Simple brute forcing utility to audit Cisco network devices.
401085ebf79d3df4a0fa20d1ad5e10d72692d708ae9f4977f598fece73242f47
Amap Version 4.0 is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!
2093ae53f387b8dfbd45483389d5031cf82dd14770bd294b48f87d7917b52210
The Hitchhiker's World Issue 7: Covert Channel and Tunneling over the HTTP protocol, Generic attacks against a honeypot, Innovative Mailbombs, New Beginnings, Technology without policy.
3c4bb0c48243e32d61174cb50c3253882eb3d7f5615d6df939802de15c17ffec
The Hitchhiker's World Issue 6: Shellcode : The assembly cocktail, Interview - Dan Verton, Applying steganography.
44ca03ac7c42be247785655fd267025aa6dc41cc553ed8ee8b21b1eb53504f38
The Hitchhiker's World Issue 5: An unwired Universe, Tales from the Void - assorted topics including race conditions and algorithms, safe security practises etc.
8a72b9c0133b4795344bc8556a4982a0030c31d4decd4b2bc3c5f5ca601dd4ab
The Hitchhiker's World Issue 4: Reviewing buffer overflow issues/concepts covered in Aleph One's seminal paper, Conclusion of "Advanced Meal - A keylogger in an API", Report on the forensics experiment.
394cc60c5406a5c4298bef738a6be77237f8f0304d005f15e31e248a1a992ee9
The Hitchhiker's World Issue 3: Keylogger in an API (Continued from #2), H/P/V - The Inc. story, Welcome to my world.
222901ce3fa1ea6d8a67ff80dfe02f2562101f68532a36aa9e0c978e5e4e1b80
The Hitchhiker's World Issue 2: Notes on Win32 programming, Keylogger in an API (Part #1).
b14b00ecbe106388135e2485324abe441bf8fb645734512698128c6f86ff1040
Insider v1.0 is a utility to set up a reverse backdoor for Win32 platforms that simply connects out to a server over HTTP and has the server tunnel commands back over the inbound connection.
e7cece4e645fed1621351c2637c92bedb0b538088336909aa2a135779cbbd731
Confirmation and further information regarding RPC attack vectors with Microsoft Windows.
d8522d29d9ba80a1c53f25e4a2e0cd28f9335ba6c03d7a01da14c21111376bab
Local root exploit for bru, or Backup and Restore Utility for Unix, that makes use of a stack overflow.
b98536c6e1a3e49c1d82ad082df3d8a82a78354fe1ccb3989ef8cca6e6886949