exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from Ben-z

Email addressbentothez at phayze.com
First Active1999-08-17
Last Active2001-05-30
tyrone1.tgz
Posted May 30, 2001
Authored by Ben-z | Site og.chickenz.net

Tyrone is a difficult to trace DoS tool for Linux which uses Back Orifice servers.

tags | denial of service
systems | linux
SHA-256 | a681fc113a8a1846f8afc61b05d832a7392968c7ec8999f6404693bd5e02ebcc
smailx.sh
Posted Nov 30, 1999
Authored by Ben-z

remote root exploit for Smail-3.2 (rpmmail). A vulnerability exists in the rpmmail package distributed on the Red Hat 6.0 Extra Applications CD. The potential compromise for this bug could be remote or local root or simply remote command execution as "nobody" or similar, depending on your system configuration.

tags | exploit, remote, local, root
systems | linux, redhat
SHA-256 | 380aa4640a74c6d87378d77d01c5f3879de78c5d2ef92d148aed6914b118f849
vanilla.sh
Posted Aug 17, 1999
Authored by Ben-z

vanilla.sh is a simple tcp portscanning utility (ala strobe) for non-root users.

tags | tool, root, scanner, tcp
systems | unix
SHA-256 | df7ee633d00543af46c74fcd40d7f96b02a7e2f245e8e5befd8ca2ca928642b9
fts-rvscan.v1-b1.tgz
Posted Aug 17, 1999
Authored by Ben-z

rvscan v1b1 (remote vulnerability scanner) determines the remote operating system, then procedes to find common vulnerabilites. Checks for over 30 cgi scripts, and 15 exploits.

tags | tool, remote, cgi, scanner
systems | unix
SHA-256 | 260c1846c6792e67358e0f7156e244b150c96c2670848a488aeff188a0172607
fts-rvscan.v1-r1.tgz
Posted Aug 17, 1999
Authored by Ben-z

rvscan v1r1 (remote vulnerability scanner) determines the remote operating system, then procedes to find common vulnerabilites. New features: dual OS guessing [telnet banner grabbing + nmap OSScan], remote exploit checks [bind, imap, wuftpd, rpc.mountd, qpop, sendmail, iquery], multiple pop3 authentication, anonymous ftp services, httpd exploits [cold fusion, website pro, frontpage extensions, 52 vulnerable cgis], icmp echo filters, nfs exports, and over 10 sendmail holes.

tags | tool, remote, cgi, scanner, imap
systems | unix
SHA-256 | e44176c5b6ea2b5da009552a9f0f57757eef89b89be216afe4a110eddfff5648
fts-rvscan.v2-b3.tgz
Posted Aug 17, 1999
Authored by Ben-z

rvscan v2b3 (remote vulnerability scanner) determines the remote operating system, then procedes to find common vulnerabilites. New features: scans for more exploits, code optimizations.

tags | tool, remote, scanner
systems | unix
SHA-256 | 5e27f7767dfd2fa645716d31e4fd86aeabb8454b21e9d8663391eec5d2125612
tcplog
Posted Aug 17, 1999
Authored by Ben-z

Simple shell script that utilizes tcpdump to log all network traffic to /var/log/tcplog.

tags | shell, system logging
systems | unix
SHA-256 | 70d15b8c6211b38581e817cfaa17d53e03cc395c63950af2b9b91d18796ce192
lsekure.v1-alpha3.fts.tgz
Posted Aug 17, 1999
Authored by Ben-z

lsekure v1a3 (local [linux] security auditing tool) checks for several local security holes.

tags | local
systems | linux, unix
SHA-256 | 17c346dad73f0dd8dd1792d4d3e521a5e034b3227ff4ea63cee02bc80baae859
ng.sh
Posted Aug 17, 1999
Authored by Ben-z

ng.sh (netgaurd v1a1) uses tcpdump monitor for common attacks and then activates ipfwadm.

tags | tool, intrusion detection
systems | unix
SHA-256 | 6eec12f70551fb2ed4f635e522c8517f376c837a4ff7f81b587f7fb02a076cf3
fehmalfv1.tgz
Posted Aug 17, 1999
Authored by Ben-z

New Denial of Service suite that utilizes Back Orifice servers to launch very effective "spoofed" smurf-like attacks with malformed packets and a very impressive amplification ratio.

tags | exploit, denial of service, spoof
SHA-256 | f7734d4876141f17b8d3a8d7cb53270036699186d63d4f46c2f3eb2a40b3585b
fawx.c
Posted Aug 17, 1999
Authored by Ben-z

fawx.c is an igmp-8+frag attack for linux, similar to ssping.c, that sends oversized fragmented IGMP packets to a box either making it freeze (WinNT/9x), or lagging it to hell and back. Since most Win32 firewalls dont support IGMP, the attack successfully penetrates most systems, making it much more effective than an ICMP attack which is likely to be filtered. It has successfully crashed NT4.0+sp1+2, Win95, Win95 with ConSeal PC firewall blocking icmp, Win95 with McAfee PC firewall. It also passed undetected through ipfwadm and ipchains (useful for flooding).

tags | exploit
systems | linux, windows
SHA-256 | 3bceefae0c99f8589c025cb707a2813f18fb5385a697fd53eb3a30be6fce1021
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close