exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Steffen Wendzel

Real NameSteffen Wendzel
Email addressprivate
Websitewww.wendzel.de
First Active2003-12-06
Last Active2008-05-01
View User Profile

Personal Background

My website: http://www.wendzel.de


astrocam-xss.txt
Posted May 1, 2008
Authored by Steffen Wendzel | Site wendzel.de

AstroCam versions 2.5.0 through 2.7.3 suffer from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | f0d70dc471b487e095c1c1b658f70d9feacc28f774495582874721a4dffe478d
phcct-0.1.tgz
Posted Nov 14, 2007
Authored by Steffen Wendzel | Site wendzel.de

phcct (protocol hopping covert channel tool) is a tiny and basic proof of concept implementation of a protocol hopping covert channel.

tags | protocol, proof of concept
systems | unix
SHA-256 | fa2070ea1a9984526ed0db20a7b0bcaa4c0c972d18a7c5e8f3f227e8d2ac4866
protocolhopping.txt
Posted Nov 14, 2007
Authored by Steffen Wendzel | Site wendzel.de

Whitepaper titled Protocol Hopping Covert Channels - Protocol Hopping Covert Channels (PHCC) are a way to realize covert channels that switch between different protocols while a covert channel is established. PHCCs even can use a randomized protocol order and a mixed packet order to transfer packets what makes them hard to detect.

tags | paper, protocol
SHA-256 | 5e860930cb5e0a371339c0311a86cb658c505870ba95e5089106907f07b049f8
vstt-0.5.0.tgz
Posted Oct 10, 2006
Authored by Steffen Wendzel | Site wendzel.de

VSTT is a multi-protocol tunneling tool. It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP3, and ICMP tunneling.

tags | tool, tcp, protocol
systems | unix
SHA-256 | 906cf187f8625fe4338d2fff5566de082b124c6eb209039b666449da2d70187f
fupids2-0.8.5.tgz
Posted Feb 16, 2006
Authored by Steffen Wendzel

fupids2 is a so-called human oriented IDS based on the FUPIDS project. fupids2 calculates an attacker level for every user on all Unix/Linux/BSD systems in the network. It looks at the behavior of the user (the programs the user uses, the daytime the user is active, the building and room the user uses, the part of the room in which the user sits, and so on) and reports if the user engages in behavior that is unusual for that person. This method can often detect accounts overtaken by attackers.

tags | tool, intrusion detection
systems | linux, unix, bsd
SHA-256 | 7b09b1d8cf07ed76ec812c3b36cc8b257ecad914ca8417aef1f660b97f2314cb
fupids.tgz
Posted Dec 6, 2003
Authored by Steffen Wendzel

fupids (the fuzzy userprofile intrusion detection system) is a user-profile based IDS for the OpenBSD kernel. It modifies certain syscalls in order to detect suspicious behavior. For example, it watches for network devices being set to promiscuous mode, and it watches for the creation of listen() sockets by users. fupids also handles a program profile for your local users, and it can find attackers who overtake existing accounts.

tags | tool, kernel, local, intrusion detection
systems | unix, openbsd
SHA-256 | 4e9cc0678668210a8cf5cdfdd6a784ddc84e0d69450b7fb0433efd8453efd073
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close