Packet Storm Contest Entry - Distributed Attacks and the Way To Deal With Them. (Text Format)
10f94ff136a258319f2596a4abbb50bd63aafa790390f4c9ca45547be86c774d
Packet Storm Contest Entry - Strategies for Defeating Distributed Attacks. (Text Format)
7427476b12ea10eea15d1f28e11df64258077c0934a93532d27af5558cb06ff1
Packet Storm Contest Entry - What pure or applied technical measures can be taken to protect the Internet against future forms of attack? (Text Format)
cad93a87d641bb7572f4f98b4b119acd52892e3424d315d828101dbd55ca07cc
Packet Storm Contest Entry - Purgatory 101: Learning to cope with the SYNs of the Internet. (Text Format)
43284d288da9f2331d1bd5c0d9a900b6ffaf2f5af2659be61d5f41dde2c20fc5
Winning Packet Storm Contest Entry - Protecting Against the Unknown - A guide to improving network security to protect the Internet against future forms of security hazards. (Text Format)
15f4e5704be7d69962a1a4a2d64b19373699e3374703fdf9c33bd2868743dfde
Packet Storm Contest Entry - GNIDS - Early Detection of Unknown Threats. (Text Format)
c9ff2af6c6f75f172a7c93d0b12d052d47a42146f239fb064a9e2256292fab1e
Hhp-gdc_smash.c is a local root exploit for gdc. Requires group wheel access. Tested on BSDI 4.1 x86 default install.
59ac3f8c25947407d2c2124b1b923963380381d66406ef270bdd57b3c00baae5
Hhp-ospf_smash.c is a local root exploit for ospf_monitor. Tested on BSDI 4.1 x86 default install.
b3df13e1c7b793947794b12771072086104e86b8f0f39f8f17d3b3f017cad2b0
rts.c is reverse telnet shell code. Useful for systems behind firewalls which restrict incoming connections.
d33f2d3f19564249ea83b8f9b06cd293a3b5caf25938b63eade9e2e358c52b3b
Knetfilter is a KDE gui application designed to manage the netfilter functionalities that will come with the new kernel 2.4.x. In Principal, all standard firewall system administration activities can be done just using knetfilter. But there is not just a GUI to iptables command line, it is possible also some monitoring via a tcpdump interface.
d45c1868837c0a8b54b93fb48fecb1fa87a0dabfab30b8aa809c6bf97f836a07
Lcrzoex, created with the network library lcrzo, allows to test an Ethernet/IP network. For example, one can use it to sniff, spoof, create clients/servers, create decode and display packets, etc. The Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols are supported. Lcrzoex and lcrzo were successfully installed under Linux, FreeBSD and Solaris.
1344783a80db2a524169578784cd62e067d0a2c38f7763f281c8a49b76c894d4
ViperDB is a file checker. It is meant to be run from cron on a regular basis in order to monitor strange activity on a system. It supports checking of size, mtime, privileges, UID/GID, added/deleted files, and (as of 0.9.3) MD5 checksums. Data isn't stored in a single archive as in tripwire, but is split among all the monitored directories. This ViperDB is in fact a fork of the original, as the original authors seem unreachable.
9beeb32344be8185db433775f799de2b79b2dddd9a21ba40738b083810070ddc
Fping is a ping(1) like program which uses the Internet Control Message Protocol (ICMP) echo request to determine if a host is up. fping is different from ping in that you can specify any number of hosts on the command line, or specify a file containing the lists of hosts to ping. Instead of trying one host until it timeouts or replies, fping will send out a ping packet and move on to the next host in a round-robin fashion. If a host replies, it is noted and removed from the list of hosts to check. If a host does not respond within a certain time limit and/or retry limit it will be considered unreachable. Unlike ping, fping is meant to be used in scripts and its output is easy to parse.
9f98ea6510ddb44d45f8b135dd0a5285a05c946b2041e3c6fb85e8ff087a931a