Kojoney is an easy of use, secure, robust, and powerful Honeypot for the SSH service. It includes other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log files.
61e278bee046efeb6f01069affa61dbb3a1cf5a31e8b6652a1c32e48e36aaef2
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
5d0b6ce3960d5f7099e5a43c743b3930d024d26a4fad0771a1de642583676c0d
The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X. Screenshot available here..
537fdf3fd3c6a695a889ad0ca835e99623a9d9fc16609067d679c7e183bc1c05
Devolution Security is a video surveillance system for Linux based systems. It supports up to 16 cameras and features unicast and multicast broadcasting, a Web interface, an X11 interface, themes, motion detection, record on motion, eight different camera layouts, camera cycling, fullscreen mode, and more. Devolution Security uses its own toolkit (dtk).
aa3448bac1654ba555194af3533d91ca4d5b8e66aaf9dd5164a18302e2a8e9b5
Aircrack is an 802.11 WEP cracking program that can recover a 40-bit or 104-bit WEP key once enough encrypted packets have been gathered. It implements the standard FMS attack along with some optimizations, thus making the attack much faster compared to other WEP cracking tools.
eabc64f30ca22c9320e146bbdef2f319794855a77c55748c3f4968813b168027
Nuface is a Web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.
3daf72d6dcf577fb3010625d00f29072ba0ee017261d2ebae48454935c1a4f46
VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.
0ffdcf647e685c3c695704b311bc39652f1ac645a754254653099bb1380e33a2
Ubuntu Security Notice USN-160-1 - Multiple vulnerabilities exist in Apache 2.x. Marc Stern discovered a buffer overflow in the SSL module's certificate revocation list (CRL) handler. Watchfire discovered that Apache insufficiently verified the Transfer-Encoding and Content-Length headers when acting as an HTTP proxy.
610b03eb7c16047b642cbaee4904e8cd04c4a4a3db1da1f42f420be9fd66160c
PortailPHP 2.4 allows for SQL injection attacks.
5ca963e85e2437f90ca560d0fda172bec5690cd1c6519079b2d297a549a33e1f
HP Security Bulletin - Oracle(R) has issued a Critical Patch Update which contains solutions for a number of potential security issues which may affect Oracle for Openview (OfO).
8f7655e5e9bc9fd690990079a16ea22ec89379a9d7c90d5e4d97ee4bd7882bf8
Silvernews versions 2.0.3 and below suffer from SQL injection, login bypass, remote command execution, and cross site scripting flaws.
85f61b5793c2cb50c002c4877892598f7a5b0936632f5a391639a9ceb94201eb
linsql2 is an updated version of the command line client for MS-SQL that can execute arbitrary SQL queries and OS commands, when the username/password of the MS-SQL server is known. This version supports the API of the latest freetds library.
4a7f09b14553a97a9a8574a315ad5054939fcc9f829e00560c83fedc1daeea48
Fuse version 4.1.0 and possibly earlier versions appear susceptible to cross site scripting attacks.
8f5d67d23186a9cd6e844fed0fb3cf73c4aee466929859b10d0071d6071bd284
Debian Security Advisory DSA 772-1 - Eduard Bloch discovered a bug in apt-cacher, a caching system for Debian package and source files, that could allow remote attackers to execute arbitrary commands on the caching host as user www-data.
5b557a93df5652634a6208c38d0db0edd30ecabd35ed3d38253098fb58161011
iDEFENSE Security Advisory 08.02.05 - Remote exploitation of a buffer overflow in the Backup Agent for Microsoft SQL Server within Computer Associates' BrightStor ARCserve Backup Agent for SQL allows an attacker to execute arbitrary code with SYSTEM privileges.
64855f8105983a64b559d89c272c83045cbb3711cf0e0b1e55b30d4a2af87ba2
Yersinia implements several attacks for the following protocols: Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking (DTP), 802.1q and VLAN Trunking (VTP), helping a pen-tester with different tasks.
06d9ecc76e0f005ac5b1bdecab48e55b998bc5a4d09f4ae2e914f47120d338a9
Phrack Magazine Issue 63 - The last issue of Phrack! In this issue: Phrack Prophile on Tiago, OSX heap exploitation techniques, Hacking Windows CE, Games with kernel Memory...FreeBSD Style, Raising The Bar For Windows Rootkit Detection, Embedded ELF Debugging, Hacking Grub for Fun and Profit, Advanced antiforensics : SELF, Process Dump and Binary Reconstruction, Next-Gen. Runtime Binary Encryption, Shifting the Stack Pointer, NT Shellcode Prevention Demystified, PowerPC Cracking on OSX with GDB, Hacking with Embedded Systems, Process Hiding and The Linux Scheduler, Breaking Through a Firewall, Phrack World News.
32a3427c4ddef4cf274110f6abb0c9cb95a92ce308265aa82eab4f6a3ec53f13
Computer Associates BrightStor ARCserve Backup and BrightStor Enterprise Backup Agents for Windows contain a stack-based buffer overflow vulnerability. The vulnerability may allow remote attackers to execute arbitrary code with SYSTEM privileges, or cause a denial of service condition. The buffer overflow is the result of improper bounds checking performed on data sent to port 6070.
d0b86151caf4b31b313680362872830cbd81e6f29d1e165ddf1aea180174a2ed
Naxtor Shopping Cart 1.0 is susceptible to cross site scripting, SQL injection, and information disclosure vulnerabilities.
261cae7535d437a324bbc188354942c054e6e0dc3304587397d3dc08116fcabf
Microsoft ActiveSync 3.7.1 allows for remote password compromise.
af71edab85eff38524ce8cc13bb88722b7a761f02675dcf83e6cf1b388810201
Microsoft ActiveSync has an information leak vulnerability where a password is passed in the clear.
a5597b1871a6a93634aea76d7bf6ba629dd8d36f3d103e073c43e82c87e656c9
Quick'n'Easy FTP server 3.0 pro and lite suffer from a remote buffer overflow vulnerability that can result in a denial of service.
9a64dafde7563903ef2ed2c64e250221bbb96477a2c523f5eb5c27068a9064d2
Gentoo Linux Security Advisory GLSA 200508-03 - nbSMTP is vulnerable to a format string vulnerability which may result in remote execution of arbitrary code. Versions less than 1.00 are affected.
188736265d7f7780fc865f67a6ed19d2a948cc5b5d2b453565fd694ed69dff2d
If a malicious local user extracts a file using unzip 5.52 in a directory that they have write access to, a TOCTOU bug can be exploited to change the permission of any file belonging to that user.
55b2c4f64e7c54f23df8ac2775729729ccfb5e0dccfe171b11c2faff2adf5173
Gentoo Linux Security Advisory GLSA 200508-02 - infamous42md reported that ProFTPD is vulnerable to format string vulnerabilities when displaying a shutdown message containing the name of the current directory, and when displaying response messages to the client using information retrieved from a database using mod_sql. Versions less than 1.2.10-r7 are affected.
92e2e5ba42acd726b76870aec005d5d27b342c3b2d5a94e2daa39a52c0da932d