Security Hardening of Windows 2000 and NT Server Machines - Contains a roundup of good security practices, hardening, ways that windows-boxes are penetrated, and a roundup of some useful tools. Written in 2001.
e9aaaa0f410f24e9705089083e684c2cd647519dbc5bd929756fc5b6a20e511f
The Bea Weblogic server v5.1.x - 7.0 on on Windows 2000 and NT s vulnerable to a data/connection flooding vulnerability that will result in the web service crashing with a report of an error in NTDLL.DLL.
dd160476ade9f37a3ffeb6de0034fa4f92660fc33d0466f882498e45e0c25e92
Local buffer overflow exploit for KDE's artsd v2.x and 3.x.
c4ee9b2be56eb009a8530167e522b3e52eb220e1569d1a0b77a0f7358526114c
Knetfilter is a KDE gui application designed to manage the netfilter functionalities that will come with the new kernel 2.4.x. In Principal, all standard firewall system administration activities can be done just using knetfilter. But there is not just a GUI to iptables command line, it is possible also some monitoring via a tcpdump interface.
b223580a1a846b8ff2a7864e4dc43c5817b3916acb77f9f5b80a64286b19ccec
Motion uses a video4linux device for detecting movement. It makes snapshots of the movement which later will be converted to MPEG movies, making it useful as an observation or security system. It can send out email and SMS messages when detecting motion and includes a web interface.
e66517b4096938fc41e87ef4160b525f2bb08ba7db7590987df880d1481c3fdc
Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.
33af6d807eeaf4c0964d716cad49f30d00e8e5d85d8ba934522f8049e0cd42e9
X Net Strength is a small utility for monitoring the wireless signal strength of 802.11b cards under Linux. It is written in C and only requires xlib.
93121ff4c722db8739800a554b373ae991dfe5eca022c028f2b4ec4c16441051
GuardDog is a firewall configuration utility for KDE on Linux. GuardDog is aimed at two groups of users - novice to intermediate users who are not experts in TCP/IP networking and security, and those users who don't want the hassle of dealing with cryptic shell scripts and ipchains parameters. Features an easy to use goal oriented GUI and the ability to generate ipchains scripts as output. Screenshot here.
66b6bd5f11545111bd09aabb69389f0086fec4a6cfaf702ac3c29d5f3b589672
Driftnet is a program which sniffs network traffic and picks out images from TCP streams it observes. It is interesting to run it on a host which sees a lot of web traffic.
dbdf7ead3ae14b109f88c86dedeb7524be8c257aa773a781891216f013373d6d
Information on cracking the Microsoft SQL pwdencrypt() hash function which is used to generate SQL hashes.
5c2b4319be1979dcbd27e7fd3420df3b66d393c7fcb09d4c8682d6c6694cd701
Watchguard Firebox Dynamic VPN Configuration Protocol Denial of Service - Malicious users can crash the Dynamic VPN Configuration Protocol service (DVCP) by sending a malformed packet to the listener service on TCP port 4110. Watchguard Firebox firmware v5.x.x is vulnerable.
f7fefdb893755ef161385dc353bea35abe34c677710fe9ef1b8f81eb0e3212b7
The Sun iPlanet Web Server iWS 4.1 and 6.0 contains a remotely exploitable buffer overflow if the search feature is enabled.
569fc6dbae95b454b1cb7139d2f9325513c3521f10923c0642d0afb59f288e67