what you don't know can hurt you
Showing 1 - 9 of 9 RSS Feed

Files from Yuri Gushin

Email addressyuri at ecl-labs.org
First Active2005-02-18
Last Active2007-05-03
yate-dos.txt
Posted May 3, 2007
Authored by Yuri Gushin

Yate version 1.1.0 suffers from a denial of service vulnerability due to a null pointer reference.

tags | advisory, denial of service
advisories | CVE-2007-1693
MD5 | c64818eba907977787a7e7d7c7602f00
Worminator-src.tgz
Posted Dec 6, 2006
Authored by Yuri Gushin

A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the source version.

tags | tool, worm, sniffer
systems | windows
MD5 | bdf32a59c2698f26abe112066a65967d
Worminator-bin.tgz
Posted Dec 6, 2006
Authored by Yuri Gushin

A Win32 tool for easing/automating the process of creating IDS/IPS signatures for SMTP based worms, providing a comfortable GUI, including raw base64 variants and Snort signatures support. This tarball is the binary executable version.

tags | tool, worm, sniffer
systems | windows
MD5 | 1d3642adf9dab516eb15d202c3fc7ba4
ecl-nf-snmpwn.c
Posted Jun 5, 2006
Authored by Yuri Gushin, Alex Behar

Netfilter NAT SNMP module denial of service exploit. This vulnerability has been patched in 2.6.16.18.

tags | exploit, denial of service
advisories | CVE-2006-2444
MD5 | a8f6cd28a3ea1fd281b07d5507f1f1a4
ecl-poly.tar.gz
Posted Aug 5, 2005
Authored by Yuri Gushin | Site ecl-labs.org

ecl-poly is an IA32 NOP sled generation engine featuring a truly recursive nature, 116 different NOPS, blacklisting per character/register, and much more.

tags | shellcode
MD5 | 310665bb2deb87c9ab413e9af5252702
ecl-poly.txt
Posted Aug 5, 2005
Authored by Yuri Gushin | Site ecl-labs.org

Whitepaper entitled 'NIDS Polymorphic Evasion - The End?'. This paper explains how even the most modern of NIDS fail to detect polymorphic shellcode.

tags | paper, shellcode
MD5 | 6a1d6208e9ab7f4d9bcdf484e04ef638
ecl-maxdb.c
Posted Jun 26, 2005
Authored by Yuri Gushin

MaxDB Webtools 7.5.00.24 % overflow that makes use of the POST method.

tags | exploit, overflow
MD5 | cfe55aa35f02e57988a8371eb0285ade
ecl-winipdos.c
Posted May 22, 2005
Authored by Yuri Gushin, Alex Behar

Proof of concept denial of service exploit for windows that takes advantage of an off-by-one validation error in the IP options field.

tags | exploit, denial of service, proof of concept
systems | windows
MD5 | 5604a878fbe7d738535cd90f3a34d11c
ecl-eximspa.c
Posted Feb 18, 2005
Authored by Yuri Gushin

Exim <= 4.4.3 exploit for the SPA authentication vulnerability. Takes advantage of the spa_base64_to_bits() call.

tags | exploit
MD5 | f69c4523245f9862570d6f589b1eeb95
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    2 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close