LinkFerret is a monitoring tool that provides all of the major functionality required in a wireless monitor. This includes packet capture and decoding, channel scanning, AP detection, and WEP decryption. Note: This is a 30 day evaluation copy.
f79f1036cd3c811dad124312ac5a818a359f68bee38a48197ff60983f7372923
Security Corporation Security Advisory [SCSA-008]: PY-Livredor, an easy to use guestboot script using PHP4 and MySQL, has a Cross-Site Scripting vulnerability which allows attackers to inject script codes into the guestbook and use them on clients browser as if they were provided by the website.
8e452a589bcc5d7f1921b78aac7837a947c605a6c2a5dd92adfcfa8b5afe4b97
CGI exploit generator that enables an engineer to test standard known CGI exploits with a utility that is customizable which will print to STDOUT and without the need for a browser.
3eb298af0962a1ec44d0eb30d644bfef3f2f5da8fd6b0504d9d074903fab561d
LHTTPd 0.1 remote buffer overflow exploit for the Win32 platform. This exploits a buffer overflow in GET request handling of HTTPd 0.1 for Microsoft Windows and binds a shell to the desired port.
e3b0756feee4859c9ccd059b46aea7ceda8413cd43a9835c285f5ca13378fb75
CERT Advisory CA-2003-07 - Sendmail prior to 8.12.8 has a remote root vulnerability which can be exploited by a malicious mail message, allowing non-vulnerable MTA's to relay the exploit message to unpatched MTA's on an internal network. A successful attack against an unpatched sendmail system will not leave any messages in the logs. All Sendmail Pro, Sendmail Switch, and Sendmail for NT are also vulnerable. Fix available here.
e30f99a4f1539fc802ae45ac228a34841e7a4bb0387c42032299a105f9418235
Sendmail is a very popular unix Mail Transfer Agent, a program that moves mail from one machine to another.
aab119c0ebc40579d4529402b6281c1473cdc5c2a94f52a1f2c984d22e1db0d2
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.
266b623ca81c4075039f1d2bc8e0ec7b777378ddccdf4dabf93f313693ec5985