exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files from misteri0

First Active1999-08-17
Last Active2000-02-14
messala-1.8-unlg.tar.gz
Posted Feb 14, 2000
Authored by misteri0

Vulnerability scanner which scans for 97 CGI Vulns, 9 FTP Vulns, All known QPOP vulns, 7 Named vulns + prints out whichver the host is running on, 9 IMAP vulns, 24 mail vulns (sendmail, etc..), Checks if host suffers from tcp chorusing, Checks for vuln kernel, and 16 RPC vulns.

Changes: 4 new backdoor checks, y2k fix for cgi, Now checks if the host is running windows, and if so checks for windows vulnerabilities, added 4 new mail vulnerabilities, 2 FTP vulnerabilities, and 1 new webserver vulnerability.
tags | tool, kernel, cgi, scanner, tcp, imap
systems | unix
SHA-256 | b000d00fb44ca047c8e0d4cb82e7205be74f85030335a6ffd5e1ff85ced7838d
messala-1.7-Y2Kfix.tar.gz
Posted Jan 20, 2000
Authored by misteri0

Vulnerability scanner which scans for 97 CGI Vulns, 7 FTP Vulns, All known QPOP vulns, 7 Named vulns + prints out which ver the host is running on, 9 IMAP vulns, 20 mail vulns (sendmail, etc..), Checks if host suffers from tcp chorusing, Checks for vuln kernel, and 16 RPC vulns.

Changes: Y2K bug fixes, including problems with false positive results, multiple wu-ftp detections, and various other problems fixed.
tags | tool, kernel, cgi, scanner, tcp, imap
systems | unix
SHA-256 | c8757a42b21f15945f9cc3f81451d278b3d877cb3da833fc746681e32b203957
ovas0n.c
Posted Jan 10, 2000
Authored by misteri0

Opens a password protected backdoor and lets you execute commands, and then hides in the background. Based on gs.c.

tags | tool, rootkit
systems | unix
SHA-256 | 118f42a1b5e7124b4e829331a89a5b9f25e3c7b3cc532e337fd5d7b50f328bc9
DoS-Linux.tar.gz
Posted Jan 4, 2000
Authored by misteri0

Remote denial of service attack against linux kernel 2.2.7 - 2.2.9, in perl.

tags | remote, denial of service, kernel, perl
systems | linux
SHA-256 | ca4f3168b4556b5656aea0301813733aaa18edd7b2ddf602bb118a068d4fa223
messala-1.6-BETA.tar.gz
Posted Dec 21, 1999
Authored by misteri0

Vulnerability scanner which scans for 97 CGI Vulns, 7 FTP Vulns, All known QPOP vulns, 7 Named vulns + prints out which ver the host is running on, 9 IMAP vulns, 20 mail vulns (sendmail, etc..), Checks if host suffers from tcp chorusing, Checks for vuln kernel, and 16 RPC vulns.

Changes: Checks if host is running windows, and if so scans it for windows vulnerabilities. Also added 7 new vulnerability checks.
tags | tool, kernel, cgi, scanner, tcp, imap
systems | unix
SHA-256 | 524ba3cc988a0a0d2d4f2a6499c64300fd7bd084811424a56b0f73ea00336569
trash2.c
Posted Dec 16, 1999
Authored by misteri0

Denial of service attack against Windows98/95/2000/NT Machines. Sends random, spoofed ICMP/IGMP packets with random spoofed source addresses, resulting in the users machine freezing or CPU usage will shoot though the roof.

tags | denial of service, spoof
SHA-256 | 8b59e70738fabd2511fca7885ad38fbe690680de6962a4f3205f1a6864a4d568
messala-1.5-BETA.tar.gz
Posted Dec 10, 1999
Authored by misteri0

Vulnerability scanner which scans for 97 CGI Vulns, 7 FTP Vulns, All known QPOP vulns, 7 Named vulns + prints out which ver the host is running on, 9 IMAP vulns, 16 mail vulns (sendmail, etc..), Checks if host suffers from tcp chorusing, Checks for vuln kernel, and 16 RPC vulns.

tags | tool, kernel, cgi, scanner, tcp, imap
systems | unix
SHA-256 | 07ae0beafbd5b92a6d9676fff6a92186f56097f1dd7a29aa57d5426ba71ca0ad
wbscan.tar.gz
Posted Nov 4, 1999
Authored by misteri0

zipp0.c but enhanced to scan for wingates, just pile up all the bcast/wgates addys into one file and this program will check them for you and set them on another file.

tags | tool, scanner
systems | unix
SHA-256 | b22904b17b768f971aaaf243928550dc3f10f10e6525c8b68d8ef936284f2ca7
zipp0.c
Posted Nov 4, 1999
Authored by misteri0

Broadcast address list cleaner. Takes a list of broadcast addresses as input, pings them all, and returns the addresses that give multiple responses.

tags | tool, scanner
systems | unix
SHA-256 | 131a00118dcf7be4f10930890886f39a6273e53cded0713ac463504a863e07a1
pringles.c
Posted Nov 1, 1999
Authored by misteri0

Sends spoofed ICMP packets containing user specified strings. Can be used to exploit the +++ DOS bug in some modems, or for testing networks. Tested on redhat 6.0 k 2.2.5-15.

tags | denial of service, spoof
systems | linux, redhat
SHA-256 | b6c81717cbf20d290d24ae2303fd1d4ddc7638e5ec01ce8bb0b846862eebaa10
pr0tscan-release-1.tar.gz
Posted Oct 26, 1999
Authored by misteri0

pr0tscan was based on vetescan, but added more vulns and tried to make it run more smoother. Winscan, (scans win/nt systems for latest trojans/remote exploits). The docs include fixes for the vulnerabilities it finds.

tags | tool, remote, scanner, trojan, vulnerability
systems | unix
SHA-256 | 492897184ae35990598618bea3d466e9283d566f80648c61ea9254760a094c18
kpk-1.5.tar.gz
Posted Oct 19, 1999
Authored by misteri0

A combination of well known DoS attacks, including the new IGMP/STACK windows 98/2000 bug.

tags | denial of service
systems | windows
SHA-256 | eb60c7bbbe0fd56a3e85599a01322462c2fdd8a847f25d13e3946da9053d02bf
trash.c
Posted Oct 19, 1999
Authored by misteri0

Simple denial of service attack against Windows98/95/2000/NT Machines. Sends random, spoofed, ICMP packets with randomly choosen ICMP error codes. Result: Freezes the users machine or a CPU usage will rise to extreme lag. Tested on: 2.0.35, 2.2.5-15, 2.2.9, and 2.0.36.

tags | denial of service, spoof
SHA-256 | a34419b9c97a97e204d430651d4d366a08dfd341003378c9521826a77759a530
gatescan.c
Posted Aug 17, 1999
Authored by misteri0

gatescan.c is a class B/C Wingate scanner with several command line options. This version features a log-to-file option and code cleanup. Based on bong's gateprobe.c.

tags | tool, scanner
SHA-256 | 4a52954645f8f428f5330bd1290f7eb6eb1a38dc394012ef610370cf8b6ead30
gatescan20.c
Posted Aug 17, 1999
Authored by misteri0

gatescan20.c is a Wingate scanner with a builtin portscanner and logging options.

tags | tool, scanner
SHA-256 | 803cbdf97be7239ebc558b789a4b4b6e084f127b06f01292d835da1f79cede67
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close