Result for 18B30A114F02FDEC07E0B6DB73B5DA9DCF8A6721

Query result

Key Value
FileNameusr/share/perl5/vendor_perl/IPTables/Parse.pm
FileSize44373
MD539ED30CF3355C168C9E485310C0E5C4D
SHA-118B30A114F02FDEC07E0B6DB73B5DA9DCF8A6721
SHA-256A77E2C339DE118F6B0123F8441212E1BC91B00177E5E9DE44C86CBB621B89933
SSDEEP768:okJt6rJsMdR4V5BryVJekdmoueaiP220yb8sROlvy4SltjyyYQjI/sCJXnyxxFwH:7QrJsMdR4XBryVJekdmoueaiP220yb8v
TLSHT17C13520969F7E16991B2F03E5BC95014E21E406B6E9EAE187CBCD1805FC0939D1F5FD8
tar:gnameroot
tar:unameroot
hashlookup:parent-total31
hashlookup:trust100

Network graph view

Parents (Total: 31)

The searched file hash is included in 31 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//x86_64//perl-iptables-parse-1.6.1-r3.apk
MD573BC5E7E26B3260475A53F1A67D640BE
SHA-1014A41E2811EC8C3FBD076DEC66B83F8F55F0AD0
SHA-256600FFFD80F6192EC88FF0A2FB7368DD618E9087DE7032CA9F26E270904E61605
SSDEEP192:WbUXvTWZFgtZZ0XkRl18p5ytLf1S7fYn1hy/ADCrCF40S7DdxDgmLPxzZizqo:izZep0Xktf1uN/7CFtS7Dd1JzZAt
TLSHT17C32C0489F830E82897740B4CF5449C865BE20ADF621282E7DE79B9DB53AC11E162DB0
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//x86//perl-iptables-parse-1.6.1-r3.apk
MD59B6F426C0D34A0A97F994B8D459E3C0A
SHA-111E313C993AF0EBC331282A840AB25536638B582
SHA-256642D788E304B32AE13E18A5F8349CA440A7295007B931A66783D377DD4A148DE
SSDEEP192:WRPCuOWZFgtZZ0XkRl18p5ytLf1S7fYn1hy/ADCrCF40S7DdxDgmLPxzZizqo:IqYZep0Xktf1uN/7CFtS7Dd1JzZAt
TLSHT12032CF4C9F831F8288B740B4CF654DD429BE20ADE610682F6DEB879DE227C50F122CB1
Key Value
MD51DE9FB13ED0C22D060A695D6BF5DE2CB
PackageArchnoarch
PackageDescriptionfwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. This ruleset allows network traffic that exhibits Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space. In addition, fwsnort (optionally) uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the specific iptables policy. After all, if iptables is blocking all inbound http traffic from external addresses, it is probably not of much use to try detecting inbound attacks against against tcp/80. By default fwsnort generates iptables rules that log Snort sid's with --log-prefix to klogd where the messages can be analyzed with a log watcher such as logwatch or psad (see http://www.cipherdyne.org/psad). fwsnort relies on the iptables string match extension to match Snort content fields in the application portion of ip traffic. Since Snort rules can contain hex data in content fields, fwsnort implements a patch against iptables-1.2.7a which adds a "--hex-string" option which will accept content fields such as "|0d0a5b52504c5d3030320d0a|". fwsnort bundles the latest rule set from Emerging Threats (http://www.emergingthreats.net) and also includes all rules from the Snort-2.3.3 IDS - the final Snort rule set that was released under the GPL. fwsnort is able to translate well over 60% of all bundled rules. For more information about the translation strategy as well as advantages/disadvantages of the method used by fwsnort to obtain intrusion detection data, see the README included with the fwsnort sources or browse to: http://www.cipherdyne.org/fwsnort/
PackageMaintainerumeabot <umeabot>
PackageNamefwsnort
PackageRelease2.mga7
PackageVersion1.6.8
SHA-11655E61088A6FEE30058894AE91221A1158B291A
SHA-256BECB99C34E49DE4A9031770B1DD09964E78B3DDA6FF1BCEC3FE851609E0BBBC1
Key Value
MD55C8D3102671D078AB81D45D31D3CB140
PackageArchnoarch
PackageDescriptionThe IPTables::Parse package provides an interface to parse iptables rules on Linux systems through the direct execution of iptables commands, or from parsing a file that contains an iptables policy listing. You can get the current policy applied to a table/chain, look for a specific user-defined chain, check for a default DROP policy, or determing whether or not logging rules exist.
PackageMaintainerFedora Project
PackageNameperl-IPTables-Parse
PackageRelease2.fc24
PackageVersion1.6.1
SHA-118E18D4710DA82666BF5E010496A64F551FD5D6C
SHA-25630E721C04EDF7FBB2E76AC61EA00327FFA17097A73D0D28DFF466DAA578FFCC3
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//x86_64//perl-iptables-parse-1.6.1-r3.apk
MD5057423784278A5202CD4A53710F9934A
SHA-1458DF2A0AF89555E916803873338B5A84929872E
SHA-256F676D9CBDA80341D5A881D3D360F6B52CE0582F121F83D29EF7E2AC2A531B0BB
SSDEEP192:WbT3LqLUTXRtZZ0XkRl18p5ytLf1S7fYn1hy/ADCrCF40S7DdxDgmLPxzZizqo:inqLURp0Xktf1uN/7CFtS7Dd1JzZAt
TLSHT13732CF045F930F81C8B384A5CF680DC9747E10ACF624A87E7DEB879DE526C15E621EB1
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//x86//perl-iptables-parse-1.6.1-r4.apk
MD532E43FCD0886134BE11541C1FAF331D9
SHA-14C2777FBCE9EACE2CFE2D9E16593602CCF39A349
SHA-2569F1A90FBFAC42245C7406660D6B15A8BC914CE1B6D45CB7CFD868DFE5641D7EA
SSDEEP192:WRrSKyrAFCv99UADPDB4g2Q3yw2bu+K+5LEHX5Go36/MJIh7LXLWD6ORMszzsVJs:IrSKUA0v99UADbB4nlpDNaX5x36/2w/a
TLSHT15032D0910FC8EAA99AD605E1BB00616ABDEDBBD2CB73D59F8160D1F656097D00E0A308
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//x86_64//perl-iptables-parse-1.6.1-r4.apk
MD5946DB98F7AE02E08456B2E6368AC2831
SHA-14D2CAD76E30F7353AC30B2142E02C5DAB8EAB6F4
SHA-25639EC559D7C86574934908394A31CBF7BE35E961BA495C6C5BFA5D845716C5534
SSDEEP192:WbgiaxCBZjEh7ScYiW72sGlx91EpwTqD37iu1ID38JarZFuHm6T+fSKgSVQ8kQu7:igia+FEFls7VGlx9cQqPiWaNwm35gS+L
TLSHT17132BF46E26B2FC4A0C68CA02DAD00142B4F23E8CB517171A3DB723A4F81175DEB6C17
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//riscv64//perl-iptables-parse-1.6.1-r4.apk
MD55AD9B09742060E462B9D53D9257971D2
SHA-1501CECCB15563E97AFB1314552521633204421C9
SHA-256B189BD5F2211B293C4296905F68C1F712F4A4B38ED5D0C4E616E779A1D6D67C5
SSDEEP192:Wvs99UADPDB4g2Q3yw2bu+K+5LEHX5Go36/MJIh7LXLWD6ORMszzsVJsxyND1LmJ:as99UADbB4nlpDNaX5x36/2w/XLMKs42
TLSHT1CA32BF910FC8E6A8D9D705E1EB00616AF9ECBAC6CF33D19B85A0E1F6564EBD00F09305
Key Value
FileNamehttp://dl-cdn.alpinelinux.org/alpine/latest-stable//community//armv7//perl-iptables-parse-1.6.1-r3.apk
MD57346EBFE3CB6602057ED1961E2BDD343
SHA-15A3C751E4BBCA94AB6ABE7C1D98604C663009E9A
SHA-25604FE27BEE505E53D2B50AE5CCE7FC0E5619E0ED0633B1CA631747DA132324F3C
SSDEEP192:WJowkAJhqLUTXRtZZ0XkRl18p5ytLf1S7fYn1hy/ADCrCF40S7DdxDgmLPxzZizt:AoXaqLURp0Xktf1uN/7CFtS7Dd1JzZAt
TLSHT15C32CF445E831F42C8B780A4CFA90DC9747F10ADE610B87E69FB87AEE117C16E661E70
Key Value
MD5BB90A342C993FE24DCD3DF0A34DEB4C3
PackageArchnoarch
PackageDescriptionfwsnort translates Snort rules into equivalent iptables rules and generates a Bourne shell script that implements the resulting iptables commands. This ruleset allows network traffic that exhibits Snort signatures to be logged and/or dropped by iptables directly without putting any interface into promiscuous mode or queuing packets from kernel to user space. In addition, fwsnort (optionally) uses the IPTables::Parse module to parse the iptables ruleset on the machine to determine which Snort rules are applicable to the specific iptables policy. After all, if iptables is blocking all inbound http traffic from external addresses, it is probably not of much use to try detecting inbound attacks against against tcp/80. By default fwsnort generates iptables rules that log Snort sid's with --log-prefix to klogd where the messages can be analyzed with a log watcher such as logwatch or psad (see http://www.cipherdyne.org/psad). fwsnort relies on the iptables string match extension to match Snort content fields in the application portion of ip traffic. Since Snort rules can contain hex data in content fields, fwsnort implements a patch against iptables-1.2.7a which adds a "--hex-string" option which will accept content fields such as "|0d0a5b52504c5d3030320d0a|". fwsnort bundles the latest rule set from Emerging Threats (http://www.emergingthreats.net) and also includes all rules from the Snort-2.3.3 IDS - the final Snort rule set that was released under the GPL. fwsnort is able to translate well over 60% of all bundled rules. For more information about the translation strategy as well as advantages/disadvantages of the method used by fwsnort to obtain intrusion detection data, see the README included with the fwsnort sources or browse to: http://www.cipherdyne.org/fwsnort/
PackageMaintainerumeabot <umeabot>
PackageNamefwsnort
PackageRelease3.mga8
PackageVersion1.6.8
SHA-16055C9674118F052108108A4B6632E6FC26EC88D
SHA-2563D2CE0F006EA20B263D464340859DF8EADDCE23AC5790FF1A18A21C20B9FAF39