Security and Reverse Engineering Tools

GhostFace
 
 
 

Exploits

Debian OpenSSL Predictable PRNG Bruteforce SSH Exploit - More info here
Remote host key scanner for Debian SSH
Pre-generated keys 1024 bits
Pre-generated keys 2048 bits
MSSQL 7 SP1,SP2,SP3 DoS-exploit
 

Security and Admin

BIND 9.2.0 Administration Guide
BIND 8.3.4 Administration Guide
Basic Linux Tacacs Guide
Kryptera diskar i Linux med dmcrypt (Swedish)
Syslog to MySQL Guide/Tutorial (Swedish)
SSH tutorial
StackBasedOverflows-Windows-Part1.pdf
StackBasedOverflows-Windows-Part2.pdf
StackBasedOverflows-Windows-Part3.pdf
StackBasedOverflows-Windows-Part4.pdf
Exploiting And Defending Networks.pdf
Exploiting And Defending Web Applications.pdf
Host fingerprinting with hping
Amavisd-new presentation
OpenBSD PacketFilter (PF) guide
APC Netbotz OIDs for Environment Switches
 
Teso FormatStrings
General FormatStrings
 

Cisco

Essential IOS Featu res Every ISP Should Consider
BGP Tutorial by RIPE.
  Micheal Lynn's Cisco IOS presentation BH2005
 

Usefull tools

( Warning, always virusscan before unpacking )

Cracker's Kit 2.0 Reverse Engineering tools
Hacker's ToolKit 2005



Linux