what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Steffen Wendzel

Real NameSteffen Wendzel
Email addressprivate
Websitewww.wendzel.de
First Active2003-12-06
Last Active2008-05-01
View User Profile

Personal Background

My website: http://www.wendzel.de


astrocam-xss.txt
Posted May 1, 2008
Authored by Steffen Wendzel | Site wendzel.de

AstroCam versions 2.5.0 through 2.7.3 suffer from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | f0d70dc471b487e095c1c1b658f70d9feacc28f774495582874721a4dffe478d
phcct-0.1.tgz
Posted Nov 14, 2007
Authored by Steffen Wendzel | Site wendzel.de

phcct (protocol hopping covert channel tool) is a tiny and basic proof of concept implementation of a protocol hopping covert channel.

tags | protocol, proof of concept
systems | unix
SHA-256 | fa2070ea1a9984526ed0db20a7b0bcaa4c0c972d18a7c5e8f3f227e8d2ac4866
protocolhopping.txt
Posted Nov 14, 2007
Authored by Steffen Wendzel | Site wendzel.de

Whitepaper titled Protocol Hopping Covert Channels - Protocol Hopping Covert Channels (PHCC) are a way to realize covert channels that switch between different protocols while a covert channel is established. PHCCs even can use a randomized protocol order and a mixed packet order to transfer packets what makes them hard to detect.

tags | paper, protocol
SHA-256 | 5e860930cb5e0a371339c0311a86cb658c505870ba95e5089106907f07b049f8
vstt-0.5.0.tgz
Posted Oct 10, 2006
Authored by Steffen Wendzel | Site wendzel.de

VSTT is a multi-protocol tunneling tool. It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP3, and ICMP tunneling.

tags | tool, tcp, protocol
systems | unix
SHA-256 | 906cf187f8625fe4338d2fff5566de082b124c6eb209039b666449da2d70187f
fupids2-0.8.5.tgz
Posted Feb 16, 2006
Authored by Steffen Wendzel

fupids2 is a so-called human oriented IDS based on the FUPIDS project. fupids2 calculates an attacker level for every user on all Unix/Linux/BSD systems in the network. It looks at the behavior of the user (the programs the user uses, the daytime the user is active, the building and room the user uses, the part of the room in which the user sits, and so on) and reports if the user engages in behavior that is unusual for that person. This method can often detect accounts overtaken by attackers.

tags | tool, intrusion detection
systems | linux, unix, bsd
SHA-256 | 7b09b1d8cf07ed76ec812c3b36cc8b257ecad914ca8417aef1f660b97f2314cb
fupids.tgz
Posted Dec 6, 2003
Authored by Steffen Wendzel

fupids (the fuzzy userprofile intrusion detection system) is a user-profile based IDS for the OpenBSD kernel. It modifies certain syscalls in order to detect suspicious behavior. For example, it watches for network devices being set to promiscuous mode, and it watches for the creation of listen() sockets by users. fupids also handles a program profile for your local users, and it can find attackers who overtake existing accounts.

tags | tool, kernel, local, intrusion detection
systems | unix, openbsd
SHA-256 | 4e9cc0678668210a8cf5cdfdd6a784ddc84e0d69450b7fb0433efd8453efd073
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close