Redis has eloquently explained how it can be used for remote command execution if not securely configured to mitigate arbitrary access.
242d350f9f4267b8b7b3333e976644b434273c28d37e0fe9d940bc79a5df6408
hping is a network tool designed to send custom ICMP/UDP/TCP packets and to display target replies like ping. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under all supported protocols. Using hping, you can test firewall rules, perform spoofed port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, transfer files (even with really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack. hping is very useful for learning TCP/IP.
044834e54a6341b1d44cee884a1fc256ee70528ea3f9c0a2248b9ce01171b091
hping is a network tool designed to send custom ICMP/UDP/TCP packets and to display target replies like ping. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under all supported protocols. Using hping, you can test firewall rules, perform spoofed port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, transfer files (even with really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack. hping is very useful for learning TCP/IP.
ad6af673780731623fa0bcf536b099380ab85aeb87330027f543332620370be7
hping2 is a network tool designed to send custom ICMP/UDP/TCP packets and to display target replies like ping. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under all supported protocols. Using hping2, you can test firewall rules, perform spoofed port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, transfer files (even with really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack. hping2 is very useful for learning TCP/IP.
f59292de39b9a4010414bd120a494226399767148efa37278bd53d9613167964
hping2 is a network tool designed to send custom ICMP/UDP/TCP packets and to display target replies like ping. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under all supported protocols. Using hping2, you can test firewall rules, perform spoofed port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, transfer files (even with really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack. hping2 is very useful for learning TCP/IP.
5ebd95f69b666490c776e24040bfe8b685881f280965911655abf8766dc7f5a1
Older version of the host command contains a remotely exploitable buffer overflow. The host command is used to perform the AXFR request to obtain the zone transfer information, and can be caused to execute arbitrary code when connecting to a fake DNS server, a netcat process listening on port 53.
39951d3f589829a119033d3606128b1ac7e7273f64901d487f9e72eb6efa1de7
11logger is a small kernel patch, a module and some userspace tools to add SIGSEGV logging and history capabilities to Linux 2.2.x. 11logger is very useful in security auditing and general debugging.
e374ca5391194d5bb5e96d4fafba1751d08411abc60584e65c0c4e7fa7ae14e2
11logger is a small kernel patch, a module and some userspace tools to add SIGSEGV logging and history capabilities to Linux 2.2.x. 11logger is very useful in security auditing and general debugging.
16a2deda4d7f22cac71d863f6d93c04fc6abe8da405674697924aa3cc2d3ff4b
hping2 is a network tool which sends custom ICMP/UDP/TCP packets and displays target replies like ping does with ICMP replies. hping2 can handle fragmentation, arbitrary packet body and size and can be used in order to transfer files under any supported protocol. hping2 is useful for testing firewall rules, spoofed port scanning, testing network performance under different protocols, packet sizes, TOS, and fragmentation, path MTU discovery, file transfer even with really facist firewall rules, traceroute with different protocols, firewalk like usage, remote OS fingerprinting, TCP/IP stack auditing, and much more.
b13bb23791aeed1de0424b28be4fef0947ceac2fd123cc3d4feaec3411a355e4
Overwrite is a UNIX utility for secure deletion, based on Peter Gutmann's paper "secure deletion of data from magnetic and solid state memory" and was created in order to make harder the data recovery process. It implements a built-in cryptographic prng and try to flush the SO and HD cache when possible.
645eb887739f8ca1576eabc9a29b0604513f6cd18eb5d6f84e29efc5d7e2849c
Overwrite is a UNIX utility for secure deletion, based on Peter Gutmann's paper "secure deletion of data from magnetic and solid state memory" and was created in order to make harder the data recovery process. It implements a built-in cryptographic prng and try to flush the SO and HD cache when possible.
317dd9c2efa2cce08bad1439038b873e64867fd105051aefbccaa62a434c4006
Hping is a software to do TCP/IP stack auditing, to uncover firewall policy, to scan TCP port in a lot of different modes, to transfer files accross a firewall, test network performance, test of TOS is handled, etc.
c19bda14665db021f54abe130046c9840e62b27b23c0ed336b2a606781558a42
Hping is a software to do TCP/IP stack auditing, to uncover firewall policy, to scan TCP port in a lot of different modes, to transfer files accross a firewall, test network performance, test of TOS is handled, etc.
42eba4cefee6cb7baf1f8c006e8b6590ca76092f8c03c8adfb52d6eebcb10ffc
hping v0.66 - Yet another excellent security tool! hping is a complex program that allows you to send customized pings to remote hosts, gathering raw fingerprint data, utilizing the concept of "tcp specific firewalks", and more. Get this one too!
8f296f8b075b1dcee0993c280705b441b24193ae7780520a1c65ec8a929c2405
hping is a complex ping-based program that allows you to send customized pings to remote hosts, gathering raw fingerprint data, utilizing the concept of "tcp specific firewalks", and more. For Linux only. This is one of those "must have" tools. Get it!
25ab2f04e6a12638f9d9f32dc52a5e97cb96ec3f85dc0f9023df6dad4ff190f8
hping is a complex ping-based program that allows you to send customized pings to remote hosts and networks, gathering raw fingerprint data, utilizing the concept of "tcp specific firewalks", and more. Linux libpcap based port. This is one of those "must have" tools. Get it!
8168683bf447720de3c4a5f1128180c742469e620c44447428e74944fe52f49b
hping is a complex ping-based program that allows you to send customized pings to remote hosts, gathering raw fingerprint data, utilizing the concept of "tcp specific firewalks", and more. This is one of those "must have" tools. Get it! Solaris libpcap based port.
4aa3103bcbce9ae1709540e2f6eb422ab6b026250b547008aeab3db96aa2a81f
The whois_raw.cgi perl script included in all freeware versions of the cdomain package allows remote attacker to view/retrieve any system files, such as /etc/passwd, and to execute commands. Exploit descriptions included. No fix available (unless you buy the latest commercial version).
6ed1a793045dc56df4418e0b293b2b3111c85a8ee6014137ee015cf366dd5294
Linux Red Hat 6.0 /dev/hd[abcd] CD-ROM permissions are world readable, along with several other /dev/* programs.
a884be6cde536943d8c314407f2b6072b18dbe437b5764347192074e4c21d967