what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files from Robin Keir

Email addressrobin.keir at foundstone.com
First Active1999-09-24
Last Active2002-09-11
FS-091002-SVWS
Posted Sep 11, 2002
Authored by Robin Keir | Site foundstone.com

Foundstone Security Advisory FS-091002-SVWS - A buffer overflow exists in versions 3.1 and previous of Savant Web Server. Exploitation of this vulnerability allows remote execution of arbitrary code with daemon privileges. Sending a GET request containing a URL of approximately 291 characters or more causes Savant Web Server to crash. Exploitation is possible and proof of concept code has been authored to demonstrate this problem.

tags | remote, web, overflow, arbitrary, proof of concept
SHA-256 | 70f37fc074e30ee6045d809d83b646df568badcf9e022b3ef37bb31966b9d22c
snscan.zip
Posted Feb 19, 2002
Authored by Robin Keir | Site foundstone.com

SNScan v1.04 is a Windows GUI SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network. This utility can effectively indicate devices that are potentially vulnerable to SNMP related security threats. SNScan allows for the scanning of SNMP specific ports (e.g. UDP 161, 193, 391 and 1993) and the use of standard (i.e. "public") and non-standard (i.e. user-defined) SNMP community names. User defined community names may be used to more effectively evaluate the presence of SNMP enabled devices in more complex networks.

tags | udp
systems | windows
SHA-256 | 25db527b88761f7b1fe8253afd030667ba1828c7602d33bfc118f16416509e9a
udpflood.zip
Posted Dec 15, 2000
Authored by Robin Keir | Site foundstone.com

UDPFlood v2.0 is a UDP packet sender. It sends out UDP packets to the specfied IP and port at a controllable rate. Packets can be made from a typed text string, a given number of random bytes or data from a file. This program was written to stress test game servers where I work. It proved to be especially useful for bullet-proofing the packet receiving code, making sure it could deal with various combinations of formatted and random data.

tags | denial of service, udp
SHA-256 | 4b7ae9a55e88c36ba84ba2aa2fa3321494b17e84ce127a199df2a3a8ef60d764
trout.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

Trout v2.0 is a visual (i.e. GUI as opposed to command-line) traceroute and Whois program. Pinging can be set at a controllable rate as can the frequency of repeatedly scanning the selected host. The built-in simple Whois lookup can be used to identify hosts discovered along the route to the destination computer. Parallel pinging and hostname lookup techniques make this traceroute program perhaps the fastest currently available.

SHA-256 | a9a707eed5f6c64b0c4510a6c2acc3c72c62491acd8823b26b64bbf1a8a50df9
superscan.exe
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

SuperScan v3.0 - SuperScan is a powerful connect-based TCP port scanner, pinger and hostname resolver. Multithreaded and asynchronous techniques make this program extremely fast and versatile.

tags | tcp
SHA-256 | a4df0e59a28d75e143117051a04d52f4a61a9ea7b23c41ad51a3a829cad62b58
ddosping.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

DDoSPing v2.0 is a Win 9x/NT GUI scanner for the DDoS agents Wintrinoo, Trinoo, Stacheldraht and TFN.

tags | denial of service
SHA-256 | 57e4cd81c86b8688f78c15c437701b1ad27ae8e1d7f7f442aaa71aca2ec3d421
boping.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

BOPing is a network scanner for the infamous Back Orifice trojan. It is many times faster than the ping sweeper built in to the original client program. This is intended as a vigilante tool to notify victims who unknowingly have the trojan on their system. It includes the ability to notify detected victims by sending them a BO message box message directly from within the program.

tags | trojan
SHA-256 | 1e5f64dd410ef6765183eaf15f87fed4f26d1952d8389f363cf6f9479d1b4274
patchit.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

Patchit v2.0 is a file byte-patching utility. This is driven by a simple scripting language. It can patch sequences of bytes in any file, search for byte patterns (with wildcards) and also extract and utilize DLL exported function addresses as source positions in files to be patched.

SHA-256 | 519813ce0cd53d0202964737cc201c22426b6813ed26d46a1e07e85708c1a151
bintext.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

BinText v3.0 is a small and fast text extractor that will be of particular interest to programmers. It can extract text from any kind of file and includes the ability to find plain ASCII text, Unicode (double byte ANSI) text and Resource strings, providing useful information for each item in the optional "advanced" view mode. It's comprehensive filtering helps prevent unwanted text being listed. The gathered list can be searched and saved to a separate file as either a plain text file or in informative tabular format.

SHA-256 | 7842378df02ffb07486a2858620214aac559627bdbbe6fd9b1016c79c3263fad
showin.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

Showin is a utility which can display hidden password editbox fields (text behind the asterisks *****). This will work in many programs although Microsoft have changed the way things work in some of their applications, most notably MS Office products and Windows 2000. ShoWin will not work in these cases. Neither will it work for password entry boxes on web pages, at least with most web browsers.

tags | web
systems | windows
SHA-256 | ab0aa66b96b80e917509ca0e95fd64b18e178eaa2829969b1c68d1d643ed2275
filewatch.zip
Posted Dec 13, 2000
Authored by Robin Keir | Site foundstone.com

FileWatch v1.0 is a file change monitor. FileWatch (originally called ICEWatch 1.x) is a small utility that can monitor a given file for changes. Monitoring can detect file size changes or simply file writes, both with minimal impact on system resources (no polling is performed). The primary use of this utility is for monitoring changes in the log file of a personal firewall program and being able to spawn a separate application when changes are detected, but the tool can be applied to any number of other uses.

SHA-256 | 36d4ecbff2288777330ce9694cc1b2c2eaeb922eab01c891f24c721eb3376c29
FS-072600-8-ANA.txt
Posted Jul 27, 2000
Authored by Robin Keir | Site foundstone.com

Foundstone Security Advisory - AnalogX SimpleServer:WWW v1.06 and below is vulnerable to a "relative directory path" attack that allows a remote user to retrieve any known file one the the server.

tags | exploit, remote
SHA-256 | 2aa7701a5bbde76d87bd4d641b145632b1ca55e9080324df5aad27644489f2c1
FS-072500-7-ANA.txt
Posted Jul 25, 2000
Authored by Robin Keir | Site foundstone.com

Foundstone Security Advisory - AnalogX Proxy v4.04 contains multiple buffer overflows. Includes several proof of concept denial of service examples.

tags | exploit, denial of service, overflow, proof of concept
SHA-256 | ecf9025d8fb2c5b91e285bf9f4839c34b7b4005d1ba80cb67d41d7edd59381de
superscan.zip
Posted Sep 24, 1999
Authored by Robin Keir

Super Scan 2.03. Finally, a windows based port scanner which deserves its name, multi-threaded, fast as lightning with NO Windows TCP/Stack memory problems.

tags | tcp
systems | windows
SHA-256 | 2d2808f6200ba66cc80fcb5626f8013ce0244986f42f3fa86fd52a516ddced35
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close