Archives Services Contact Us Search


See our backend page for how you can include this list, sidebars etc. on your site!

DoS-Linux.tar.gzTue Jan 4 00:50:23 2000
Remote denial of service attack against linux kernel 2.2.7 - 2.2.9, in perl. By misteri0
syslog-ng-1.3.11.tar.gzTue Jan 4 00:50:16 2000
syslog-ng as the name shows is a syslogd replacement, but with new functionality for the new generation. The original syslogd allows messages only to be sorted based on priority/facility pair, syslog-ng adds the possibility to filter based on message contents using regular expressions. The new configuration scheme is intuitive and powerful. Changes: Some HP-UX and tcp related bug fixes. Homepage here. By Balazs Scheidler
imp-range.cTue Jan 4 00:50:09 2000
Tool for scanning networks which generates an list of IP addresses between a starting and ending ip. By Shake
cgichk1_36.cTue Jan 4 00:50:02 2000
Y2k fix for cgicgk-1_35, which would return false positives on any server with a date of 2000. By su1d sh3ll of UnlG
winfingerprint-222.zipTue Jan 4 00:50:01 2000
Winfingerprint 222: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQLSERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, E numerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes. Changes: -m (mass scan) now outputs in framed HTML. This makes the output from large network scans useable for the first time. Homepage here. By Vacuum.
filetraq-0.2.tgzTue Jan 4 00:50:01 2000
FileTraq is a shell script designed to be run periodically from the root crontab. Each time, it compares a list of system files with the copies that it keeps. Any changes are reported in diff or patchfile style, and dated backup copies are kept. It lets you keep an eye on intruders who might change system files, or other sysadmins who don't tell you about changes. It even helps you keep track of your own changes, along with dated backups. Changes: Comment lines are now permitted in the config file, wildcard matches are now possible, and entire directories can be checked. Homepage here. By Jeremy Weatherford
iMailv5.txtTue Jan 4 00:49:22 2000
On iMail Server 5.0 for Windows NT 4.0 SP 6a, a malicous user can read and send emails as any other user on the system. The issue lies in how iMail handles the creating of new email accounts, and how it stores them. Exploit instructions included. By Simon
suse.majordomo.txtTue Jan 4 00:49:15 2000
The mailinglist software "majordomo" was found having several local vulnerabilties. However, the licence of the program prohibites us providing a fix. You should either remove majordomo or trust your local users until an official fix from greatcircles is available. SuSE security website here.
localscan.tar.gzTue Jan 4 00:49:07 2000
Localscan is a Perl-based frontend for nmap. It allows the user to compare the results of an nmap portscan with the results of a previous nmap portscan made when the subnet or IP range being scanned was in a "known-good" configuration. Essentially, localscan allows the user to use a portscanner and ask "What new ports are open?" instead of just asking "What ports are active?" Homepage here. By Dylan Greene
SuSEcompartment-0.5.tar.gzTue Jan 4 00:49:07 2000
SuSE Compartment is a program to build secure compartments for running untrsted/insecure programs, and has got the usual uid/gid setting and chrooting abilitity, but the nice thing is the easy access to linux per process capabilities. Homepage here. By Marc
find_ddosV2.tar.ZTue Jan 4 00:48:52 2000
Find_ddos Version 2 - In response to a number of recent distributed denial-of-service (DDOS) attacks that have been reported, the NPIC has developed a tool to assist in combating this threat. The tool (called "find_ddos") is intended to scan a local system that is either known or suspected to contain a DDOS program. It is capable of scanning executing processes on Solaris 2.6 or later, and of scanning local files on a Solaris 2.x (or later) system. The tool will detect several known denial-of-service attack tools, including the trinoo daemon, trinoo master, enhanced tfn daemon, tfn daemon, tfn client, tfn2k daemon, tfn2k client, and the tfn-rush client. Changes: Detects TFN2k. Homepage here.
sos.tgzTue Jan 4 00:48:51 2000
Socks Scan V 2.0 - Scan a host for SOCKS servers. Includes the SOCKS perl module. By Icehouse
elza-1.4.3.zipTue Jan 4 00:48:35 2000
The ELZA is a scripting language aimed at automating requests on web pages. Scripts written in ELZA are capable of mimicring browser behavoir almost perfectly, making it extremely difficult for remote servers to distinguish their activity from the activity generated by ordinary users and browsers. This gives those scripts the opportunity to act upon servers that will not respond to requests generated using netcat, rebol, telnet or similar tool. As a result, one can hijack heavily protected HTML forms, perform dictionary attacks on login forms, and do sophisticated CGI scanning. Homepage here. By Phillip Stoev
TFN_toolkit.htmTue Jan 4 00:33:02 2000
Analysis of TFN-Style Toolkit v 1.1 - One of our systems was compromised and prompt action by the local sysadmin prevented the hackers from running their cleanup scripts. Consequently, we were able to get the toolkit that they were using against us. This toolkit contains components that are similar to what is in the TFN toolkit. Homepage here. By Randy Marchany
stacheldraht.analysisTue Jan 4 00:25:38 2000
The following is an analysis of "stacheldraht", a distributed denial of service attack tool, based on source code from the "Tribe Flood Network" distributed denial of service attack tool. Stacheldraht (German for "barbed wire") combines features of the "trinoo" distributed denial of service tool, with those of the original TFN, and adds encryption of communication between the attacker and stacheldraht masters and automated update of the agents. Homepage here. By David Dittrich
CA-2000-01.distributedTue Jan 4 00:19:35 2000
CERT Advisory CA-2000-01 - Denial-of-Service Developments. A distributed denial-of-service tool called "Stacheldraht" has been discovered on multiple compromised hosts at several organizations. X-Force released a paper on trin00 and TFN. CERT DoS homepage here.
ezwfw.isoSun Jan 2 11:33:53 2000
The SPIRO-Linux EZ-Way Firewall allows you to setup and maintain a firewall easily, and without much strain on resources. It can be set up on a 486 with 8MB RAM, although a much more robust system is recommended for larger networks. This is meant to be a drop in replacement for the expensive and restrictive Firewall products available on the commercial market today. Homepage here. By Rick Collette
aide-0.5.tar.gzSun Jan 2 11:27:58 2000
AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determening which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with. Changes: MD5 sums are now correct. Users must update their databases; they have false sums. With hash library support, you can have many more hash algorithms, and many bugfixes have been made. Note that the author's PGP keys have changed. Homepage here. By Rami Lehti
squidtaild.2.1a2.tgzSun Jan 2 11:20:56 2000
Squidtaild is a Squid log file monitoring program that will crosscheck new access.log entries with user-defined filters and report all hits (using HTML pages, email, or winpopups). It is ideal for schools and businesses that wish to monitor their Internet activity for policy violations (that can be custom generated). Changes: This complete Perl rewrite of Trailer is faster, more flexible, and offers more options. Homepage here. By Stefan Folkerts
psftp-0.15.full.tar.gzSun Jan 2 11:14:46 2000
Psftp is an FTP client that uses ssh 1.x as its backend. Thus, all file transfers and communications using it are encyrpted and secure. It provides a command-line FTP interface on top of scp and ssh. Changes: The ssh interface code has been rewritten (this should speed things up tremendously), auto-detection of the authentication method has been improved, history is now saved, remote file completion has been added, and some misc. bugs have been fixed. Homepage here. By Nadeem Riaz
nmap-2.3BETA12.tgzSun Jan 2 11:07:26 2000
nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces and capabilities. Thus I incorporated virtually e very scanning technique I know into nmap. Changes: Interactive mode which allows you easily launch multiple scans (either synchronously or in the background), random scanning order (to evade IDS), a option to scan random IPs, and rpm fixes. RPM available here. Homepage here. By Fyodor
aps-0.12.tar.gzSun Jan 2 11:07:17 2000
Aps is a small tool for analyzing network traffic. It prints out a great deal of information about the relevant protocols including TCP, UDP, and ICMP. It allows you to filter IP addresses, hardware addresses, ports, and specific protocols. Changes: now able to filter a port-range and able to print packet statistics at termination. Homepage here. By Christian Schulte
analogx.www.txtSun Jan 2 11:07:10 2000
Local / Remote GET Buffer Overflow Vulnerability in AnalogX SimpleServer:WWW HTTP Server v1.1. Windows 95 is confirmed vulnerable, possibly other platforms. By Underground Security Systems Research
fastrack.remote.txtSun Jan 2 11:07:04 2000
A vulnerability in Netscape FastTrack 2.01a will allow any remote user to execute commands as the user running the httpd daemon (probably nobody). I've only tested the version of Netscape FastTrack that comes with SCO UnixWare 7.1, 2.01a. I'm not sure what other platforms, if any, are vulnerable. Unixware exploit included. By Brock Tellier
filetraq-0.1.tgzSun Jan 2 11:06:59 2000
FileTraq is a shell script designed to be run periodically from the root crontab. Each time, it compares a list of system files with the copies that it keeps. Any changes are reported in diff or patchfile style, and dated backup copies are kept. It lets you keep an eye on intruders who might change system files, or other sysadmins who don't tell you about changes. It even helps you keep track of your own changes, along with dated backups. Homepage here. By Jeremy Weatherford
ntattack.zipSun Jan 2 11:06:51 2000
Paper detailing a successful attack against a NT server running the avirt mail service. In powerpoint, html, and text format. Homepage here. By JD Glaser
1999-exploits.tgzThu Dec 30 22:22:46 1999
All the exploits for 1999!
9912-exploits.tgzThu Dec 30 22:19:41 1999
Exploits for December, 1999.
ntop-1.2a10.tar.gzThu Dec 30 22:09:32 1999
ntop is a tool that shows the network usage, similar to what the popular Unix command top does. ntop can be used in both interactive or web mode. In the first case, ntop displays the network status on the user's terminal whereas in web mode a web browser (e.g. netscape) can attach to ntop (that acts as a web server) and get a dump of the network status. In the latter case, ntop can be seen as a simple RMON-like agent with an embedded web interface. Changes: A fix for a buffer overflow caused by long URL requests, and many new enhancements. Homepage here. By Luca Deri
linux-2.3.35.tar.gzThu Dec 30 22:07:06 1999
Linux kernel version 2.3.35 (developmental). www.kernel.org
Sportal-2.2b.tar.gzThu Dec 30 21:58:25 1999
Sportal is made for people that need to know what is going on in their systems. It monitors files that you select, for "hot words" that you also select, through a graphical interface. When a hot word is found in the file being watched, it will let you know. There is no restriction on the numbers of files or hot words. Changes: A lot of bug fixes, a new pallete of colors, faster text scroll, and finished transparent background support. Homepage here. By Rodrigo Alvaro Diaz Leven
psftp-0.10.full.tar.gzThu Dec 30 21:53:21 1999
Psftp is an FTP client that uses ssh 1.x as its backend. It provides a command-line FTP interface on top of scp and ssh. Homepage here. By Nadeem Riaz
init.tar.gzThu Dec 30 21:49:06 1999
initscripts-4.48-1 on RedHat Linux is vulnerable to a race condition. Contains the l0pht advisory on the subject and exploit. By Mudge
savant.dos.txtThu Dec 30 21:18:08 1999
The Savant Web Server V2.0 Win9X / NT / 2K and possibly other versions has a buffer overflow caused by a NULL Character in the parsing Get Command routine. By Underground Security Systems Research
vnsl.tgzThu Dec 30 20:49:40 1999
vnsl (vENOMOUS Scripting Language version 0.1b) can be used to script connections to daemons and backdoors. By Venomous
majordomo.local.txtThu Dec 30 20:41:01 1999
A vulnerability in majordomo allows local users to gain elevated privileges. By Brock Tellier
CA-99-17.dosThu Dec 30 20:34:32 1999
CERT Advisory CA-99-17 - Denial-of-Service Tools. Recently, new techniques for executing denial-of-service attacks have been made public. MacOS 9 can be abused by an intruder to generate a large volume of traffic directed at a victim in response to a small amount of traffic produced by an intruder. This allows an intruder to use MacOS 9 as a "traffic amplifier," and flood victims with traffic. A tool similar to Tribe FloodNet (TFN), called Tribe FloodNet 2K (TFN2K) was released.
vxe1.tgzThu Dec 30 20:25:17 1999
VXE - Virtual eXecuting Environment protects Unix daemons from compromise in a manner similar to chroot. A main problem with UNIX security is that superuser can do with system anything he wants. There are programs (daemons) which work with superuser privilegies, for example popd, sendmail, and accessible from network (Internet/Intranet). There could be bugs in any program, so intruder connects to such programs via network, exploit existing bugs in it and get a control over all of the host. VXE (Virtual eXecuting Environment) protects UNIX servers from such intruders, hacker attacks from network and so on. It protects software subsystems, such as: SMTP, POP, HTTP and any other subsystem, already installed on the server. Free for non-commercial use. Homepage here.
wmmon.freebsd.txtThu Dec 30 20:15:18 1999
Wmmon is a popular program for monitoring CPU load and other system utilization. It runs as a dockapp under WindowMaker. The FreeBSD version of this program has a feature that can be trivially exploited to gain group kmem in recent installs, or user root in really old installs. This affects the FreeBSD version because under FreeBSD the program must be installed setgid kmem or setuid root in order to access system load information through the memory devices. The Linux version should not be vulnerable because it reads information through procfs which requires no special privileges. By Steve Reid
csm.dos.txtThu Dec 30 19:48:41 1999
Local / Remote D.o.S Attack in CSM Mail Server for Windows 95/NT v.2000.08.A and other older versions. Possibly exploitable. By Underground Security Systems Research
inet-4.zipThu Dec 30 19:18:26 1999
InET Magazine #4 has been realeased with articles about the SS7 Telephony Protocol, IPv6 crypto and security,
nt.security.update.122999.txtThu Dec 30 19:03:39 1999
Windows NT Security Update - Reflections from 1999 and into 2000, Savant Web Server Denial of Service, Avirt Rover Buffer Overflow, Netscape Navigator 4.5 Runs Arbitrary Code, Live Webcast, How Secure is Your Exchange Server? Update, and Using Windows 2000's Run As Command. NTsecurity homepage here.
sms.192.cdeThu Dec 30 18:57:31 1999
Sun Microsystems Security Bulletin #192 - Vulnerabilities in CDE and openwindows. Vulnerable versions include SunOS 5.7, 5.7_x86, 5.6, 5.6_x86, 5.5.1, 5.5, 5.4, 5.3, 4.1.4, and 4.1.3_U1. Vulnerable programs include the ToolTalk messaging utility, ttsession, CDE dtspcd, CDE dtaction, and the CDE ToolTalk shared library.
sms.191.sadmindThu Dec 30 18:51:10 1999
Sun Security Bulletin #191 - The sadmind program is installed by default on SunOS 5.7, 5.6, 5.5.1, and 5.5. In SunOS 5.4 and 5.3. A buffer overflow vulnerability has been discovered in sadmind which is exploited by a remote attacker to execute arbitrary instructions and gain root access.
trinokiller.cThu Dec 30 18:37:23 1999
This program remotely kills trino nodes on version 1.07b2+f3 and below. Homepage here.
VisualLast128reg.exeThu Dec 30 18:31:40 1999
VisualLast is a powerful NT audit tool which is being given out for free to help y2k efforts. VisualLast is an automated audit tool that scans/filters/sorts NT security logs for the purpose of identifying unauthorized network accesses. VisualLast can scan an unlimited amount of network hosts and create a consolidated view of the network activity. This version of VisualLast will not expire, nor is it limited. However, it does not contain the advanced features of version 2.0 about to be released. Homepage here. By JD Glaser
ethereal-0.8.0.tar.gzThu Dec 30 18:21:37 1999
Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Changes: New features include loadable module support for decoders, many logfile formats, A command-line utility called "editcap" allows you to trim capture files and convert to different file formats, added configureability. Added the following protocols - TNS, ISIS, Gryphon, AppleTalk's NBP and RTMP, IRC. Updated the following protocols - NFS, RCP, GRE, BGP, SNMP, SMB, NetBIOS, IPX, ICQ, RADIUS, VLAN, TACACS+/XTACACS, LLC/SNAP, NTP, ISAKMP, HTTP. Homepage here. By Gerald Combs.
zodiac-0.4.6.tar.gzThu Dec 30 18:15:09 1999
Zodiac is a portable, extensible and multithreaded DNS tool. It is meant to be used as a DNS packet monitor and DNS protocol test and debuging tool. It's basic features are: sniffing of DNS datagrams on an ethernet device, decoding of all types of DNS packets, including safe decompression (partly finished, SOA record are, for example, not decoded yet), nice display and gui, if you like ncurses and text based frontends, always interactive in all situations through built in command line, threaded and flexible design. Advanced features include: local DNS spoof handler, jizz DNS spoof, exploiting a weakness in old bind implementations, determines jizz-weakness, id-prediction and resolver type remotely, id spoofing, exploiting a weakness in the dns protocol itself, implements some advanced DNS denial of service attacks, including flood, label compression and unres attack, advanced DNS smurf. Homepage here. By Scut of Team Teso
grabbb-0.1.0.tar.gzThu Dec 30 18:12:34 1999
Clean, functional, and fast banner scanner. Changes: Code fixes, portability fixes. Should run really well now. By Scut of Team Teso
ascend-foo.cThu Dec 30 18:09:28 1999
ascend foo denial of service exploit - basically just another lame echo/echo link, but has nice results on ascend, the router needs to be rebooted. By Scut of Team Teso
arptool-0.0.1.tar.gzThu Dec 30 17:59:20 1999
Arptool can send simple arp packets, in this case just who-has and arp-reply packets. this can be used together in a script to set up man-in-the-middle arp-relaying or as denial of service attack. you can also reroute lan traffic which would otherwise not be visible, to sniff and play dirty tricks on your machine. By Scut of Team Teso
e4d.tgzThu Dec 30 17:44:59 1999
Echelon for Dummies is a distributed sniffer which tries to show how the "echelon" network could be designed. It uses sniffer servers that can be installed and run on remote hosts, and will dig through local network traffic, useing custom pattern/keyword matching to find packets with interesting content, which are then forwarded to a central loghost on which the logging daemon is run that gathers and logs the data. For stealth purposes, Sniffers and the logger communicate via random protocols and encryption, and are compatible to many Unix systems and NT. Homepage here. By Mixter
camshot.overflow.txtThu Dec 30 17:28:28 1999
CamShot is a Windows 95/98/NT web server that serves up web pages containing time stamped images captured from a video camera. The images can be viewed from anywhere on the network with a web browser. UssrLabs found a Local / Remote Buffer overflow, The code that handles GET commands has an unchecked buffer that will allow arbitrary code to be executed if it is overflowed. By Underground Security Systems Research
ms99-061.info.txtThu Dec 30 15:01:23 1999
More information on the vulnerability described in ms99-061, a problem in IIS that causes it to parse invalid escape sequences, allowing a carefully made string to bypass IDS systems, ISAPI filters, and extension handlers. Includes a perl script to test for vulnerability. By Rain Forrest Puppy
unixware.rtpm.txtThu Dec 30 14:49:21 1999
Unixware 7 Vulnerability - Any local users can exploit a bug in rtpm to gain "sys" privileges.
rexFBD-0.3.tar.gzTue Dec 28 00:54:55 1999
Fork Bomb Defuser is an easily loadable kernel module for Linux which detects, logs, and disables "fork bombs". It allows you to configure max_forks_per_second and max_tasks_per_user parameters at module load time. Any possible fork bomb that attempts to spawn a huge number of processes simultaneously is detected in real time, and the fork bomb is disabled. Changes: A major bug which was causing the module to malfunction has been removed. Rather than being rescheduled, the offending processes are killed whenever the MAX_FORKS_PER_SECOND or MAX_TASKS_PER_USER parameters are exceeded. This change will solve the problem in the previous version. Homepage here. By Rohit Singh
sftp-0.5.tar.gzTue Dec 28 00:50:08 1999
Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process. Changes: New aliases (dir, mget, mput), open flags which now work with multiple opens, a -p option to pass the port to ssh, and a fix so that transferring filenames with spaces should work now. Homepage here. By Brian Wellington
p3-sunos.tar.gzTue Dec 28 00:44:06 1999
Secure Sunos shell script. Disables a few commonly exploited holes. By Phrozen3
roverpop3.dos.txtTue Dec 28 00:28:20 1999
Local / Remote Remote DoS Attack in Rover POP3 Server V1.1 NT From aVirt. Source / Binary for exploit here. By Underground Security Systems Research
VeteScan-12-26-99.tar.gzTue Dec 28 00:28:20 1999
VeteScan is a bulk vunerability scanner containing programs to scan Windows NT and UNIX systems for the latest trojans/remote exploits, a scanner for the vulnerabilities of single hosts (with or without host checking), a tool for scanning multiple hosts, a scanner for class A/B/C networks, and fixes for various vulnerablities. Changes: Fixes for a few errors, scans for glFtpD, LinuxConf, and ssh, a new admbind exploit and patch, and new scans for amd z0ne, cmsd z0ne, mountd z0ne, and sadmin z0ne. Homepage here. By Vetesgirl
unixware.netstation.txtTue Dec 28 00:28:20 1999
A vulnerability in IBM's Network Station Manager will allow any local user to gain root privileges. By Brock Tellier
fk8.addition.txtTue Dec 28 00:28:20 1999
Every single file available on buffer overflow mentions that strcpy(), etc, but for some reason no one has noticed that 'cin >>' is also a problem. cin is an extremely commonly used function in C++ code, and it ought to be more widely known that the favoured use of it is insecure. Ditto for improper use of an ifstream. By Wyzewun
vetestcl-12-26-99.tar.gzTue Dec 28 00:28:20 1999
The Vetestcl package contains various TCL scripts with the same functionality found in the VeteScan package. You can load the scripts within an Eggdrop bot to make sure none of your channel operators or hosts running IRC bots suffers from security vulnerabilities present in the operating system or user space applications. Changes: Bugfixes, a modified nmap.tcl, new binds (!rpc !bind) for rpc.tlc and bind.tcl, faster scanning, and more accuracy. Homepage here. By Vetesgirl
nadasTue Dec 28 00:28:20 1999
The Real Log Clean for Linux OS - Cleans logs under linux and tests the attributes in Ext2fs. By Nelson Brito
aps-0.10.tar.gzTue Dec 28 00:28:20 1999
Aps is a small tool for analyzing network traffic. It prints out a great deal of information about the relevant protocols including TCP, UDP, and ICMP. It allows you to filter IP addresses, hardware addresses, ports, and specific protocols. Changes: Fixes for a filtering bug for hardware layer and a bug in parameter-parsing, and new port-filtering. Homepage here. By Christian Schulte
saint-1.4.1.tar.gzTue Dec 28 00:28:20 1999
SAINT (based upon SATAN) is a free network security scanner which runs on UNIX platforms. This release includes all of the new checks found in SAINT 1.4.1 beta 1, with additional checks for sadmind, Trinoo, DRAT backdoor, SSH, and QPOP vulnerabilities. This release also fixes a number of bugs that were present in earlier versions. Homepage here. By Sam Kline
nsat-1.11.tgzTue Dec 28 00:28:20 1999
Nsat is a fast bulk security scanner designed for long-range scans written in C++ which scans and audits about 60 different services and 170 cgis with different scan intensity. Updates in this version include detection of sendmail 8.9 remote exploitability, more CGI scripts that can be used in MDAC IIS attack, improved rpc service and -backdoor scanning, all latest solaris RPC vulnerabilities added, and detection of trinoo distributed DoS masters with default ports. By Mixter
fk8.zipTue Dec 28 00:28:20 1999
Forbidden Knowledge issue 8 - Interesting Wardialling Results, HTTP Basic Authentication explained, Dialout/PPP on Shiva LANRovers, PHEAR Advisory Re: Divine forces, Buffer Overflow Explained, Introduction to Assembly Programming, and Fun with "Trojan" Wingates. By Wyzewun
unixware.pis.txtTue Dec 28 00:28:20 1999
A vulnerability in "/usr/local/bin/pis" on SCO UnixWare will allow any user to create arbitrary files with group "sys" privileges. A full root compromise is then trivial. By Brock Tellier
redir-2.2.1.tar.gzSun Dec 26 12:58:54 1999
Redir is a port redirector. Its functionality basically consists of the ability to listen for TCP connections on a given port, and, when it recieves a connection, to then connect to a given destination address/port, and pass data between them. It finds most of its applications in traversing firewalls, but, of course, there are other uses. It can run under inetd or stand alone (in which case it handles multiple connections). It is 8 bit clean, not limited to line mode, is small and light. Changes: A bugfix has been made for the mysteriously dying redir processes, and a patch has been added to enable traffic shaping functionality. Homepage here. By Sam Creasey
phpfwgen-0.4.tar.gzFri Dec 24 05:52:51 1999
The PHP firewall generator is a simple PHP script that generates a firewall script for ipchains-based firewalls. The aim is to support an easily configurable rule set similar to those supported by commercial firewall systems. Changes: Fixes for some unusual network configurations, various installation tidy-ups and cosmetic changes, and there is now an on-line demo as well as an RPM. Homepage here. By Del
lcap-0.0.3.tar.bz2Fri Dec 24 05:50:11 1999
LCAP allows a system administrator to remove specific capabilities from the kernel in order to make the system more secure. LCAP modifies the value in the sysctl file /proc/sys/kernel/cap-bound. "Capabilities" are a form of kernel-based access control. Linux kernel versions 2.2.11 and greater include the idea of a "capability bounding set," a list of capabilities that can be held by any process on the system. If a capability is removed from the bounding set, the capability may not be used by any process on the system (even processes owned by root). Changes: A fix for a bug with the -z option. Homepage here. By spoon
nessus-0.99.2.tar.gzFri Dec 24 05:45:39 1999
Nessus is a free, open-sourced and up-to-date remote security scanner for Linux, BSD, Solaris and some other systems. It is multithreaded, plugin-based, has a nice GTK interface and currently performs over 270 remote security checks. Changes: Fixed a problem in the cipher layer which would prevent nessusd from testing big networks, memory consumption reduced by 50%, Nmap can be used as a plugin configuration files in ${prefix}/etc/nessus, and of course, all the newest security checks. By The Nessus Project
winfingerprint-221.zipFri Dec 24 05:36:16 1999
Winfingerprint 22: Advanced remote windows OS detection. Current Features: Determine OS using SMB Queries, PDC (Primary Domain Controlller), BDC (Backup Domain Controller), NT MEMBER SERVER, NT WORKSTATION, SQLSERVER, NOVELL NETWARE SERVER, WINDOWS FOR WORKGROUPS, WINDOWS 9X, Enumerate Servers, Enumerate Shares including Administrative ($), Enumerate Global Groups, E numerate Users, Displays Active Services, Ability to Scan Network Neighborhood, Ability to establish NULL IPC$ session with host, Ability to Query Registry (currently determines Service Pack Level & Applied Hotfixes. Changes: minor bug fixed in the options parsing that would cause winfingerprint to crash if you did not specify -m or -t. Homepage here. By Vacuum.
netfilter-0.1.14.tar.bz2Fri Dec 24 05:13:54 1999
netfilter is a framework for arbitrary packet mangling. So far, a new NAT system and packet-filtering system have been built on top of it, as well as compatibility modules for ipfwadm and ipchains. Netfilter is a work-in-progress, but should be fairly robust for non-exotic work. Changes: A local traffic oops fix, and a RH6.0 compile fix. Homepage here. By Rusty Russell
ms99-058Fri Dec 24 04:51:29 1999
Microsoft has released a patch that eliminates a vulnerability in Microsoft IIS and other products that run atop it. The vulnerability allows a visiting user to see the source code to .ASP and other files. Microsoft FAQ on this issue here.
ms99-061Fri Dec 24 04:49:48 1999
Microsoft has released a patch that eliminates a vulnerability in Microsoft IIS and products that run atop it. The vulnerability allows files on a web server to be specified using an alternate representation, in order to bypass access controls of some third-party applications. Microsoft FAQ on this issue here.
i2odialogd.txtFri Dec 24 04:30:31 1999
Anyone can gain remote root access to a UnixWare 7.1 system by exploiting a vulnerability in the i2odialogd daemon. This daemon is installed and running by default. By Brock Tellier
nn45-overflow.txtFri Dec 24 04:25:28 1999
Netscape Navigator/Communicator 4.5 buffer overflow advisory - I recently uncovered a stack based buffer overflow in NN which allowed me to execute arbitrary code. Exploit included. Tested with Netscape Navigator 4.5 using Windows98. Homepage here. By Darkplan
phrozen3.tgzFri Dec 24 04:17:13 1999
Phrozen3 patches 4 holes on Redhat linux. It installs the official patches for bind, wu-ftpd, sendmail, and glibc. By Phrozen3
adkill-howto.htmFri Dec 24 03:54:17 1999
How to remove ads from free webpage providers - Version 1.1. Homepage here. By Smog
003.txtFri Dec 24 03:51:49 1999
SUID Advisory #3 - multiple vulnerabilities with glftpd 1.17.2 and below. glFtpD has several problems which can lead to a remote attacker attaining root on your machine. Homepage here. By Suid
003_wp.txtFri Dec 24 03:51:49 1999
Example attack transcript against glftpd. This attack was performed against a default install with a single user account added. Homepage here. By Suid
001_addendum.txtFri Dec 24 03:37:32 1999
SUID Advisory #1 Addendum - Insecure FTP server conventions can lead to remote binary execution on a remote ftp server. Anonymous users or users with valid ftp access only accounts may also execute arbitrary code. Exploit information included. Homepage here. By Suid
002.txtFri Dec 24 03:31:21 1999
SUID Advisory #2 - Exploit for ascend router bugs as per NAI advisory. Homepage here. By Suid
nt.security.update.122399.txtFri Dec 24 02:51:43 1999
Windows NT Security Update - December 23, 1999. New vulnerabilities - Yet another problem with Internet Explorer 5.x and cross frame navigation, Overflow in ZBServer v1.5, Outlook 5, as well as Internet Explorer 4.5 on Macintosh platform, Microsoft reported that Internet Information Server (IIS) is prone to reveal source code under certain conditions, Norton Antivirus 2000 was reported to contain a serious buffer overflow condition, and SQL server crash. NTsecurity homepage here.
iptun-ssl.txtFri Dec 24 02:20:25 1999
Step by Step instructions for tunnelling IP through an SSL Proxy using two linux boxes, pppd, ipfwadm, and ppptcp-ssl. By Coaxial Karma
zbs15exp.zipFri Dec 24 02:05:07 1999
Remote exploit for ZBServer 1.5 Pro Edition for Win98/NT. Source code. Binary available here. By Underground Security Systems Research
zbserver-1.5.txtFri Dec 24 01:58:10 1999
[w00giving #11] An exploitable buffer overflow was found in ZBServer 1.5 Pro Edition for Win98/NT. The code that handles GET commands has an unchecked buffer that will allow arbitrary code to be executed if it is overflowed. Source / Binary for the exploit available here. By Underground Security Systems Research
whisker-1.3.0a.tar.gzFri Dec 24 01:42:41 1999
whisker is what I've dubbed a 'next generation' CGI scanner. It is Scriptable. It's a programming-ish language that is tailored to do lots of flexible web scanning. Very stealthy. I've implemented anti-IDS checks into the scan. Includes over 200 checks. Lots of options. Reads in nmap output, files full of domains, or single host. Virtual host support. Proxy support. Changes: 8 new anti-IDS tactics, scan SSL, alternate file formats, distributed scanning, 200 vulnerabilities, 100 servers, multi-threaded front end, and distributed proxy fixes. Written in perl by rain forest puppy / ADM / wire trip
ms99-046Fri Dec 24 01:10:33 1999
Microsoft has released a patch that significantly improves the randomness of the TCP initial sequence numbers (ISNs) generated by the TCP/IP stack in Microsoft(r) Windows NT(r) 4.0. Improving the randomness of ISNs eliminates a class of potential attacks against Windows NT 4.0 systems.
blast-1.1.zipWed Dec 22 18:51:21 1999
Blast - a small, quick TCP service stress test tool. Blast does a good amount of work very quickly and can help spot potential weaknesses in your network servers. Homepage here. By JD Glaser
pikt-1.82.tar.gzWed Dec 22 18:15:57 1999
PIKT, an innovative new paradigm for administer ing heterogeneous networked workstations, is a multi-functional tool for monitoring systems, reporting and fixing problems, and managing system configurations. PIKT is quickly gathering potential as a serious security management system. PIKT comprises an embedded scripting language with unique, labor-saving features.Changes: Non-trivial bug fix. All users should upgrade. Homepage here. Precompiled binaries available here. By Robert Osterlund
bastille-1.0.1.tar.gzWed Dec 22 18:08:09 1999
Bastille Linux aims to be the most comprehensive, flexible and educational Security Hardening Program for Red Hat Linux 6.0. Virtually every task it performs is optional, providing immense flexibility. It educates the installing admin regarding the topic at hand before asking any question. The interactive nature allows the program to be more thorough when securing, while the educational component produces an admin who is less likely to compromise the increased security. Changes: Fixed a tiny bug in 1.0.0 that wasn't allowing it to run unless you modified a particular line. Homepage here. By Jay Beale
bsdkern.htmWed Dec 22 16:11:48 1999
Attacking FreeBSD with Kernel Modules - The System Call Approach. System calls can be backdoored on FreeBSD much like they can on linux, and most linux kernel modules can easily be ported to FreeBSD. Includes information on intercepting system calls, filesystem related hacks, hiding files and contests, process related hacks, file execution redirection, tty hijacking, and module hiding. Homepage here. By pragmatic
thc-hb09.zipWed Dec 22 16:06:27 1999
thc-hb09.zip is a Windows-based tool - A security-scanner included in a web browser for scanning webservers/NT-Servers. By Doc Holiday and Ganymed
slkm-1.0.tar.gzWed Dec 22 15:58:49 1999
slkm-1.0.tar.gz is the first public solaris loadable kernel module backdoor from THC. Features File hiding, File content and directory hiding, Switch to toggle file content and directory hiding, Process hiding (structured proc), Promiscous flag hiding, Converting magic uid to root uid, and Execution redirecting. Homepage here. By Plasmoid
solaris.dmispd.txtWed Dec 22 14:30:13 1999
Several holes in the Solaris 2.7 SPARC/x86 dmispd daemon will allow malicious users to do various local and remote DoS attacks and probably more. By Brock Tellier
tfn2k.tgzWed Dec 22 14:17:52 1999
Tribe Flood Network 2000. Using distributed client/server functionality, stealth and encryption techniques and a variety of functions, TFN can be used to control any number of remote machines to generate on-demand, anonymous Denial Of Service attacks and remote shell access. The new and improved features in this version include Remote one-way command execution for distributed execution control, Mix attack aimed at weak routers, Targa3 attack aimed at systems with IP stack vulnerabilities, Compatibility to many UNIX systems and Windows NT, spoofed source addresses, strong CAST encryption of all client/server traffic, one-way communication protocol, messaging via random IP protocol, decoy packets, and extensive documentation. Currently no IDS software will recognise tfn2k. Homepage here. By Mixter
NSS_2000pre2.tar.gzWed Dec 22 14:12:41 1999
Narrow Security Scanner 2000 searches for 260 remote vulnerabilities. Written in perl, tested on Redhat, FreeBSD, and OpenBSD, Slackware, and SuSE. Changes: 11 new vulnerabilities from Bugtraq, and code changes. By Narrow
ms99-060Wed Dec 22 13:54:56 1999
Microsoft has released a patch that addresses two issues - It eliminates a vulnerability in the Outlook Express mail client for Macintosh, which could allow HTML attachments to be automatically downloaded to the users computer. It also provides replacments for several digital certificates that are included in IE for macintosh which will expire Dec. 31. Microsoft FAQ on these issues here.
nt.security.update.122299.txtWed Dec 22 13:49:04 1999
Windows Security Update - December 22, 1999. Contains info on the Syskey Keystream Reuse vulnerability, the LSA Denial of Service vulnerability, and exchange server security. Also has news on new PGP export laws, piracy intervention, and firewalls with managment capabilities. Homepage here.
linux-2.3.34.tar.gzWed Dec 22 13:46:17 1999
Linux kernel version 2.3.33 (developmental). www.kernel.org
sftp-0.4.tar.gzTue Dec 21 18:43:16 1999
Secure FTP (sftp) implements a file transfer protocol using ssh/rsh as the transport mechanism. When the client is invoked, a remote shell is spawned and the server is run. sftp is mainly useful over a secure ssh session since passwords are not exposed. It also has the advantage that no root access is required, since the server runs as a user process. Changes: A new man page, invokable ssh with compression, a new RPM version, and multiple authentication attempts should be handled better. Homepage here. By Brian Wellington
veganizer-1.00.tar.gzTue Dec 21 18:43:16 1999
The Veganizer is a spam counter-attack. It searches the headers of a specified message for all associated IPs and Domains, then sends mail to pre-specified addresses at those servers (abuse@, postmaster@) as well as addresses found by a whois query on the IPs/Domains. The mail sent will also include the original message with full headers. Changes: Smarter domain matching, bugfixes. Homepage here. By Francisco Roque
mindtermsrc-115.zipTue Dec 21 18:43:16 1999
MindTerm is a complete ssh-client in pure java. It can be used either as a standalone java-application or as a java- applet. The source-code is freely available (GPL). Three packages of importance are provided, terminal, ssh, and security. The terminal package is a rather complete vt102/xterm-terminal. The ssh-package contains the ssh- protocol and also "drop-in" socket replacements to use ssh- tunnels transparently from a java application/applet. It also contains functionality to realize a ssh-server. Finally the security package contains RSA, DES, 3DES, RC4 and Blowfish ciphers. Changes: Relatively minor bugfixes and updates. Homepage here. By Mats Andersson
NSS_2000pre1.tar.gzTue Dec 21 14:46:37 1999
Narrow Security Scanner 2000 searches for 249 remote vulnerabilities. Written in perl, tested on Redhat, FreeBSD, and OpenBSD, Slackware, and SuSE. By Narrow
dns-pro.dos.txtTue Dec 21 14:41:00 1999
Remote DoS attack discovered in DNS Pro 5.7 for Windows NT, caused by over 30 connections to port 53 at the same time. By Underground Security Systems Research
dsniff-1.1.tar.gzTue Dec 21 14:22:26 1999
Dsniff contains several powerful new network tools, written for use in penetration testing. Arpredirect is a very effective way of sniffing traffic on a switch by forging arp replies. Findgw determines the local gateway of an unknown network via passive sniffing, which can be used in conjunction with arpredirect to intercept all outgoing traffic on a switch. Macof floods the network with random MAC addresses, causing some switches to fail in open repeating mode, facilitating sniffing. Dsniff is a simple password sniffer which parses passwords from many protocols, only saving the "interesting" bits. Mailsnarf is a fast and easy way to violate the Electronic Communications Privacy Act of 1986. urlsnarf outputs all requested URL's from HTTP traffic. webspy sends URLs sniffed from a client to your local Netscape browser for display, updated in real-time (as the target surfs, your browser surfs along with them, automagically). Homepage here. By Dug Song
lsof_4.47_W.tar.gzTue Dec 21 14:22:26 1999
Lsof is a Unix-specific diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. Changes: Fixed compilation on Solaris, hacks for HP/UX, linux bugfixes. Homepage here. By Vic Abell
samhain-0.5.tar.gzTue Dec 21 14:22:26 1999
Samhain is a tool for monitoring the integrity of files on a single machine as well as on a network. It is easy to configure and maintains a single database (per host) for storing the signatures of files. Samhain is designed to be run as a background process, checking files periodically against the database. Reports can be written to a signed, tamper-resistant log file, and/or sent offsite by e-mail. To monitor several machines and collect data by a central log server, samhain may be used as a client/server application. For the paranoid, a 'stealth' option is available. Changes: Added a client/server mode and a stealth option. Fixed several bugs and portability fixes. Homepage here. By Rainer Wichmann
ms99-059Tue Dec 21 13:55:15 1999
Microsoft has released a patch that eliminates a security vulnerability in Microsoft SQL Server 7.0. The vulnerability causes a SQL server to crash. Microsoft FAQ available here.
bernstein-9th.htmMon Dec 20 18:50:25 1999
no description
soi_ch4.htmMon Dec 20 18:50:25 1999
no description
crypto-free.htmMon Dec 20 18:50:25 1999
no description
LEARNING.HTMMon Dec 20 18:50:25 1999
no description
crypto-links.htmMon Dec 20 18:50:25 1999
no description
ls-alRMon Dec 20 18:50:25 1999
no description
crypto-update.shMon Dec 20 18:50:25 1999
no description
ls-RMon Dec 20 18:50:25 1999
no description
execorder.txtMon Dec 20 18:50:25 1999
no description
crypto-call.htmMon Dec 20 18:50:25 1999
no description
htlsMon Dec 20 18:50:25 1999
no description
bernstein-eff.htmMon Dec 20 18:50:25 1999
no description
skipsrc-1_0_tar.ZMon Dec 20 18:50:24 1999
no description
GLOSSARY.HTMMon Dec 20 18:50:24 1999
no description
usersguide.ps.gzMon Dec 20 18:50:24 1999
no description
source-readme.txt.gzMon Dec 20 18:50:24 1999
no description
BUILD.gzMon Dec 20 18:50:24 1999
no description
READMEMon Dec 20 18:50:24 1999
no description
skipsrc-1_0-binary-freebsd_tar.ZMon Dec 20 18:50:23 1999
no description
skipsrc-1.0.tar.gzMon Dec 20 18:50:22 1999
no description
advanced.TOPICS.gzMon Dec 20 18:50:21 1999
no description
Win95-Skip.tarMon Dec 20 18:50:21 1999
no description
skip-install.txtMon Dec 20 18:50:21 1999
no description
inet-95.ps.gzMon Dec 20 18:50:21 1999
no description
skip-1.0.announce.gzMon Dec 20 18:50:21 1999
no description
SKIPWIN95man.psMon Dec 20 18:50:20 1999
no description
pgp4pine_1.54.tar.gzMon Dec 20 18:50:19 1999
no description
pgp4pine_1.51.tar.gzMon Dec 20 18:50:19 1999
no description
wet-ice-98.zipMon Dec 20 18:50:19 1999
no description
INSTALL.gzMon Dec 20 18:50:19 1999
no description
pgp4pine_1.52.tar.gzMon Dec 20 18:50:19 1999
no description
pgp4pine_1.55.tar.gzMon Dec 20 18:50:19 1999
no description
pgp4pine_1.53.tar.gzMon Dec 20 18:50:19 1999
no description
pgp4pine.elgamal.sigMon Dec 20 18:50:18 1999
no description
pgp4pine.tar.gzMon Dec 20 18:50:18 1999
no description
pgppine5.tar.gzMon Dec 20 18:50:18 1999
no description
pgp4pine.rsa.sigMon Dec 20 18:50:18 1999
no description
pgp4pine_1.40.tar.gzMon Dec 20 18:50:18 1999
no description
pgp4pine_1.32.tar.gzMon Dec 20 18:50:18 1999
no description
pgp4pine_1.42.tar.gzMon Dec 20 18:50:18 1999
no description
pgppine.tar.gzMon Dec 20 18:50:18 1999
no description
pappMon Dec 20 18:50:18 1999
no description
pgp4pine_1.43.tar.gzMon Dec 20 18:50:18 1999
no description
pgp4pine_1.45.tar.gzMon Dec 20 18:50:18 1999
no description
pgp4pine_1.47.tar.gzMon Dec 20 18:50:18 1999
no description
pgp4pine_1.56.tar.gzMon Dec 20 18:50:18 1999
no description
pgp4pine_1.46.tar.gzMon Dec 20 18:50:18 1999
no description
pgp4pine_1.44.tar.gzMon Dec 20 18:50:18 1999
no description
pgp4pine.dss.sigMon Dec 20 18:50:18 1999
no description
ps17.lsmMon Dec 20 18:50:17 1999
no description
nsa-diana.htmMon Dec 20 18:50:17 1999
no description
paperF1.htmMon Dec 20 18:50:17 1999
no description
Mister.NSA.poem.txtMon Dec 20 18:50:17 1999
no description
arm-of-nsa.txtMon Dec 20 18:50:17 1999
no description
ps17.exeMon Dec 20 18:50:17 1999
no description
us.govt.history.txtMon Dec 20 18:50:17 1999
no description
throw_sa.htmMon Dec 20 18:50:17 1999
no description
cia-iwt.htmMon Dec 20 18:50:17 1999
no description
lotus.notes.nsa.backdoor.txtMon Dec 20 18:50:17 1999
no description
lotus.notes.backdoor.txtMon Dec 20 18:50:17 1999
no description
executive-orders.txtMon Dec 20 18:50:16 1999
no description
privacy-dg.htmMon Dec 20 18:50:16 1999
no description
stoa_cover.htmMon Dec 20 18:50:16 1999
no description
nsa-4th.htmMon Dec 20 18:50:16 1999
no description
mi6-list.htmMon Dec 20 18:50:16 1999
no description
ic2000.zipMon Dec 20 18:50:16 1999
no description
nsa-clash.htmMon Dec 20 18:50:16 1999
no description
stoa_catalogue.htmMon Dec 20 18:50:16 1999
no description
M045INAU.GIFMon Dec 20 18:50:15 1999
no description
ic2kreport.htmMon Dec 20 18:50:15 1999
no description
interception_capabilities_2000.htmMon Dec 20 18:50:15 1999
no description
Kryptos.txtMon Dec 20 18:50:14 1999
no description
ic2000.htmMon Dec 20 18:50:14 1999
no description
cia-art-jg.htmMon Dec 20 18:50:14 1999
no description
Kryptos.bmpMon Dec 20 18:50:14 1999
no description
gilloglyMon Dec 20 18:50:14 1999
no description
cia-art-kryptos.txtMon Dec 20 18:50:14 1999
no description
walsh.htmMon Dec 20 18:50:13 1999
no description
ap.htmMon Dec 20 18:50:13 1999
no description
CIA_clue.txtMon Dec 20 18:50:13 1999
no description
1_denial.txtMon Dec 20 18:50:12 1999
no description
nsa4897878.htmMon Dec 20 18:50:12 1999
no description
bxa031799.txtMon Dec 20 18:50:12 1999
no description
nsa5812609.htmMon Dec 20 18:50:12 1999
no description
nsa4567572.htmMon Dec 20 18:50:12 1999
no description
nsa4429180.htmMon Dec 20 18:50:12 1999
no description
nsa-patents.htmMon Dec 20 18:50:12 1999
no description
nsa5832478.htmMon Dec 20 18:50:12 1999
no description
bxa121098.txtMon Dec 20 18:50:12 1999
no description
nsa4731840.htmMon Dec 20 18:50:12 1999
no description
nsa5631961.htmMon Dec 20 18:50:12 1999
no description
sfs10tex.zipMon Dec 20 18:50:11 1999
no description
sfs110.zipMon Dec 20 18:50:11 1999
no description
tangle.zipMon Dec 20 18:50:11 1999
no description
tomb201d.zipMon Dec 20 18:50:11 1999
no description
uecryp01.zipMon Dec 20 18:50:11 1999
no description
ABSOLUTE.EXEMon Dec 20 18:50:11 1999
no description
idea3a.zipMon Dec 20 18:50:10 1999
no description
krypto11.zipMon Dec 20 18:50:10 1999
no description
secdr14a.zipMon Dec 20 18:50:10 1999
no description
newdes12.zipMon Dec 20 18:50:10 1999
no description
crypte1.zipMon Dec 20 18:50:10 1999
no description
scrypt3.zipMon Dec 20 18:50:10 1999
no description
dosfishz.zipMon Dec 20 18:50:10 1999
no description
naut15as.zipMon Dec 20 18:50:10 1999
no description
ncrypt31.zipMon Dec 20 18:50:10 1999
no description
crypt20.zipMon Dec 20 18:50:10 1999
no description
encrypt.zipMon Dec 20 18:50:10 1999
no description
cryptfy2.zipMon Dec 20 18:50:10 1999
no description
naut15a.zipMon Dec 20 18:50:10 1999
no description
R4DCRYPT.ZIPMon Dec 20 18:50:09 1999
no description
aspicr03.zipMon Dec 20 18:50:09 1999
no description
SPLOKNT.ZIPMon Dec 20 18:50:09 1999
no description
bfa7.zipMon Dec 20 18:50:09 1999
no description
ZIPCRACK.ZIPMon Dec 20 18:50:09 1999
no description
TOMB100.ZIPMon Dec 20 18:50:09 1999
no description
SECDR13C.ZIPMon Dec 20 18:50:09 1999
no description
SECDR13A.ZIPMon Dec 20 18:50:09 1999
no description
SCYTAL13.ZIPMon Dec 20 18:50:09 1999
no description
SPLOK18.ZIPMon Dec 20 18:50:09 1999
no description
SPLOK95.ZIPMon Dec 20 18:50:09 1999
no description
PUBKEYS.ZIPMon Dec 20 18:50:09 1999
no description
PKCRACK.ZIPMon Dec 20 18:50:09 1999
no description
STEGODOS.ZIPMon Dec 20 18:50:09 1999
no description
PASSGN50.ZIPMon Dec 20 18:50:09 1999
no description
IDEA3.ZIPMon Dec 20 18:50:08 1999
no description
EFW32U.ZIPMon Dec 20 18:50:08 1999
no description
ELIPT210.ZIPMon Dec 20 18:50:08 1999
no description
NAUT090S.ZIPMon Dec 20 18:50:08 1999
no description
NAUT090.ZIPMon Dec 20 18:50:08 1999
no description
MD5ASM32.ZIPMon Dec 20 18:50:08 1999
no description
MRRCIP.ZIPMon Dec 20 18:50:08 1999
no description
IDEA22A.ZIPMon Dec 20 18:50:08 1999
no description
MESS11B.ZIPMon Dec 20 18:50:08 1999
no description
ENCRYP.ZIPMon Dec 20 18:50:08 1999
no description
OTP-10.ZIPMon Dec 20 18:50:08 1999
no description
DIGSIG.ZIPMon Dec 20 18:50:07 1999
no description
CRYPTIC.ZIPMon Dec 20 18:50:07 1999
no description
DES.EXEMon Dec 20 18:50:07 1999
no description
DOSBAT.ZIPMon Dec 20 18:50:07 1999
no description
CRYPT201.ZIPMon Dec 20 18:50:07 1999
no description
ANONMAIL.ARJMon Dec 20 18:50:06 1999
no description
md5.zipMon Dec 20 18:50:06 1999
no description
otpdos.zipMon Dec 20 18:50:06 1999
no description
zcrypt21.zipMon Dec 20 18:50:06 1999
no description
BLOWFS58.ZIPMon Dec 20 18:50:06 1999
no description
CHAIN.ZIPMon Dec 20 18:50:06 1999
no description
wotp.zipMon Dec 20 18:50:06 1999
no description
caesar2.zipMon Dec 20 18:50:06 1999
no description
BLIND-SE.DOCMon Dec 20 18:50:06 1999
no description
CPHANT.ZIPMon Dec 20 18:50:06 1999
no description
mcrypt-2.2.0pre10.tar.gzMon Dec 20 18:50:05 1999
no description
libmcrypt-2.0.tar.gzMon Dec 20 18:50:05 1999
no description
mcryptchecksums.ascMon Dec 20 18:50:05 1999
no description
MD5.tar.gzMon Dec 20 18:50:05 1999
no description
mcrypt-2.2.0pre7.tar.gzMon Dec 20 18:50:05 1999
no description
mcrypt-2.2.0.tar.gzMon Dec 20 18:50:05 1999
no description
libmcrypt-1.93.tar.gzMon Dec 20 18:50:05 1999
no description
mcrypt-2.2.0pre5.tar.gzMon Dec 20 18:50:04 1999
no description
libmcrypt-1.92.tar.gzMon Dec 20 18:50:04 1999
no description
egd-0.5.tar.gzMon Dec 20 18:50:04 1999
no description
libmcrypt-1.91.tar.gzMon Dec 20 18:50:04 1999
no description
egd-0.5.READMEMon Dec 20 18:50:04 1999
no description
libmcrypt-1.9.tar.gzMon Dec 20 18:50:04 1999
no description
CRYPT3.ZIPMon Dec 20 18:50:04 1999
no description
mhash-0.5.0.tar.gzMon Dec 20 18:50:04 1999
no description
libmcrypt-1.7.tar.gzMon Dec 20 18:50:03 1999
no description
libmcrypt-1.8.tar.gzMon Dec 20 18:50:03 1999
no description
mcrypt-2.1.19.tar.gzMon Dec 20 18:50:03 1999
no description
libmhash-0.3.tar.gzMon Dec 20 18:50:03 1999
no description
mcrypt-2.2.0pre3.tar.gzMon Dec 20 18:50:03 1999
no description
mcrypt-2.1.17-nonfree.tar.gzMon Dec 20 18:50:02 1999
no description
mcrypt-2.1.17.tar.gzMon Dec 20 18:50:02 1999
no description
random_machdepc.cMon Dec 20 18:50:02 1999
no description
libmcrypt-1.6.tar.gzMon Dec 20 18:50:02 1999
no description
mcrypt-2.1.18.tar.gzMon Dec 20 18:50:02 1999
no description
sol-test.txtMon Dec 20 18:50:01 1999
no description
mcrypt-2.1.15.tar.gzMon Dec 20 18:50:01 1999
no description
uliscanc.cMon Dec 20 18:50:01 1999
no description
sol.plMon Dec 20 18:50:01 1999
no description
libmcrypt-1.4.tar.gzMon Dec 20 18:50:01 1999
no description
mcrypt-2.1.16.tar.gzMon Dec 20 18:50:01 1999
no description
libmhash-0.2.tar.gzMon Dec 20 18:50:01 1999
no description
libmcrypt-1.3.tar.gzMon Dec 20 18:50:01 1999
no description
libmhash-0.1.tar.gzMon Dec 20 18:50:01 1999
no description
mcrypt-2.1.14.tar.gzMon Dec 20 18:50:01 1999
no description
md5.tar.gzMon Dec 20 18:50:01 1999
no description
libmcrypt-1.2.tar.gzMon Dec 20 18:50:01 1999
no description
mcrypt-2.1.12.tar.gzMon Dec 20 18:50:00 1999
no description
cryptogram-021599.txtMon Dec 20 18:50:00 1999
no description
libmcrypt-1.0.tar.gzMon Dec 20 18:50:00 1999
no description
mcrypt-2.1.10.tar.gzMon Dec 20 18:50:00 1999
no description
mcrypt-2.1.13.tar.gzMon Dec 20 18:50:00 1999
no description
mcrypt-2.1.11.tar.gzMon Dec 20 18:50:00 1999
no description
chkreg.cMon Dec 20 18:49:59 1999
no description
mcrypt-2.1.0.tar.gzMon Dec 20 18:49:59 1999
no description
mcrypt-2.1.7.tar.gzMon Dec 20 18:49:59 1999
no description
Hdsk41b.zipMon Dec 20 18:49:59 1999
no description
rot13-1.5.1.tar.gzMon Dec 20 18:49:59 1999
no description
mcrypt-2.1.6.tar.gzMon Dec 20 18:49:59 1999
no description
mcrypt.chksumsMon Dec 20 18:49:59 1999
no description
mcrypt.lsmMon Dec 20 18:49:59 1999
no description
mcrypt-2.1.5.tar.gzMon Dec 20 18:49:59 1999
no description
mcrypt-2.1.9b.tar.gzMon Dec 20 18:49:59 1999
no description
keyhide2.pdfMon Dec 20 18:49:59 1999
no description
Tea.txtMon Dec 20 18:49:58 1999
no description
skipjack.cMon Dec 20 18:49:58 1999
no description
rc5ref.cMon Dec 20 18:49:58 1999
no description
mdc.tar.gzMon Dec 20 18:49:58 1999
no description
rsaeuro-1.03.tar.gzMon Dec 20 18:49:58 1999
no description
qcypher.cMon Dec 20 18:49:58 1999
no description
misty1.tar.gzMon Dec 20 18:49:58 1999
no description
unix-crypt.cMon Dec 20 18:49:58 1999
no description
loki2.tar.gzMon Dec 20 18:49:58 1999
no description
rc6.cMon Dec 20 18:49:58 1999
no description
gnupg-0.9.8.tar.gz.ascMon Dec 20 18:49:57 1999
no description
gnupg-0.4.3.tar.gzMon Dec 20 18:49:57 1999
no description
gnupg-0.9.8.tar.gzMon Dec 20 18:49:57 1999
no description
gnupg-0.9.7.tar.gz.ascMon Dec 20 18:49:56 1999
no description
gnupg-w32-0.9.6b.zipMon Dec 20 18:49:56 1999
no description
gnupg-0.9.7.tar.gzMon Dec 20 18:49:56 1999
no description
gnupg-0.9.7.tar.gz.sigMon Dec 20 18:49:56 1999
no description
gnupg-0.9.8.diff.gzMon Dec 20 18:49:56 1999
no description
gnupg-0.9.6.tar.gz.sigMon Dec 20 18:49:55 1999
no description
gnupg-0.9.6.tar.gzMon Dec 20 18:49:55 1999
no description
gnupg-0.9.6.tar.gz.ascMon Dec 20 18:49:55 1999
no description
gnupg-0.9.7.diff.gzMon Dec 20 18:49:55 1999
no description
gnupg-0.9.4.tar.gz.ascMon Dec 20 18:49:54 1999
no description
gnupg-0.9.5.tar.gz.sigMon Dec 20 18:49:54 1999
no description
gnupg-0.9.5.diff.gzMon Dec 20 18:49:54 1999
no description
gnupg-0.9.6.diff.gzMon Dec 20 18:49:54 1999
no description
gnupg-0.9.4.tar.gz.sigMon Dec 20 18:49:54 1999
no description
gnupg-0.9.5.tar.gzMon Dec 20 18:49:54 1999
no description
gnupg-0.9.5.tar.gz.ascMon Dec 20 18:49:54 1999
no description
gnupg-0.9.3.tar.gzMon Dec 20 18:49:53 1999
no description
gnupg-0.9.3.tar.gz.ascMon Dec 20 18:49:53 1999
no description
gnupg-0.9.4.tar.gzMon Dec 20 18:49:53 1999
no description
gnupg-0.9.3.tar.gz.sigMon Dec 20 18:49:53 1999
no description
gnupg-0.9.4.diff.gzMon Dec 20 18:49:53 1999
no description
gnupg-0.9.3.diff.gzMon Dec 20 18:49:52 1999
no description
gnupg-0.9.2.tar.gz.sigMon Dec 20 18:49:52 1999
no description
gnupg-0.9.2.tar.gz.ascMon Dec 20 18:49:52 1999
no description
gnupg-0.9.2.tar.gzMon Dec 20 18:49:52 1999
no description
gnupg-0.9.1.diff.gzMon Dec 20 18:49:51 1999
no description
gnupg-0.9.1.tar.gz.sigMon Dec 20 18:49:51 1999
no description
gnupg-0.9.1.tar.gzMon Dec 20 18:49:51 1999
no description
gnupg-0.9.2.diff.gzMon Dec 20 18:49:51 1999
no description
gnupg-0.9.0.tar.gz.ascMon Dec 20 18:49:51 1999
no description
gnupg-0.9.0.tar.gz.sigMon Dec 20 18:49:51 1999
no description
gnupg-0.9.1.tar.gz.ascMon Dec 20 18:49:51 1999
no description
gnupg-0.4.5.tar.gz.sigMon Dec 20 18:49:50 1999
no description
gnupg-0.9.0.diff.gzMon Dec 20 18:49:50 1999
no description
gnupg-0.4.5.tar.gz.ascMon Dec 20 18:49:50 1999
no description
gnupg-0.9.0.tar.gzMon Dec 20 18:49:50 1999
no description
gnupg-0.4.5.tar.gzMon Dec 20 18:49:50 1999
no description
gnupg-0.4.4.diff.gzMon Dec 20 18:49:49 1999
no description
gnupg-0.4.5.diff.gzMon Dec 20 18:49:49 1999
no description
gnupg-0.4.4.tar.gzMon Dec 20 18:49:49 1999
no description
gnupg-0.4.4.tar.gz.ascMon Dec 20 18:49:49 1999
no description
gnupg-0.4.4.tar.gz.sigMon Dec 20 18:49:49 1999
no description
gnupg-nt-0.4.1.zipMon Dec 20 18:49:49 1999
no description
gnupg-0.9.8.tar.gz.sigMon Dec 20 18:49:49 1999
no description
kerbnet12.zipMon Dec 20 18:49:48 1999
no description
mailcrypt-3.5.2.tar.gzMon Dec 20 18:49:48 1999
no description
mailcrypt-3.5.3.tar.gzMon Dec 20 18:49:48 1999
no description
kerbnet-source.tgzMon Dec 20 18:49:45 1999
no description
tcl-source.tgzMon Dec 20 18:49:43 1999
no description
krb5-1.0pl1.diffs.tarMon Dec 20 18:49:41 1999
no description
netscape-4.5-fullstrength-crypto-upgrade.txtMon Dec 20 18:49:41 1999
no description
krb5-1.0.tarMon Dec 20 18:49:41 1999
no description
krb5-1.0.5.tarMon Dec 20 18:49:38 1999
no description
krb5-1.0.1-1.0.2.diff.tarMon Dec 20 18:49:36 1999
no description
cns-96q4.tar.gzMon Dec 20 18:49:35 1999
no description
krb5-1.0.4-1.0.5.diff.tarMon Dec 20 18:49:35 1999
no description
krb5-1.0.2-1.0.3.diff.tarMon Dec 20 18:49:35 1999
no description
krb5-1.0.3-1.0.4.diff.tarMon Dec 20 18:49:35 1999
no description
krb4-0.9.9.tar.gzMon Dec 20 18:49:35 1999
no description
krb5-nt-alpha2.src.zipMon Dec 20 18:49:34 1999
no description
krb5-nt-alpha2.bin.zipMon Dec 20 18:49:33 1999
no description
invisimail.exeMon Dec 20 18:49:32 1999
no description
invisialx.exeMon Dec 20 18:49:32 1999
no description
Invisi30NT.exeMon Dec 20 18:49:31 1999
no description
Invisi30N.exeMon Dec 20 18:49:30 1999
no description
invisi30.exeMon Dec 20 18:49:29 1999
no description
datasafe.exeMon Dec 20 18:49:28 1999
no description
wincrack.zipMon Dec 20 18:49:27 1999
no description
haval.hMon Dec 20 18:49:27 1999
no description
crack-a5.htmMon Dec 20 18:49:27 1999
no description
echelon.txtMon Dec 20 18:49:27 1999
no description
haval.cMon Dec 20 18:49:27 1999
no description
zipcrack-2.0.zipMon Dec 20 18:49:27 1999
no description
wpcrack.gzMon Dec 20 18:49:27 1999
no description
wordunp-unprotect-ms-word-docs.zipMon Dec 20 18:49:27 1999
no description
a51-pi.htmMon Dec 20 18:49:27 1999
no description
wppass2.zipMon Dec 20 18:49:27 1999
no description
word_6.cppMon Dec 20 18:49:27 1999
no description
a5-hack.htmMon Dec 20 18:49:27 1999
no description
wpcrack_a.zipMon Dec 20 18:49:27 1999
no description
wpcrack_b.zipMon Dec 20 18:49:27 1999
no description
decrypting-word-for-windows-files.txt.ZMon Dec 20 18:49:26 1999
no description
entropy.c.ZMon Dec 20 18:49:26 1999
no description
crypt201.exeMon Dec 20 18:49:26 1999
no description
r4readme.txtMon Dec 20 18:49:26 1999
no description
cryptdoc.zipMon Dec 20 18:49:26 1999
no description
novell-pw-cracker.zipMon Dec 20 18:49:26 1999
no description
r4dcrypt.zipMon Dec 20 18:49:26 1999
no description
r4dcrypt.cMon Dec 20 18:49:26 1999
no description
pkcrack.zipMon Dec 20 18:49:26 1999
no description
r4desc.txtMon Dec 20 18:49:26 1999
no description
cryptsrc.zipMon Dec 20 18:49:26 1999
no description
isomorph.gzMon Dec 20 18:49:26 1999
no description
wincrack.txt.ZMon Dec 20 18:49:26 1999
no description
crypt201.txtMon Dec 20 18:49:26 1999
no description
ncsa.telnet.password.gzMon Dec 20 18:49:26 1999
no description
hart-decipher-simple-subst.zipMon Dec 20 18:49:26 1999
no description
setpwd.zipMon Dec 20 18:49:26 1999
no description
license.asc.gzMon Dec 20 18:49:26 1999
no description
taber-crypt200-cryptogram-solver-msdos.zipMon Dec 20 18:49:26 1999
no description
ct.tar.gzMon Dec 20 18:49:26 1999
no description
hush-src.102.zipMon Dec 20 18:49:25 1999
no description
cbw.tar.gzMon Dec 20 18:49:25 1999
no description
Minkeyle.cipMon Dec 20 18:49:25 1999
no description
logi.crypto1.0.2.zipMon Dec 20 18:49:25 1999
no description
Cryptix-1_16_tar.gzMon Dec 20 18:49:25 1999
no description
Nov312.attMon Dec 20 18:49:25 1999
no description
logi.crypto1.0.3.zipMon Dec 20 18:49:25 1999
no description
logi.crypto1.0.4.zipMon Dec 20 18:49:25 1999
no description
Weak-DES.txtMon Dec 20 18:49:25 1999
no description
a5.v.txtMon Dec 20 18:49:25 1999
no description
cryptonite1.0.0.zipMon Dec 20 18:49:24 1999
no description
mindbright.lsmMon Dec 20 18:49:24 1999
no description
mindbright-0.98.zipMon Dec 20 18:49:24 1999
no description
cryptonite0.53.zipMon Dec 20 18:49:24 1999
no description
mindbright.zipMon Dec 20 18:49:24 1999
no description
cryptonite1.0.1.zipMon Dec 20 18:49:24 1999
no description
mindbright-0.97.zipMon Dec 20 18:49:24 1999
no description
cryptonite0.90.zipMon Dec 20 18:49:24 1999
no description
Java-DES.zipMon Dec 20 18:49:23 1999
no description
Cryptix-classes-2_20-Java.zipMon Dec 20 18:49:23 1999
no description
Cryptix-2_20-Java.zipMon Dec 20 18:49:23 1999
no description
Cryptix-doc-2_20-Java.zipMon Dec 20 18:49:23 1999
no description
XorCryptographer.javaMon Dec 20 18:49:23 1999
no description
Cryptographer.javaMon Dec 20 18:49:23 1999
no description
logi.crypto1.0.5.zipMon Dec 20 18:49:23 1999
no description
cryptonite0.52.zipMon Dec 20 18:49:23 1999
no description
c2txt2c-0.2.1.tar.gzMon Dec 20 18:49:22 1999
no description
c2txt2c-0.2.tar.gzMon Dec 20 18:49:22 1999
no description
dlock2.zipMon Dec 20 18:49:22 1999
no description
READMEMon Dec 20 18:49:22 1999
no description
blowfish.c.gzMon Dec 20 18:49:22 1999
no description
c2txt2c.tar.gzMon Dec 20 18:49:22 1999
no description
np_demo.exeMon Dec 20 18:49:22 1999
no description
bcwipehelp.zipMon Dec 20 18:49:21 1999
no description
bcwipe.exeMon Dec 20 18:49:21 1999
no description
bc6help.zipMon Dec 20 18:49:21 1999
no description
bdk.exeMon Dec 20 18:49:21 1999
no description
bcrypt6b.exeMon Dec 20 18:49:21 1999
no description
bc5help.zipMon Dec 20 18:49:20 1999
no description
bcrypt3.exeMon Dec 20 18:49:20 1999
no description
bcsetup.exeMon Dec 20 18:49:20 1999
no description
bc3help.zipMon Dec 20 18:49:20 1999
no description
snefru.tar.gzMon Dec 20 18:49:19 1999
no description
zcrypt21.zipMon Dec 20 18:49:19 1999
no description
tran-and-prngxor.shar.gzMon Dec 20 18:49:19 1999
no description
ASSORTED.ZIPMon Dec 20 18:49:19 1999
no description
solve-vigenere.tar.gzMon Dec 20 18:49:19 1999
no description
tran-and-prngxor.tar.gzMon Dec 20 18:49:19 1999
no description
sharing.tar.gzMon Dec 20 18:49:19 1999
no description
setzer-trans.tar.gzMon Dec 20 18:49:19 1999
no description
splay.tar.gzMon Dec 20 18:49:19 1999
no description
secure.contents.gzMon Dec 20 18:49:19 1999
no description
brutex10.zipMon Dec 20 18:49:19 1999
no description
snefru2.5a.tar.gzMon Dec 20 18:49:19 1999
no description
bc4help.zipMon Dec 20 18:49:19 1999
no description
ucb-crypt.1.c.gzMon Dec 20 18:49:19 1999
no description
solve-vigenere-4.tar.gzMon Dec 20 18:49:19 1999
no description
wpcrack.tar.gzMon Dec 20 18:49:19 1999
no description
tispem.FAQMon Dec 20 18:49:19 1999
no description
vigenere.cMon Dec 20 18:49:19 1999
no description
sha.tar.gzMon Dec 20 18:49:19 1999
no description
secude-4.1.all.tar.gzMon Dec 20 18:49:18 1999
no description
schneier-blowfish.c.gzMon Dec 20 18:49:18 1999
no description
secure.contentsMon Dec 20 18:49:18 1999
no description
rsaref2.tar.gzMon Dec 20 18:49:18 1999
no description
sci.crypt.faq.gzMon Dec 20 18:49:18 1999
no description
sci.crypt-FAQ.gzMon Dec 20 18:49:18 1999
no description
ripe-md.tar.gzMon Dec 20 18:49:17 1999
no description
ripem-1.2a-0.tar.ZMon Dec 20 18:49:17 1999
no description

Copyright © 1999 Kroll-O'Gara Information Security Group, All Rights Reserved. Legal Notice