exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Plasmoid

Email addressplasmoid at thc.org
First Active1999-08-17
Last Active2004-09-04
ffp.pdf
Posted Sep 4, 2004
Authored by thc, Plasmoid | Site thc.org

Fuzzy Fingerprinting is a new technique to attack cryptographic key authentication protocols that rely on human verification of key fingerprints. This document covers the theoretical background and the generation of fuzzy fingerprints and also details on the implementation ffp [FFP] and its usage. Includes practical part with details on the implementation and the provided sample session using SSHarp.

tags | protocol
SHA-256 | 6e6d6a7063166a28c87b3797b06e03137cb09dd75b012ca7653ebff027aed6b5
yaotp-0.1.tar.gz
Posted Aug 13, 2004
Authored by thc, Plasmoid | Site thc.org

Yaotp (Yet Another One-Time Pad) implements the one-time pad cipher for en- and decryption of messages. It features real random number generation by audio sampling and hashing, key management that enforces one-time usage and irreproducible key destruction. It is the right choice for the totally paranoid geek and high-security issues beyond any imagination.

SHA-256 | f5d101e25e349399b37f97a876bfd29e59800c8dace4c42493f33574cd763767
ffp-0.0.8.tar.gz
Posted Oct 30, 2003
Authored by thc, Plasmoid | Site thc.org

THC-FuzzyFingerprint is a tool that generates fuzzy fingerprints as described in the corresponding paper, available here.. It generates very similar-looking fingerprints, an ideal extension to man-in-the-middle attacks against the SSH service. The current version supports RSA and DSA key generation and MD5 and SHA1 fingerprints. Due to the fact that fuzzy fingerprinting doesn't try to collide the fingerprints, good results can be achieved in reasonable time.

SHA-256 | 007e83348f95c354a45ebeda85f22b266151643fc53f80ccaa3bc7585009ce4a
slkm-1.0.html
Posted Dec 23, 1999
Authored by thc, Plasmoid | Site thc.org

Article from THC explaining the techniques behind the ksolaris kernel module, and helps you to develop your own solaris kernel modules.

tags | kernel
systems | solaris
SHA-256 | 523a74adb51f1f49d8003ba66d604653ea04038a4bbaff3610402554557bde7d
slkm-1.0.tar.gz
Posted Dec 22, 1999
Authored by thc, Plasmoid | Site thc.org

slkm-1.0.tar.gz is the first public solaris loadable kernel module backdoor from THC. Features File hiding, File content and directory hiding, Switch to toggle file content and directory hiding, Process hiding (structured proc), Promiscous flag hiding, Converting magic uid to root uid, and Execution redirecting.

tags | kernel, root
systems | solaris
SHA-256 | 17ee6bad714538c7e2f84e0c24b4520aec71d93c1ad872d769c659a16755d851
lpstat.x86.c
Posted Aug 17, 1999
Authored by Plasmoid

lpstat Exploit code for Solaris 2.6/2.7 X86 versions, resulting in local root compromise.

tags | exploit, x86, local, root
systems | solaris
SHA-256 | b4a5c4a3ef8e9b18f9d8d1fc2bc0e1ddaaf747d7e6ab6689b898a8f73c30be07
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close