On 14/06/07, scott <[EMAIL PROTECTED]> wrote:
> Anyone know where I can get a copy of tcpdfilter?
On Packetstorm
http://packetstormsecurity.nl/sniffers/tcpdump/
http://packetstormsecurity.nl/sniffers/tcpdump/tcpdfilter_2.0.tar.gz
___
Full-Disclosure - W
> Robert Jakabosky discovered an infinite loop triggered by a connection
> abort when Lighttpd processes carriage return and line feed sequences.
Could anybody reproduce this DoS? I tried this NASL script without
success. The server rejects connections for about one minute (because
of kazillons of
Does anybody have the e-mail address of a security contact at Nortel?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
On 25/05/05, mike king <[EMAIL PROTECTED]> wrote:
> this is not at all uncommon. so chances are its the same program just tweaked.
Thanks Mike. Another point: on some machines infected by the same
nasty beast, there is a second FTP server on a high port. The banners
look like ProFTPD (with miscell
I found a FTP server on port 42260 with this banner: 220 fuckFtpd 0wns j0
It looks slightly different from KIBUV.B (it says "StnyFtpd 0wns j0"
and is not on the right port)
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM%5FKIBUV%2EB&VSect=T
Is the description incomplete or thi