tcpstat reports certain network interface statistics much like vmstat does for system statistics. It gets its information by either monitoring a specific interface, or by reading previously-saved tcpdump data from a file.
1ea53182cab13b540301f88d750a465f53b542f915f02bede7e12a9d968458a0
Linux kernel 2.2.x implementation of the CaRoGNa 2.0.x module Secret technique of the divine HOKUHACKO school [ Hokuto No Ken rules ;)] Sacred Strike of the Modular Renewal that bumps root down.
2bf133e86ea4fc0e68826e775d8668b2e43f6fcbf8405c0482cbca6bbceed460
Simple module to prevent lame people from using your box as a launch base for spoofed ip packets. Intercepts the socketcall() system call looking for the IP_HDRINCL parameter passed via setsockopt().
f2a3456b36ee72088bb3f22154d0d0757742823d0a1f5aa1bbe881390873b18e
Linux Loadable Kernel Module to keep an eye on the system, and add security 'on the fly' to a prexisting running box. Contains a simple implementation of BSD securelevels, while waiting for the official 'in-distro' arrival of Linux Capabilities [POSIX 1.e] in 2.4.x and strong ACLs.
acb13ad23d34d3ac027d69404c713c283d541fe9f98969f2779ff97bcff33812
Project aurora is lamagra's non-blind LAN spoofing project. It can be used to create TCP connections from a non-existing box or another box in the network. The biggest problem while spoofing was guessing the sequence numbers to acknowledge and that the other box always sends back a reset when it receives a SYN|ACK. This used to be solved by abusing small bugs in the tcpip stack.
3468997662e967b3bb4c11bacb27971f09a1cd20742f8a53d195e8f32028fcc6
fs-spider is a multi-threaded bad permissions finder (user defined). It
ea68f5abf6cbd21c366e7f35e65fb23ac152291db0553eeb4e10dfb206e2ff1a
This shellcode creates a connection to a host/port and starts a shell. This should be more anti-IDS then the others and it can go through a firewall.
d50e538d758dd930f5ec6b120b1229f2cdae67049c11ce1d22075a1a803c46f2
An overview and Analysis of the LOVE-LETTER-FOR-YOU virus/worm.
91e72ac403333b1d6fa854a57c316306f67a39f3f33d59b7d9fe29d968376dcd
Ascan v1.6 is a tiny port scanner written in perl.
6c5ec2677be4951efd97f769f24403c0b0fa3530fd11cbda9ef6e90904f70160
A screen shot from when apache.org was defaced with a Microsoft logo.
38f0cf3e545b9c2464873f3a18258c0b9275ff649438fc40fe2c60612ab725ef
myCIO.com is issuing an update to the Love Letter virus. Two new variants of the virus have been found.
73be9de186bc0eb00aa3d6c24ea39a891553a8135706bbc4f326a3079bb660de
myCIO.com is issuing a HIGH RISK OUTBREAK ALERT for this virus and is making available remediation tools at their website.
84fa732a01d6f1c13ddac3cf28f5126bc4ca97b8ab1d14b9e75eee114631fb9f
Divorce the Love Letter virus. Cleans the rubbish out that the Virus caused. Not elegant but does the job! Read then run the Run_Fix.bat. Use at your own risk.
f8b8322a8efd0771596276ebaf05a1e132dbf3f08833e9ffcc6dc278c4adc7ff
This exploit spawns an EGID mail shell on the default Slackware 4 install.
d1e67efe4126f2f7afd3ac7d85e4649457759a6fd8ea24490ca70370881514ab
CA-2000-04 - The "Love Letter" worm is a malicious VBScript program which spreads in a variety of ways. As of 2:00pm EDT(GMT-4) May 4, 2000 -- the CERT Coordination Center has received reports from more than 250 individual sites indicating more than 300,000 individual systems are affected.
eaa8b55e8f6adc9cf76c31e3a64b42a148c5e59896510ac22b2d81f85aedb93f
It is possible to cause a kernel panic on systems running NetBSD by sending a packet remotely with an unaligned IP Timestamp option.
b747da0110e154b2b2628b961c38ca2f85826139b358295e0e193ac45d7cae61
A dangerous Visual Basic Script (VBScript) virus, dubbed the LoveLetter or ILOVEYOU virus, has been spreading itself across the Internet through email via Microsoft Outlook and through Internet Relay Chat (IRC) using a popular IRC client named mIRC. The virus is susceptible to activation whenever the Windows Script Host features are enabled.
fba2c99bda6968dbb189d98fd36cb2615406aa0d8be416faaf4a6c7b36fb06cc
Very simple yet affective http daemon version reply. Makes a simple http connection to the host then head's the version and prints to stdn, simple no? Written by rossex.
0b73d12b01b62b751ef57a035c7e3daa5f085e44089b41fdf5a776994e9a54d7
Windows 2000 Magazine Security UPDATE, May 3, 2000 - Peek Under the Hood of Distributed Denial of Service Attack Software, Cassandra NNTPServer Subject to Denial of Service Attacks, Cart32 Software Contains Backdoor, News: New Distributed Denial of Service Software Discovered, News: More Derogatory Netscape References, HowTo: Advanced Security in Exchange 2000, Part 1, and more.
c56e05b025985897ac16ada81bfff5b5f3302bd044d64bd0f26a1a4939f5e4a6
STC 3.0 is a multipurpose tool for Windows, which does the work of 30 seperate programs. Includes a .htaccess Brute-Forcer, Anonymous FTP Scanner, List of Bios Master Passwords, tiny CD-Player *g*, CGI-Vulnerability Scanner, Country Codes List, Dictionairy Generator, DNS, DomainScannerr, File Compare (Patch Engine), FTP Brute-Force, Service Scanner, Cached ISP Passwords Retriever, Hex/bin/dex/ascii converter, HTML Grabber, IRC Channel Brute-Force, IRC_Flooder, Link-Looker, NetBios Password Cracker, Password Generator, Ping / Traceroute, Port2Service, Portflooder, Portscanner, PortCheck (checks for open Ports), Port Watcher, Screensaver Password Retriever, Anonmailer / Mailbomber, OOB Nuke, Telnet Brute-Force and Whois lookup.
b9f0c6897072c8793d04a9bf3f0836ee4b916a00f2aeb152ba45bb29fd8e5a26