what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2003-07-22 to 2003-07-23

simple.pl
Posted Jul 22, 2003
Authored by Fugi

Simple brute forcing utility to audit Cisco network devices.

systems | cisco
SHA-256 | 401085ebf79d3df4a0fa20d1ad5e10d72692d708ae9f4977f598fece73242f47
amap-4.0.tar.gz
Posted Jul 22, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap Version 4.0 is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Rewritten from scratch to enhance speed and reliability. There are also new features, better documentation, and various other bug fixes.
tags | tool, protocol
SHA-256 | 2093ae53f387b8dfbd45483389d5031cf82dd14770bd294b48f87d7917b52210
hh7.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 7: Covert Channel and Tunneling over the HTTP protocol, Generic attacks against a honeypot, Innovative Mailbombs, New Beginnings, Technology without policy.

tags | web, protocol
SHA-256 | 3c4bb0c48243e32d61174cb50c3253882eb3d7f5615d6df939802de15c17ffec
hh6.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 6: Shellcode : The assembly cocktail, Interview - Dan Verton, Applying steganography.

tags | shellcode
SHA-256 | 44ca03ac7c42be247785655fd267025aa6dc41cc553ed8ee8b21b1eb53504f38
hh5.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 5: An unwired Universe, Tales from the Void - assorted topics including race conditions and algorithms, safe security practises etc.

SHA-256 | 8a72b9c0133b4795344bc8556a4982a0030c31d4decd4b2bc3c5f5ca601dd4ab
hh4.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 4: Reviewing buffer overflow issues/concepts covered in Aleph One's seminal paper, Conclusion of "Advanced Meal - A keylogger in an API", Report on the forensics experiment.

tags | overflow
SHA-256 | 394cc60c5406a5c4298bef738a6be77237f8f0304d005f15e31e248a1a992ee9
hh3.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 3: Keylogger in an API (Continued from #2), H/P/V - The Inc. story, Welcome to my world.

SHA-256 | 222901ce3fa1ea6d8a67ff80dfe02f2562101f68532a36aa9e0c978e5e4e1b80
hh2.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 2: Notes on Win32 programming, Keylogger in an API (Part #1).

systems | windows
SHA-256 | b14b00ecbe106388135e2485324abe441bf8fb645734512698128c6f86ff1040
insider.zip
Posted Jul 22, 2003
Authored by Nick Snickers | Site www15.brinkster.com

Insider v1.0 is a utility to set up a reverse backdoor for Win32 platforms that simply connects out to a server over HTTP and has the server tunnel commands back over the inbound connection.

tags | web
systems | windows
SHA-256 | e7cece4e645fed1621351c2637c92bedb0b538088336909aa2a135779cbbd731
lsdRPC.txt
Posted Jul 22, 2003
Authored by The Last Stage of Delirium | Site lsd-pl.net

Confirmation and further information regarding RPC attack vectors with Microsoft Windows.

tags | advisory
systems | windows
SHA-256 | d8522d29d9ba80a1c53f25e4a2e0cd28f9335ba6c03d7a01da14c21111376bab
0x333bru-fmtx.c
Posted Jul 22, 2003
Authored by nic | Site 0x333.org

Local root exploit for bru, or Backup and Restore Utility for Unix, that makes use of a stack overflow.

tags | exploit, overflow, local, root
systems | unix
SHA-256 | b98536c6e1a3e49c1d82ad082df3d8a82a78354fe1ccb3989ef8cca6e6886949
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close