:: ge.mine.nu ::
First they came for the child pornographers.
But I thought what they did was really evil, so I didn't speak up.
Then they came for the hackers.
But I never did anything illegal with my computer, so I didn't speak up.
Then they came for the filesharers.
I had enough money to buy every Software I wanted and thought that edonkey was slow anyway, so I didn't speak up.
Then they wanted to log everything on the Internet to catch terrorists.
I saw 9/11 on TV and hated those bastards, so I didn't speak up.
Then they came to search my harddrive through the Internet.
But I only kept tons of pr0n there, so I didn't speak up.
Then they came for the anonymity services.
But a lot of nasty stuff happens over tor nodes, so I didn't speak up.
Then they came for the encryption users.
But I could never figure out how to work PGP anyway, so I didn't speak up.
Then they came for me. And by that time there was no one left to speak up.
Here you can still download:
Arpsync is a tool for immunizing your local network against ARP spoofing.
It will read ARP entries from a local file and a central server (ftp,http,https,samba/windows share or arpsyncd) and make them static.
It is a tool to enhance the Layer-2 Security of your local network.
arpcheck checks /proc/net/arp for MAC/IP combinations and compares them to a static or dynamic MAC list.
If something does not fit, you'll get an alarm which will also be logged. You can also run custom scripts.
This is useful, if you're a router with multiple interfaces (e.g. WAN, LAN, DMZ) and want to check
if anyone from your clients is evil and does some arpspoofing (mitm) or changes his IP.
With this tool you can switch your w/lan config very fast;
It was mainly written to offer very special functions like automatic mac-changing and adding static arp entries,
which isn't possible with normal tools and startup scripts. It is intended to be used on an "unfriendly" network or in pentests :)
The following settings can be made in the config file:
- interface ip (eth0_ip=... or eth0_ip=random or eth0_ip=random#pre.fix)
- broadcast (eth0_broadcast=...)
- netmask (eth0_netmask=...)
- default gateway (defaultgate=...)
- dns server(s), you can specify multiple lines (dns=ip)
- mac address; complete, prefix or random (eth0_mac=aa:bb:cc:dd:ee:ff or eth0_mac=random or eth0_mac=random#pr:ef:ix)
- static arp entries to prevent arp spoofing attacks, you can specify multiple lines (static_arp=ip#mac)
- wlan ssid & wep key (eth0_ssid=ssid#key)
I wrote this to practise/test bash getopts and also because I didn't find any
rar cracker for linux when I wanted to check a file against a wordlist.
I know doing it this way is slow but I wanted a quick hack ;)
- wordlist checks
- brute-force checks (uses john as stdin)
- restore for brute-force
- statistical information during wordlist crack ([current try/tries left/total tries] [tries/s] [current runtime/expected total runtime])
- statistical information during brute-force ([current try] [tries/s])
- being slow ;)
lbd (load balancing detector) detects if a given domain uses DNS and/or HTTP Load-Balancing
(via Server: and Date: header and diffs between server answers).
This is useful for pentests and for curious people. ;)
If you want to see details about a name, check name-list.net
You will find name distribution worldwide, web popularity, web synthesis, name anagrams, etc.