exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Plasmoid

Email addressplasmoid at thc.org
First Active1999-08-17
Last Active2004-09-04
ffp.pdf
Posted Sep 4, 2004
Authored by thc, Plasmoid | Site thc.org

Fuzzy Fingerprinting is a new technique to attack cryptographic key authentication protocols that rely on human verification of key fingerprints. This document covers the theoretical background and the generation of fuzzy fingerprints and also details on the implementation ffp [FFP] and its usage. Includes practical part with details on the implementation and the provided sample session using SSHarp.

tags | protocol
SHA-256 | 6e6d6a7063166a28c87b3797b06e03137cb09dd75b012ca7653ebff027aed6b5
yaotp-0.1.tar.gz
Posted Aug 13, 2004
Authored by thc, Plasmoid | Site thc.org

Yaotp (Yet Another One-Time Pad) implements the one-time pad cipher for en- and decryption of messages. It features real random number generation by audio sampling and hashing, key management that enforces one-time usage and irreproducible key destruction. It is the right choice for the totally paranoid geek and high-security issues beyond any imagination.

SHA-256 | f5d101e25e349399b37f97a876bfd29e59800c8dace4c42493f33574cd763767
ffp-0.0.8.tar.gz
Posted Oct 30, 2003
Authored by thc, Plasmoid | Site thc.org

THC-FuzzyFingerprint is a tool that generates fuzzy fingerprints as described in the corresponding paper, available here.. It generates very similar-looking fingerprints, an ideal extension to man-in-the-middle attacks against the SSH service. The current version supports RSA and DSA key generation and MD5 and SHA1 fingerprints. Due to the fact that fuzzy fingerprinting doesn't try to collide the fingerprints, good results can be achieved in reasonable time.

SHA-256 | 007e83348f95c354a45ebeda85f22b266151643fc53f80ccaa3bc7585009ce4a
slkm-1.0.html
Posted Dec 23, 1999
Authored by thc, Plasmoid | Site thc.org

Article from THC explaining the techniques behind the ksolaris kernel module, and helps you to develop your own solaris kernel modules.

tags | kernel
systems | solaris
SHA-256 | 523a74adb51f1f49d8003ba66d604653ea04038a4bbaff3610402554557bde7d
slkm-1.0.tar.gz
Posted Dec 22, 1999
Authored by thc, Plasmoid | Site thc.org

slkm-1.0.tar.gz is the first public solaris loadable kernel module backdoor from THC. Features File hiding, File content and directory hiding, Switch to toggle file content and directory hiding, Process hiding (structured proc), Promiscous flag hiding, Converting magic uid to root uid, and Execution redirecting.

tags | kernel, root
systems | solaris
SHA-256 | 17ee6bad714538c7e2f84e0c24b4520aec71d93c1ad872d769c659a16755d851
lpstat.x86.c
Posted Aug 17, 1999
Authored by Plasmoid

lpstat Exploit code for Solaris 2.6/2.7 X86 versions, resulting in local root compromise.

tags | exploit, x86, local, root
systems | solaris
SHA-256 | b4a5c4a3ef8e9b18f9d8d1fc2bc0e1ddaaf747d7e6ab6689b898a8f73c30be07
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close