exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files from Nelson Brito

Email addressnbrito at sekure.org
First Active1999-12-28
Last Active2012-12-24
Exploit Next Generation SQL Fingerprint 1.42.24-102144
Posted Dec 24, 2012
Authored by Nelson Brito | Site code.google.com

The Exploit Next Generation® SQL Fingerprint tool uses a combination of crafted packets for SQL Server Resolution Protocol (SSRP) and Tabular Data Stream Protocol (TDS) (protocols natively used by Microsoft SQL Server) to accurately perform version fingerprinting and determine the exact Microsoft SQL Server version.

Changes: This is the Perl version.
tags | tool, scanner, protocol
systems | linux, unix
MD5 | 7ac2f517d29fa7dc463beb35bdcc3834
Exploit Next Generation SQL Fingerprint 1.12.120115/RC0
Posted Jan 16, 2012
Authored by Nelson Brito

The Exploit Next Generation® SQL Fingerprint tool uses well-known techniques based on several public tools capable of identifying the Microsoft SQL Server version (such as: SQLping and SQLver), but, instead of showing only the "raw version" (i.e., Microsoft SQL Version 10.00.2746), the Exploit Next Generation® SQL Fingerprint shows the mapped Microsoft SQL Server version (i.e., Microsoft SQL 2008 SP1 (CU5)).

tags | tool, scanner
systems | windows
MD5 | 6757930a2010359d3e06309e60bd4db4
Permutation Oriented Programming
Posted Jul 23, 2011
Authored by Nelson Brito | Site code.google.com

Permutation Oriented Programming (formerly known as Exploit Next Generation) introduces a different and powerful approach to IDS/IPS subversion. It can be applied to almost all vulnerabilities and targets the vulnerability triggers. Slides and various code examples are provided.

tags | paper, vulnerability
systems | linux
MD5 | 83f2424e1306ef46a677f1f0e5769736
T50 Sukhoi PAK FA Mixed Packet Injector 5.3
Posted Apr 25, 2011
Authored by Nelson Brito | Site fnstenv.blogspot.com

T50 Sukhoi PAK FA Mixed Packet Injector (f.k.a. F22 Raptor) is a tool designed to perform "Stress Testing". It is a powerful and an unique packet injection tool. The author has added in some anti-kiddo tricks.

Changes: New license (GPL 2.0), CIDR support added, eleven new protocols added, encapsulation, and more.
tags | tool, scanner
systems | unix
MD5 | 4007277faf119e86a1289fd31e301c90
T50 Sukhoi PAK FA Mixed Packet Injector 2.45r-H2HC
Posted Jan 11, 2011
Authored by Nelson Brito | Site fnstenv.blogspot.com

T50 Sukhoi PAK FA Mixed Packet Injector (f.k.a. F22 Raptor) is a tool designed to perform "Stress Testing". It is a powerful and an unique packet injection tool. The author has added in some anti-kiddo tricks.

tags | tool, scanner
systems | linux, unix
MD5 | eb9995a2116e6ba94b8d9b1eeee982d9
ENG_in_a_nutshell.pdf
Posted Oct 7, 2008
Authored by Nelson Brito

Exploit Creation - The Random Approach. A paper about using Encore Next Generation techniques to create exploits.

tags | paper
MD5 | dd9d916dd9cd088ebacdbac525cd7a78
eng-4.23-public.rar
Posted Sep 20, 2008
Authored by Nelson Brito

ENG, or Encore Next Generation, is a false-negative morphic tool that can bypass IDS/IPS via the randomization of return addresses, random writable addresses, junk code injection, and more.

tags | tool, intrusion detection
systems | unix
MD5 | 10f2c84adb27a488a0c5f1435b156cda
nng-4.13r-public.rar
Posted Sep 17, 2008
Authored by Nelson Brito

NNG is a tool that creates crafted packets to cause MS02-039 false-positives against IPS/IDS. NNG does not have the same approach used by Snot and Stick, where the main goal is DoSing the IPS. Instead, NNG tries to make IPS/IDS "numbed" enough to have the leakage of real attack.

tags | tool, intrusion detection
systems | unix
MD5 | 941a9a2a2f328b73989165de822527df
nb-isakmp.pl
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.pl is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. Perl version.

tags | exploit, remote, denial of service, perl, proof of concept
systems | windows
MD5 | f5af9905a00822bcb51cfbd06064da72
nb-isakmp.c
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.c is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. C version.

tags | exploit, remote, denial of service, proof of concept
systems | windows
MD5 | 690321d47ef04f0d314c84e8da296191
signatures.tgz
Posted Jul 31, 2000
Authored by Nelson Brito | Site stderr.sekure.org

Signatures.pl is a tool to check fingerprint signatures. Tested on Linux, all comments are in Portugese.

systems | linux, unix
MD5 | 03671c2a971f872dc25df3cb7548852e
farpce.pl
Posted Apr 19, 2000
Authored by Nelson Brito | Site stderr.sekure.org

farpce.pl - Force ARP Cache Entries. Force ARP Cache Entries Perl Script was designed to help System/Network administrators to prevent ARP Cache Poisoning / ARP spoofing. It's a simple and powerful perl script, based on forcehwaddr by John Goerzen.

tags | perl, spoof
systems | unix
MD5 | 5305288ebffd54ac3c8141ef9663fd35
nadas
Posted Dec 28, 1999
Authored by Nelson Brito

The Real Log Clean for Linux OS - Cleans logs under linux and tests the attributes in Ext2fs.

tags | system logging
systems | linux, unix
MD5 | dbd6606e2994ca3e4d84c89d8cee0ab9
Page 1 of 1
Back1Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close