Linux :: Discontinued
Last Updated: 7/6/2013 11:19:34 PM

Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

Subsections of AOH's Linux Security Archive

Linux - Linux Apps A-M - Linux Apps N-Z - Red Hat/Fedora - Slackware - Debian - Mandriva/Mandrake - Gentoo - SuSE - Conectiva - Trustix - Ubuntu - Retro Linux

Caldera (discontinued)

8814 bytes. (2002)
buffer overflow in multiple DNS resolver libraries - Caldera Advisory CSSA-2002-034.0
Advisory   Linux  
4614 bytes. (2002)
CUPS buffer overflow when reading names of attributes - Caldera Advisory CSSA-2002-008.0
Advisory   Linux  
4040 bytes. (2002)
dhcpd dynamic DNS format string vulnerability - Caldera Advisory CSSA-2002-028.0
Advisory   Linux  
11089 bytes. (2002)
Double free in zlib (libz) vulnerability - Caldera Advisory CSSA-2002-015.0
Advisory   Linux  
4311 bytes. (2002)
fetchmail imap message count vulnerability - Caldera Advisory CSSA-2002-027.0
Advisory   Linux  
4029 bytes. (2002)
ftp vulnerability in squid - Caldera Advisory CSSA-2002-010.0
Advisory   Linux  
5828 bytes. (2002)
ghostscript arbitrary command execution - Caldera Advisory CSSA-2002-026.0
Advisory   Linux  
3031 bytes. (2002)
horde/imp cross scripting vulnerabilities - Caldera Advisory CSSA-2002-016.0
Advisory   Linux  
2933 bytes. (2002)
icecast buffer overflows and denial-of-service - Caldera Advisory CSSA-2002-020.0
Advisory   Linux  
4269 bytes. (2002)
imapd buffer overflow when fetching partial mailbox attributes - Caldera Advisory CSSA-2002-021.0
Advisory   Linux  
4542 bytes. (2002)
imlib processes untrusted images - Caldera Advisory CSSA-2002-019.0
Advisory   Linux  
3955 bytes. (2002)
LD_LIBRARY_PATH problem in KDE sessions - Caldera Advisory CSSA-2002-005.0
Advisory   Linux  
4427 bytes. (2002)
local off by one in cvsd - Caldera Advisory CSSA-2002-035.0
Advisory   Linux  
5602 bytes. (2002)
multiple vulnerabilities in openssl - Caldera Advisory CSSA-2002-033.0
Advisory   Linux  
2162 bytes. (2002)
Name Service Cache Daemon (nscd) advisory - Caldera Advisory CSSA-2002-013.0
Advisory   Linux  
8769 bytes. (2002)
OpenLDAP attribute deletion problem - Caldera Advisory CSSA-2002-001.0
Advisory   Linux  
4935 bytes. (2002)
OpenSSH channel code vulnerability - Caldera Advisory CSSA-2002-012.0
Advisory   Linux  
4705 bytes. (2002)
OpenSSH ticket and token passing buffer overflow - Caldera Advisory CSSA-2002-022.0
Advisory   Linux  
4041 bytes. (2002)
Race condition in fileutils (Revised) - Caldera Advisory CSSA-2002-018.1
Advisory   Linux  
3785 bytes. (2002)
Race condition in fileutils - Caldera Advisory CSSA-2002-018.0
Advisory   Linux  
8735 bytes. (2002)
Remote attack on rsync - Caldera Advisory CSSA-2002-003.0
Advisory   Linux  
8638 bytes. (2002)
Remote exploit against mutt - Caldera Advisory CSSA-2002-002.0
Advisory   Linux  
3476 bytes. (2002)
rsync supplementary groups vulnerability - Caldera Advisory CSSA-2002-014.0
Advisory   Linux  
2831 bytes. (2002)
squid compressed DNS answer message boundary failure - Caldera Advisory CSSA-2002-017.0
Advisory   Linux  
7132 bytes. (2002)
temporary file races in libmm - Caldera Advisory CSSA-2002-032.0
Advisory   Linux  
10254 bytes. (2002)
Various security problems in ucd-snmp (Revised) - Caldera Advisory CSSA-2002-004.1
Advisory   Linux  
8720 bytes. (2002)
Various security problems in ucd-snmp - Caldera Advisory CSSA-2002-004.0
Advisory   Linux  
8720 bytes. (2002)
Various security problems in ucd-snmp - Caldera Advisory CSSA-2002-004.0
Advisory   Linux  
11159 bytes. (2002)
X server allows access to any shared memory on the system - Caldera Advisory CSSA-2002-009.0
Advisory   Linux  

Linux - Miscellaneous and Obsolete

9149 bytes. by N. Dubee (2000)
LKM Hacking Made Easy
11437 bytes. (2002)
How to Makeshift Linux Network @ Home
Linux   Local Area Networks  
7312 bytes. (2002)
Understanding the Secure Linux Base
9302 bytes. (2002)
Linux CFS and encrypted swap HOWTO
5096 bytes. (2002)
Setting Up a Linux Transparent Firewall FIW:
6210 bytes. (2002)
The Linux Hacker's Intro to Assembly Language
326701 bytes. by K. Seifried (1999)
Linux Administrator's Security Guide 0.0.98
253814 bytes. by Pragmatic/THC (1999)
Hacking Linux LKMs (Loadable Kernel Modules) HAC:
103553 bytes. (2002) FAQ
Linux   Frequently Asked Questions  
28180 bytes. (2002)
SuSE Security FAQ
Linux   Frequently Asked Questions  
9267 bytes. by Lawless (2001)
Yet Another Paper on Trojaning the Linux Kernel
13721 bytes. by Vecna (2001)
Anti-Anti-Sniffer Patch
3043 bytes. (2000)
Ntop vulnerability
Advisory   Linux  
1270 bytes. (2000)
OpenLDAP hole
Advisory   Linux  
2228 bytes. (2000)
Linux usermode allows any user to shutdown, halt, reboot etc
Advisory   Linux  
662 bytes. (2000)
Flagship bad permissions
Advisory   Linux  
24787 bytes. (2000)
Format bugs (most unices)
Advisory   Unix  
6628 bytes. (2000)
Linux gpm advisory
Advisory   Linux  
2738 bytes. (2000)
Nasty Linux kernel arg bugs
Advisory   Linux  
245855 bytes. (1999)
(Nearly) Complete Linux Loadable Kernel Modules, definitive guide for hackers and virus writers, by THC
Hacking   Linux  
4646 bytes. (1998)
Dump a mode 111 binary in Linux
Hacking   Linux
1699 bytes.
FA-Q's Cecurity Ccanner - Scans system security
Hacking   Linux  
2072 bytes. (1998)
Hacking Linux
Hacking   Linux  
2856 bytes. (1999)
Linux shell users can send send out forged packets, even through firewalls!
Hacking   Linux  
5274 bytes. (1999)
Network based Linux 2.2 DoS Attack (up to 2.2.9) that results in a kernel panic.
Hacking   Linux  
4253 bytes.
Problem with mktemp()
Hacking   Linux  
1959 bytes.
Read first line of arbitrary files in Linux
Hacking   Linux  
4498 bytes. (1996)
Vulnerability in all known Linux distributions
Hacking   Linux  
7131 bytes. (1998)
Assembly drop in replacements for your favorite exploits. (x86 only)

1039 bytes. (1997)
Longpath annoyance
35418 bytes. (1998)
Linux Off-By-One Nestea DOS
Denial of Service   Linux  
33524 bytes. (1999)
The Beginners Guide to Linux v1.1
49465 bytes. (1998)
Another paper on Linux Security
Linux   Tutorial  
10498 bytes.
Linux - How to get it working
Linux   Tutorial  
5201 bytes. (1998)
Linux Info, Part 1. The Basics.
Linux   Tutorial  
3058 bytes. (1998)
Linux Info, Part 2. Closing ports, restricting telnet access, Firewall, PPP
Linux   Tutorial  
24147 bytes. (1999)
Linux Mini Administration How-To
Linux   Tutorial  
26150 bytes. (1999)
Linux Security by D4RKCYDE
Linux   Tutorial  
39078 bytes. (1998)
Linux for Dipshits: Understanding the Shell
Linux   Tutorial  
16009 bytes. (1999)
SecureLinux for Newbies 1.1
Linux   Tutorial  
4834 bytes.
Using Slackware 96 by The Grim Reaper

5166 bytes. (1999)
What Linux does, in Laymans Terms
Linux   Tutorial  
9839 bytes. by W. Stearns (1999)
Linux   Security Tool  
The ipfwadm2ipchains script is designed to convert ipfwadm rulesets into ipchains rulesets. Simply feed it your ipfwadm rules via stdin and it will print out the corresponding ipchains rules.
12718 bytes. by T.Kimball (2000)
ppp-in-telnet 1.0
Linux   Source Code   Utility  
pppit allows one to tunnel through a firewall which only allows proxy telnet, such as SWAN.
6183 bytes. by R. Jones (1998)
Audit Tool   Linux   Local Area Networks  
Tests to see if a host is in promiscuous mode. It works as follows: send out a ICMP echo request to the host in question, but wrap the echo request in a bogus ethernet packet. If the host is acting normally, it will ignore the bogus packet. If the host is listening to the network in promiscuous mode, then it will pick up the packet and push it up to the IP layer which will respond to the ping. This is obviously not foolproof, since you could modify your kernel to disallow responses to echo requests.
9444 bytes. by L. Bluesky
Audit Tool   Linux  
Scans machines for the BIND NXT vulnerability. Cdgxn-Secure is a Local Linux Security Auditing tool that scans for a number of different vulnerabilities a variety of ways. It will also help determine if you've been compomrised already.
3864 bytes. by D. Allen
Check 1.0
Audit Tool   Linux runs through all of the files and directories that it is given as arguments and determines the permissions. It then sends a list of "dangerous" files to stdout which can be redirected to a file. This program should be run as a regular user to check for writeable directories, suid, guid, and writeable files. Helps administrators sniff out files that have incorrect permissions.
9060 bytes. by Cancio, Cons, Iven (2000)
envcheck 1.3 LKM
Linux   Security Tool  
Envcheck is a Linux kernel module which detects and prevents exploitation of the recent glibc vulnerabilities by intercepting the execve system call and sanitising the enviroment passed. At the cost of a very small performance penalty, it has advantages over a glibc upgrade, including logging of exploit attempts, it works with statically linked binaries, it is transparent to applications that may be sensitive to a change of glibc, and it partially protects libc5.
4021 bytes. by P. Szuta (1999)
exec 1.0.4
Audit Tool   Linux  
exec.c is a Linux kernel module which logs all the commands executed on the system. Extremely powerful stealth logging made easy.
5211 bytes. by J. Murgo (1998)
Neped - Network Promiscuous Ethernet Detector 1.4
Audit Tool   Linux  
Neped is a promiscuous ethernet detector which detects linux boxes which may be running sniffers or similar applications.
3802 bytes. (1995)
IPL.C - Linux Packet Monitor
Audit Tool   Linux   Source Code  
5429 bytes. by M. Edulla
Linsniffer 0.3 - Powerful Linux Ethernet Sniffer
Audit Tool   Linux   Source Code  
20993 bytes. by Haggis (2003)
ProFTPD Remote Root exploit
Exploit   Linux  
a remote root, chroot-breaking brute-force exploit for the \n processing bug in ProFTPd 1.2.7 - 1.2.9rc2. It has been tested successfully on SuSE 8.0/8.1 & RedHat 7.2 and 8.0.
18040 bytes. by Bloodmask (1998)
NameScan 1.2 DNS Mapping System DNS:
Linux   Source Code
4027 bytes. by greg (2003)
ipfreeze v0.4.5
Linux   Security Tool  
Ipfreeze is a program that listens to the netlink device. It takes the source address from every incoming packet and adds it to a Netfilter "blacklist" chain. The address is removed from this chain after a user-definable period of time. This allows you to create rules that detect and halt certain odd behaviors, such as ports scans, syn floods, or connection attempts on forbidden ports. The attacker's IP address is blacklisted using the QUEUE target. There is also a whitelist where you can declare hosts that you never want to be blacklisted.

lol, wtf?
1 Whoa, bro... Access denied for user 'root'@'localhost' (using password: NO)

The bar is open!

The new 10,000 drink recipe archive has arrived!

It's back! TUCoPS Text Archive

System Security - General Information - Countersecurity Techniques - Password Security - Internet - Broken Security Apps - Browsers - Web - Web Servers - Apache - IIS - Sites - Web Apps - CMS, Portals - e-Commerce - Blogs - Wiki - Guestbooks - Adminware - PHP - Web Forums - Popular Web Forums - Networks - Wireless - Unix - HP/UX - SGI - BSD - SCO - SunOS/Solaris - Unix-like Platforms - Cisco - Oracle - VMWare - Citrix - Network Appliances - Macintosh - Apple(multi) - HP(multi) - IBM(multi) - Microsoft(multi) - Handhelds - Games - Linux - Linux Apps A-M - Linux Apps N-Z - Red Hat/Fedora - Slackware - Debian - Mandriva/Mandrake - Gentoo - SuSE - Conectiva - Trustix - Ubuntu - Retro Linux - Antique Systems - Dialup BBSes Windows Windows Apps Windows Network Vulns
Telecom Security - General Telecom Security - Phreak Boxes - Major Cellular Brands - Other Cellular Brands - Cellular Misc. - Number Lists - Caller ID - Public Phones - Voice Mail - Asterisk - Technical System Info
/etc - Hardware Hacks - Crypto - Malware - PC Hacks - Radio Hacks - Television Hacks - Scams - Physical Security - Espionage - Privacy - Wetware Hacks - Hacker Counterculture - The Law - Totally Miscellaneous

Hardware 99
Are you working with older hardware like us? If you're using the same equipment we are, you probably need service information complete with vacuum tube pinouts and daily coal requirements. This archive isn't quite that old but it is a definite help to anyone who has a PC that is not brand-new anymore. And it's free!

It's Back!
PC Game Sniper 2007
Thousands of cheats, hints, hacks and walkthroughs for PC Games!

Our parent site, THC BBS, has returned and brought a huge new text archive with it, containing over 61,000 recipes! And like everything at the AOH complex, it's free!

Security and Computing Freedom Archives

InfoSec News 2005
InfoSec News 2006
InfoSec News 2007
InfoSec News 2008
InfoSec News 2009

InfoSec News 2010

PoliTech 2005
PoliTech 2006
PoliTech 2007
PoliTech 2008
PoliTech 2009

Over 4,000 default passwords
Updated Oct.02,2011

Bored? Play some Games!

Text files by
The Fixer, El Oscuro
AOH Staff
and AOH Contributors
Phone Sounds
More Phone Sounds
The Fixer's Phreak Box Review
Box Review Handy Index!
Orange Boxing FAQ
Beating Caller ID FAQ
S.O.B. Orange Box
(NEW Version 1.94 2009)

More Caller ID Info
Phrack, Inc.!
Latest (final???) Issue: #63

Updated Nov.26/2006
More Payphone Info

Click here to get it!

It's Back! Check it out now!
New Site: Things I Shot!
Put your cell cam to good use!

The Web Page You Have Reached is now...
This is a Recording (formerly The Web Page You Have Reached)
And you thought we had a lot of telephone sounds!

Rancho Nevada - the biggest, baddest, best BBS game ever written!

easter egg #71

Site design & layout copyright © 1986-2015 THC