we can still list the valid users using by another command as suggested in [RFC821]. Includes demonstration code smtp-cracker.c.
00c30ede0fb5ebfcf638254f37ed014b5e677f6f2b1df90bcc7baae443b0559e
cloak users utmp host entry
c0c9242b12e010e91bd24cd3baa34312c62ad75a6009c50c5b81b94971b8d773
very fast, clean and mean, but functional banner scanner, with part of the functionality of netcat :-)
8140faf86d4dda36aae57f79ae2a8d27be823118b76e22cf890009a8f15509cc
DoS ascend router with simple udp echo<->echo link
3e610f9dc41e66bc8418d2222d57f4c973771ed8591575ffdb3a1eb229546188
send arp packets useful for man-in-the-middle
2bcbf6fa27b752ae133601c819f5888407f0eb48006a7b7019b0fb3f0d7d7e7c
Delegate 5.9.x - 6.0.x remote exploit for Linux compilations
3ac439d6fef1daef6b26daf2115caeb6dfcdd0765feefc3734a19a6d5e9886a5
linux tty hijacker
1a7d638efbe39f49605381b9cc11b12ec8770a89dae4e2f9abcf4464e3dcc29b
wuftpd 2.5.0 heap-based exploit
c66bbfb8e83b185de65b90f0fbc1f1d1fc5a4716ed694916c9175686d5a745e2
lame libtermcap sploit
f015cdddacdb0e66de98f7c3c9494337480346b8db1aff3ac5d3b0ebd0a737f4