Exploit the possiblities
Showing 1 - 25 of 33 RSS Feed

Files from Simple Nomad

Email addressthegnome at nmrc.org
First Active1999-08-17
Last Active2006-01-15
nmrc-14Jan2006.txt
Posted Jan 15, 2006
Authored by Simple Nomad | Site nmrc.org

This advisory documents an anomaly involving Microsoft's Wireless Network Connection. If a laptop connects to an ad-hoc network it can later start beaconing the ad-hoc network's SSID as its own ad-hoc network without the laptop owner's knowledge. This can allow an attacker to attach to the laptop as a prelude to further attack.

tags | advisory
MD5 | f839868422e9ffeb14223e1c4f5afe8e
icmpenum-1.1.1.tgz
Posted Oct 21, 2003
Authored by Simple Nomad | Site razor.bindview.com

This is a proof-of-concept tool to demonstrate possible distributed attacking concepts, such as sending packets from one workstation and sniffing the reply packets on another.

tags | denial of service
MD5 | 007b9032c081f6fef832762eec96be5e
ncpquery-1.3.tar.gz
Posted Oct 21, 2003
Authored by Simple Nomad | Site razor.bindview.com

NCPQuery is an open source tool that allows probing of a Novell Netware 5.0/5.1 server running IP. It uses TCP port 524 to enumerate objects with public read access, disclosing such information as account names, server services, and other various objects. A remote attacker can gather the equivalent information provided by the console command "display servers" and the DOS client command "cx /t /a /r" without authentication. Includes a Win32 port.

tags | remote, tcp
systems | windows
MD5 | 8f0ebc47aeb03c48c6970c78d3275d79
nmrcOS-v1.0.iso
Posted Aug 6, 2003
Authored by Simple Nomad, Inertia | Site nmrcos.nmrc.org

NMRC created this secured, Debian-based Linux distribution that has Openwall, HAP-Linux, Bastille, and many other patches and features included.

systems | linux, debian
MD5 | 4f24c61aff0e68d20009a47d93a3c14c
ncovert-1.1.tgz
Posted Aug 6, 2003
Authored by Simple Nomad | Site nmrc.org

NMRC covert channel using ISN to transmit data from one computer to another.

systems | unix
MD5 | 20f2269b9d920ddfe33c251d2ddde505
ncrypt-0.6.4.tgz
Posted Aug 6, 2003
Authored by Simple Nomad, Inertia | Site nmrc.org

NMRC symmetric file encryptor/decryptor/wiper that includes multiple crypto choices (Rijndael, Serpent, or Twofish) and multiple secure file wiping techniques.

tags | encryption, crypto
MD5 | df7f0bda78b0682f452ef0c53c1b3180
groupwise.disclosure.txt
Posted Aug 16, 2001
Authored by Simple Nomad | Site nmrc.org

NetWare Enterprise Web Server 5.1 has a couple security problems - When NDS browsing via the web server is enabled, if an attacker can reach that server's port 80 they can enumerate information such as user names, group names, and other system information. In addition, poor handling of GET commands will allow for GroupWise WebAccess servers to display indexes of the directories instead of HTML files.

tags | exploit, web
MD5 | 3b5768becf6d2f625d569d0330371237
Simple_Nomad.txt
Posted Mar 6, 2001
Authored by Simple Nomad

Packet Storm Contest Entry - Strategies for Defeating Distributed Attacks. (Text Format)

tags | paper
MD5 | 628a94c2b3abad1394a73826480b6873
adv_novellleak.txt
Posted Nov 14, 2000
Authored by Simple Nomad | Site razor.bindview.com

Object Enumeration in Novell Environments - Due to a combination of legacy support and default settings, Novell Netware servers using native IP will leak system information via TCP port 524 when properly queried. In mixed Novell/Microsoft environments, information regarding Microsoft devices is leaked via the Service Advertising Protocol (SAP) table. Third party products, such as those used to synchronize directory services between environments can further the problem. Essentially, a remote attacker can gather the equivalent information provided by the console command "display servers" and the DOS client command "cx /t /a /r" without authentication.

tags | remote, tcp, protocol
MD5 | ed52bf34d17e54095f1b53202c9dea03
ncpquery-1.2.tgz
Posted Nov 13, 2000
Authored by Simple Nomad | Site razor.bindview.com

NCPQuery is an open source tool that allows probing of a Novell Netware 5.0/5.1 server running IP. It uses TCP port 524 to enumerate objects with public read access, disclosing such information as account names, server services, and other various objects. A remote attacker can gather the equivalent information provided by the console command "display servers" and the DOS client command "cx /t /a /r" without authentication.

tags | remote, tcp
MD5 | 294c7dddb91d74f1e182b0d96273012c
despoof-0.9.tgz
Posted Jul 25, 2000
Authored by Simple Nomad | Site razor.bindview.com

Despoof is a utility that tries to determine if a received packet is in fact spoofed by checking the TTL. This command-line utility is intended for near real-time responding (such as being triggered from an IDS). The README explains it all. This utility is based on an idea by Donald McLachlan [don@mainframe.dgrc.crc.ca] (thanks Don!). Despoof runs on most Unix systems (tested on Linux, *BSDs), and requires libnet 1.0 and libpcap 0.4.

tags | spoof
systems | linux, unix
MD5 | 07f2ba923e414e86b0a7dd6aee21d5b6
razor.dvwssr.txt
Posted Apr 23, 2000
Authored by Simple Nomad | Site razor.bindview.com

BindView RAZOR Team Analysis of DVWSSR.DLL - The risks of having dvwssr.dll are not as severe as originally reported in media outlets Friday morning, but still severe enough that system administrators responsible for NT systems to investigate. The risks involve whether or not a certain DLL is loaded, how rights are set, and potentially how Front Page 98 is used.

tags | exploit
MD5 | 741bdf7a183e2d3d358a281a462d6d51
zombie-1.2.tgz
Posted Mar 30, 2000
Authored by Simple Nomad | Site razor.bindview.com

Zombie Zapper Unix version 1.2 - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: The new 1.2 version works against Trinoo (including the Windows Trinoo agent), TFN, Stacheldraht, and Shaft.
tags | denial of service
systems | unix
MD5 | 9363ce5dcef7c232049cb3939f7265b3
Project_ZombieZapper1.2.zip
Posted Mar 30, 2000
Authored by Simple Nomad | Site razor.bindview.com

Zombie Zapper v1.2 Windows NT Source Code - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: The new 1.2 version works against Trinoo (including the Windows Trinoo agent), TFN, Stacheldraht, and Shaft.
tags | denial of service
systems | windows, nt
MD5 | fb49214cec80694420e8e53705c8ea31
zombie-1.1.tar.gz
Posted Feb 29, 2000
Authored by Simple Nomad | Site razor.bindview.com

Zombie Zapper Unix version - Zombie Zapper [tm] is a free, open source tool that can tell a zombie system flooding packets to stop flooding. It works against Trinoo, TFN, and Stacheldraht. It does assume various defaults used by these attack tools are still in place, but allows you to put the zombies to sleep.

Changes: Supports the new Win trinoo trojan.
tags | denial of service
systems | unix
MD5 | 91bf249439b2af4d04cd3eafc8a082e8
razor.wintrinoo.txt
Posted Feb 29, 2000
Authored by Simple Nomad | Site razor.bindview.com

Razor has acquired a copy of the Windows Trojan Trinoo, the following is technical information gained from disassembling the binary.

tags | denial of service, trojan
systems | windows
MD5 | 2c3b11b28d6e18377678758fca03a8cd
tfn2kpass.c
Posted Feb 25, 2000
Authored by Simple Nomad | Site razor.bindview.com

Tfn2k password recovery tool - Tfn2k asks for a password during the build, which is used to prevent someone from recovering the password from the td or tfn binaries. Usefor for forensics, or to command a whole flood network to send you mail letting you know all the machines infected, or to command an attack to stop if you can recover a binary.

tags | denial of service
MD5 | 85a08d1006bc2666af3ae36a80775b53
md5-tool.tgz
Posted Feb 17, 2000
Authored by Simple Nomad | Site razor.bindview.com

If you have an md5 checksumming utility on your system, you can use these scripts for a "poor man's tripwire". These do several quick checks for archiving and security purposes.

tags | tool, intrusion detection
systems | unix
MD5 | 41f0416f00dfa37b2e904ad115bee208
icmpenum-1.1.tgz
Posted Feb 16, 2000
Authored by Simple Nomad | Site razor.bindview.com

This is a proof-of-concept tool to demonstrate possible distributed attacking concepts, such as sending packets from one workstation and sniffing the reply packets on another.

tags | denial of service
MD5 | 887a4b39a441342a46a392bddced1aaa
DDSA_Defense.htm
Posted Feb 16, 2000
Authored by Simple Nomad | Site razor.bindview.com

Distributed Denial of Service Defense Tactics - This paper details some practical strategies that can be used by system administrators to help protect themselves from distributed denial of service attacks as well as protect themselves from becoming unwitting attack nodes against other companies.

tags | denial of service
MD5 | e1f0aceb853031be5bb2d08b3d12c772
Simple_Nomad.doc
Posted Jan 21, 2000
Authored by Simple Nomad

Packet Storm Contest Entry - Strategies for Defeating Distributed Attacks.

tags | paper
MD5 | 234c8cd4cd88e8f102eb20c093490d72
pandora_linux_v4.0_b2.1.tgz
Posted Dec 2, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2.1 Netware Attack tool for Linux - Offline password auditing and Online attack for the X Windows platform on Linux. The Online software requires an IPX-aware kernel and root.

Changes: Jitsu-Disk finished moving the Pandora Linux code so that Pandora Linux uses libpcap and libnet. A number of problems have been corrected from the beta release on November 19th, including several problems involving spoofing and sniffing. Libnet helped Jitsu fix all that. We've updated the documentation, included all the code we used to do the builds, pre-compiled binaries, and wrapped it up in a nice big tarball for your hacking needs.
tags | kernel, root
systems | linux, windows
MD5 | ac9f165a580e9bc451e0e66b15064028
pan_linux_src_b2.tgz
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 Full Source Code for Linux.

systems | linux
MD5 | b489e501ec9bd46220b75aa3007db7c5
pan_docs_b2.zip
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

BETA - Documentation on using Pandora v4, with updated white papers, tips, and tricks. Included with the regular software, download this if you just wish to read the docs.

MD5 | c934738488a063a95e729af1a948b9e8
pan_src_b2.zip
Posted Nov 20, 1999
Authored by Simple Nomad | Site nmrc.org

Pandora v4 Beta 2 Full Source Code for Windows.

systems | windows
MD5 | 72932bc7430e83bdf72c421871121c46
Page 1 of 2
Back12Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    0 Files
  • 17
    Jan 17th
    0 Files
  • 18
    Jan 18th
    0 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close