what you don't know can hurt you
Showing 1 - 13 of 13 RSS Feed

Files from Missinglnk

Email addressmissnglnk at tribune.intranova.net
First Active1999-12-15
Last Active2000-03-30
drop.large-icmp.patch
Posted Mar 30, 2000
Authored by Missinglnk | Site tribune.intranova.net

Unofficial FreeBSD patch to drop all ICMP packets with a size greater than 8,184 bytes.

tags | patch
systems | unix, freebsd
MD5 | f111f72b4f01381e69217e20437715b5
unused.bit.patch
Posted Mar 30, 2000
Authored by Missinglnk | Site tribune.intranova.net

Unofficial FreeBSD patchfile with recommended unused bit attack patch from LigerTeam.

tags | patch
systems | unix, freebsd
MD5 | 401002998b43e2c23e187474a6fbc1c2
drop.zero.patch
Posted Mar 30, 2000
Authored by Missinglnk | Site tribune.intranova.net

Unofficial FreeBSD patch to drop all TCP packets with a sequence and/or acknowledgement number of 0.

tags | tcp, patch
systems | unix, freebsd
MD5 | 091c888e1b56cc86fc91d4b9c169dbf5
findfixed.pl
Posted Mar 20, 2000
Authored by Missinglnk | Site tribune.intranova.net

Findfixed.pl searches through C code looking for fixed-length buffers.

systems | unix
MD5 | 096633752567c7e7fe3a64eb01bc67bc
spurf.c
Posted Feb 23, 2000
Authored by Missinglnk | Site tribune.intranova.net

A little mail-like 'smurf' that uses mail relays instead of broadcasts.

tags | denial of service
MD5 | b975a0cc65490275ea22d74d13d4581e
trypop3.c
Posted Feb 23, 2000
Authored by Missinglnk | Site tribune.intranova.net

Some code I put together to do some testing on the POP3 daemons on some machines installed at work. Attempts to overflow user/password variables.

tags | overflow
systems | unix
MD5 | 1eed4e6879bc0653eaa3935f370ec9aa
qpop-exploit-net.c
Posted Jan 28, 2000
Authored by Missinglnk | Site tribune.intranova.net

A modified version of the original qpopper 3.0beta29 exploit by Zhodiac, added network support (no need for netcat) and allowed the user to specify which command to execute.

tags | exploit
MD5 | 82ad9b1f522d4dae7383117047b5f5bc
portchk.c
Posted Jan 11, 2000
Authored by Missinglnk | Site tribune.intranova.net

Simple port checker that either takes command-line input or file input and checks each host if a given port is open.

tags | tool, scanner
systems | unix
MD5 | 205c235c03921ce3762f8a5922c406d1
plusmail.c
Posted Jan 11, 2000
Authored by Missinglnk | Site tribune.intranova.net

PlusMail CGI remote exploit - This posts the form to the victim, reads the data, binds to a port on the local machine, then you open up a browser and go to http://localhost:4040.

tags | exploit, remote, web, local, cgi
MD5 | a1ec357f52d486a5e4e29c45c2897ace
getwksinfo.exe
Posted Jan 11, 2000
Authored by Missinglnk | Site tribune.intranova.net

Getwksinfo is a little program coded for Windows 95/98/NT/2000 that gets the parameters of a remote Windows NT server, parameters include NetBIOS name, NetBIOS domain/workgroup, amount of users currently logged in, and remote operating system version.

tags | remote
systems | windows, 9x, nt
MD5 | 8d0c2ceb3d5086baac6b4dbd29ecfdb8
identd-fetch.c
Posted Jan 7, 2000
Authored by Missinglnk | Site tribune.intranova.net

Daemon that sits on a port and waits for a connection, once found, it sends an ident request. Demonstrates use of syslogd functions and fork().

systems | unix
MD5 | 2afd19aa4b6b98b9162f59a4da77a553
surgery-0.1.tar.gz
Posted Jan 7, 2000
Authored by Missinglnk | Site tribune.intranova.net

Surgery is a CGI-based UTMP modifier/cleaner.

tags | cgi
systems | unix
MD5 | 84b9dc3a2a94d0301634d77fb81909f5
tryX.c
Posted Dec 15, 1999
Authored by Missinglnk | Site tribune.intranova.net

Some testing code I put together to try on a friend's old machine, it essentially tries to overflow the DISPLAY variable in X-based programs.

tags | exploit, overflow
MD5 | e6fb94763ff962662aebf8b4045e42bf
Page 1 of 1
Back1Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close