exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files from Antirez

Email addressantirez at invece.org
First Active1999-08-17
Last Active2015-11-03
Redis Remote Command Execution
Posted Nov 3, 2015
Authored by Antirez | Site antirez.com

Redis has eloquently explained how it can be used for remote command execution if not securely configured to mitigate arbitrary access.

tags | exploit, remote, arbitrary, code execution
SHA-256 | 242d350f9f4267b8b7b3333e976644b434273c28d37e0fe9d940bc79a5df6408
hping3-alpha-2.tar.gz
Posted Jun 22, 2004
Authored by Antirez | Site hping.org

hping is a network tool designed to send custom ICMP/UDP/TCP packets and to display target replies like ping. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under all supported protocols. Using hping, you can test firewall rules, perform spoofed port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, transfer files (even with really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack. hping is very useful for learning TCP/IP.

Changes: Two new features for the command line interface.
tags | tool, remote, arbitrary, udp, scanner, spoof, tcp, protocol
systems | unix
SHA-256 | 044834e54a6341b1d44cee884a1fc256ee70528ea3f9c0a2248b9ce01171b091
hping3-alpha-1.tar.gz
Posted Jun 14, 2004
Authored by Antirez | Site hping.org

hping is a network tool designed to send custom ICMP/UDP/TCP packets and to display target replies like ping. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under all supported protocols. Using hping, you can test firewall rules, perform spoofed port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, transfer files (even with really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack. hping is very useful for learning TCP/IP.

Changes: Implements scripting capabilities that prior versions did not have. A new packet generation core that is much more powerful than the previous is available to the scripting capabilities.
tags | tool, remote, arbitrary, udp, scanner, spoof, tcp, protocol
systems | unix
SHA-256 | ad6af673780731623fa0bcf536b099380ab85aeb87330027f543332620370be7
hping2.0.0-rc3.tar.gz
Posted May 5, 2004
Authored by Antirez | Site hping.org

hping2 is a network tool designed to send custom ICMP/UDP/TCP packets and to display target replies like ping. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under all supported protocols. Using hping2, you can test firewall rules, perform spoofed port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, transfer files (even with really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack. hping2 is very useful for learning TCP/IP.

Changes: Added BSDi, MacOSX, WLAN, ATM, and Token Ring support. Added scan mode. Various bug fixes and feature enhancements.
tags | tool, remote, arbitrary, udp, scanner, spoof, tcp, protocol
systems | unix
SHA-256 | f59292de39b9a4010414bd120a494226399767148efa37278bd53d9613167964
hping2.0.0-rc1.tar.gz
Posted Aug 15, 2001
Authored by Antirez | Site hping.org

hping2 is a network tool designed to send custom ICMP/UDP/TCP packets and to display target replies like ping. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under all supported protocols. Using hping2, you can test firewall rules, perform spoofed port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, transfer files (even with really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack. hping2 is very useful for learning TCP/IP.

Changes: Major bugfixes, support for Solaris has been added, BSD port fixes, better interface handling, and random feature enhancements.
tags | tool, remote, arbitrary, udp, scanner, spoof, tcp, protocol
systems | unix
SHA-256 | 5ebd95f69b666490c776e24040bfe8b685881f280965911655abf8766dc7f5a1
hostexp.c
Posted Oct 28, 2000
Authored by Antirez | Site kyuzz.org

Older version of the host command contains a remotely exploitable buffer overflow. The host command is used to perform the AXFR request to obtain the zone transfer information, and can be caused to execute arbitrary code when connecting to a fake DNS server, a netcat process listening on port 53.

tags | exploit, overflow, arbitrary
SHA-256 | 39951d3f589829a119033d3606128b1ac7e7273f64901d487f9e72eb6efa1de7
11logger-0.1.3.tar.gz
Posted Oct 17, 2000
Authored by Antirez | Site kyuzz.org

11logger is a small kernel patch, a module and some userspace tools to add SIGSEGV logging and history capabilities to Linux 2.2.x. 11logger is very useful in security auditing and general debugging.

Changes: This release fixes a problem with the kernel patch which didn't unlock the spin lock in signal.c, and segvdump now reports more information on i386.
tags | kernel
systems | linux
SHA-256 | e374ca5391194d5bb5e96d4fafba1751d08411abc60584e65c0c4e7fa7ae14e2
11logger-0.1.2.tar.gz
Posted Oct 15, 2000
Authored by Antirez | Site kyuzz.org

11logger is a small kernel patch, a module and some userspace tools to add SIGSEGV logging and history capabilities to Linux 2.2.x. 11logger is very useful in security auditing and general debugging.

tags | kernel
systems | linux
SHA-256 | 16a2deda4d7f22cac71d863f6d93c04fc6abe8da405674697924aa3cc2d3ff4b
hping2-beta54.tar.gz
Posted Jul 7, 2000
Authored by Antirez | Site kyuzz.org

hping2 is a network tool which sends custom ICMP/UDP/TCP packets and displays target replies like ping does with ICMP replies. hping2 can handle fragmentation, arbitrary packet body and size and can be used in order to transfer files under any supported protocol. hping2 is useful for testing firewall rules, spoofed port scanning, testing network performance under different protocols, packet sizes, TOS, and fragmentation, path MTU discovery, file transfer even with really facist firewall rules, traceroute with different protocols, firewalk like usage, remote OS fingerprinting, TCP/IP stack auditing, and much more.

Changes: Raw IP mode, lots of bug fixes, added NetBSD support, added settable checksum, tcp sequence and ack are settable, bad checksum option, out of sequence packet counter, and documentation updates.
tags | tool, remote, arbitrary, udp, scanner, spoof, tcp, protocol
systems | unix
SHA-256 | b13bb23791aeed1de0424b28be4fef0947ceac2fd123cc3d4feaec3411a355e4
overwrite-0.4.tar.gz
Posted Apr 6, 2000
Authored by Antirez | Site kyuzz.org

Overwrite is a UNIX utility for secure deletion, based on Peter Gutmann's paper "secure deletion of data from magnetic and solid state memory" and was created in order to make harder the data recovery process. It implements a built-in cryptographic prng and try to flush the SO and HD cache when possible.

Changes: Support for *BSD and Solaris support, the ability to overwrite block and char devices, and some minor bugfixes.
systems | unix
SHA-256 | 645eb887739f8ca1576eabc9a29b0604513f6cd18eb5d6f84e29efc5d7e2849c
overwrite-0.3.tar.gz
Posted Feb 29, 2000
Authored by Antirez | Site kyuzz.org

Overwrite is a UNIX utility for secure deletion, based on Peter Gutmann's paper "secure deletion of data from magnetic and solid state memory" and was created in order to make harder the data recovery process. It implements a built-in cryptographic prng and try to flush the SO and HD cache when possible.

systems | unix
SHA-256 | 317dd9c2efa2cce08bad1439038b873e64867fd105051aefbccaa62a434c4006
hping2-beta53.tar.gz
Posted Nov 22, 1999
Authored by Antirez | Site kyuzz.org

Hping is a software to do TCP/IP stack auditing, to uncover firewall policy, to scan TCP port in a lot of different modes, to transfer files accross a firewall, test network performance, test of TOS is handled, etc.

Changes: Major bugs fixed and enhanced configure / Makefile.
tags | tool, scanner, tcp
systems | unix
SHA-256 | c19bda14665db021f54abe130046c9840e62b27b23c0ed336b2a606781558a42
hping2-beta52.tar.gz
Posted Nov 16, 1999
Authored by Antirez | Site kyuzz.org

Hping is a software to do TCP/IP stack auditing, to uncover firewall policy, to scan TCP port in a lot of different modes, to transfer files accross a firewall, test network performance, test of TOS is handled, etc.

tags | tool, scanner, tcp
systems | unix
SHA-256 | 42eba4cefee6cb7baf1f8c006e8b6590ca76092f8c03c8adfb52d6eebcb10ffc
hping066.tgz
Posted Aug 17, 1999
Authored by Antirez

hping v0.66 - Yet another excellent security tool! hping is a complex program that allows you to send customized pings to remote hosts, gathering raw fingerprint data, utilizing the concept of "tcp specific firewalks", and more. Get this one too!

tags | tool, remote, scanner, tcp
systems | unix
SHA-256 | 8f296f8b075b1dcee0993c280705b441b24193ae7780520a1c65ec8a929c2405
hping067.tgz
Posted Aug 17, 1999
Authored by Antirez

hping is a complex ping-based program that allows you to send customized pings to remote hosts, gathering raw fingerprint data, utilizing the concept of "tcp specific firewalks", and more. For Linux only. This is one of those "must have" tools. Get it!

tags | tool, remote, scanner, tcp
systems | linux, unix
SHA-256 | 25ab2f04e6a12638f9d9f32dc52a5e97cb96ec3f85dc0f9023df6dad4ff190f8
hping070-linux.tar.gz
Posted Aug 17, 1999
Authored by Antirez

hping is a complex ping-based program that allows you to send customized pings to remote hosts and networks, gathering raw fingerprint data, utilizing the concept of "tcp specific firewalks", and more. Linux libpcap based port. This is one of those "must have" tools. Get it!

tags | tool, remote, scanner, tcp
systems | linux, unix
SHA-256 | 8168683bf447720de3c4a5f1128180c742469e620c44447428e74944fe52f49b
hping070-solaris.tar.gz
Posted Aug 17, 1999
Authored by Antirez

hping is a complex ping-based program that allows you to send customized pings to remote hosts, gathering raw fingerprint data, utilizing the concept of "tcp specific firewalks", and more. This is one of those "must have" tools. Get it! Solaris libpcap based port.

tags | tool, remote, scanner, tcp
systems | unix, solaris
SHA-256 | 4aa3103bcbce9ae1709540e2f6eb422ab6b026250b547008aeab3db96aa2a81f
whois_rawcgi.txt
Posted Aug 17, 1999
Authored by Antirez

The whois_raw.cgi perl script included in all freeware versions of the cdomain package allows remote attacker to view/retrieve any system files, such as /etc/passwd, and to execute commands. Exploit descriptions included. No fix available (unless you buy the latest commercial version).

tags | exploit, remote, cgi, perl
SHA-256 | 6ed1a793045dc56df4418e0b293b2b3111c85a8ee6014137ee015cf366dd5294
redhat.6.0.dev.cdrom.perms.txt
Posted Aug 17, 1999
Authored by Antirez

Linux Red Hat 6.0 /dev/hd[abcd] CD-ROM permissions are world readable, along with several other /dev/* programs.

tags | exploit
systems | linux, redhat
SHA-256 | a884be6cde536943d8c314407f2b6072b18dbe437b5764347192074e4c21d967
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close