what you don't know can hurt you
Showing 1 - 25 of 84 RSS Feed

Files from Todor Donev

Real NameТодор Донев
Email addresstodor.donev at gmail.com
Websitewww.ethical-hacker.org
First Active2009-02-04
Last Active2017-07-10
View User Profile

Personal Background

Todor Donev is an Bulgarian security researcher. Todor Donev is an independent security consultant and cyber threats analyst. His main interests are computing related and enjoy security research. Co-founder at International Association of Cybersecurity. For many years Todor is interested in "the dark side" of hacking, but he remains an Ethical Hacker. The greatest pleasure he experiences from breaking various systems, entirely with knowledge purpose or just because he can. Unix geek!


DNS/DNSSEC RR Stub Resolver Denial Of Service
Posted Jul 10, 2017
Authored by Todor Donev

DNS/DNSSEC RR stub resolvers amplification distributed denial of service exploit.

tags | exploit, denial of service
MD5 | 0dcc402c9b94f66a14d0a3fd9f69f56b
IoT mDNS/DNS-SD QM Amplification Distributed Denial Of Service
Posted Jul 5, 2017
Authored by Todor Donev

IoT mDNS/DNS-SD QM amplification distributed denial of service exploit.

tags | exploit, denial of service
MD5 | ac90410a7587c90900ab4cd9931a32ab
rpcinfo Portmap DUMP Call Amplification Distributed Denial Of Service
Posted Jul 5, 2017
Authored by Todor Donev

rpcinfo portmap DUMP call amplification distributed denial of service exploit.

tags | exploit, denial of service
MD5 | 7aecb7302e5513d6fb9ec619f90ed3a6
D-Link ADSL DSL-2640B SEA_1.01 Unauthenticated Remote DNS Changer
Posted Jun 20, 2017
Authored by Todor Donev

D-Link ADSL DSL-2640B SEA_1.01 remote dns changer exploit.

tags | exploit, remote
MD5 | 42bf229f831e70ca320881f824bb980c
Beetel BCM96338 ADSL Router Unauthenticated Remote DNS Changer
Posted Jun 18, 2017
Authored by Todor Donev

Beetel BCM96338 ADSL Router remote dns changer exploit.

tags | exploit, remote
MD5 | 2e02687e30079b52d3b80fe47e0ca4c5
D-Link ADSL DSL-2640B GE_1.07 Unauthenticated Remote DNS Changer
Posted Jun 18, 2017
Authored by Todor Donev

D-Link ADSL DSL-2640B GE_1.07 remote dns changer exploit.

tags | exploit, remote
MD5 | 2f0ad1c14b10a2f7fc27ca4fe09e7f31
D-Link ADSL DSL-2640U IM_1.00 Unauthenticated Remote DNS Changer
Posted Jun 17, 2017
Authored by Todor Donev

D-Link ADSL DSL-2640U IM_1.00 remote dns changer exploit.

tags | exploit, remote
MD5 | 61ce3e26bd5b9efd48b249d86763419b
UTstarcom WA3002G4 Unauthenticated Remote DNS Changer
Posted Jun 17, 2017
Authored by Todor Donev

UTstarcom WA3002G4 remote dns changer exploit.

tags | exploit, remote
MD5 | 44267da336265ebaa27796e5f773cb7e
iBall Baton iB-WRA150N Unauthenticated Remote DNS Change
Posted Jun 16, 2017
Authored by Todor Donev

iBall Baton iB-WRA150N remote dns changer exploit.

tags | exploit, remote
MD5 | baf518f98729758d2308be2929dc6cdf
Microsoft Windows IFEO Winlogin SYSTEM Backdooring Exploit
Posted Apr 20, 2017
Authored by Todor Donev

Microsoft Windows IFEO Winlogin SYSTEM backdooring exploit.

tags | exploit
systems | windows
MD5 | 4df690666f51efeb0d89fa0b54a2241c
Microsoft Windows taskschd.msc Privilege Escalation
Posted Apr 18, 2017
Authored by Todor Donev

Microsoft Windows taskschd.msc local SYSTEM privilege escalation exploit.

tags | exploit, local
systems | windows
MD5 | ab288ccfb8f8fa2781bea0902614d3f1
SunOS 5.11 Remote ICMP Weakness Kernel Denial Of Service
Posted Jan 21, 2017
Authored by Todor Donev

SunOS version 5.11 remote ICMP weakness kernel denial of service exploit.

tags | exploit, remote, denial of service, kernel
systems | solaris
MD5 | 0ffe0fe030d2bf7166687120627b323a
Pirelli DRG A115 V3 ADSL Router Unauthenticated Remote DNS Change
Posted Jan 19, 2017
Authored by Todor Donev

Pirelli DRG A115 ADSL router version 3 unauthenticated remote DNS changer exploit.

tags | exploit, remote
MD5 | 27556240631a492e0c1026dc2a91d227
Tenda ADSL2/2+ Modem D820R Unauthenticated Remote DNS Change
Posted Jan 19, 2017
Authored by Todor Donev

Tenda ADSL2/2+ Modem D820R unauthenticated remote DNS changer exploit.

tags | exploit, remote
MD5 | e0b68c603c413258be723392802de2bd
Tenda ADSL2/2+ Modem D840R DNS Changer
Posted Jan 17, 2017
Authored by Todor Donev

Tenda ADSL2/2+ Modem D840R unauthenticated remote DNS changer exploit.

tags | exploit, remote
MD5 | 938cf6920f5fc1558b2125a934cecb52
Pirelli DRG A115 ADSL Router DNS Changer
Posted Jan 17, 2017
Authored by Todor Donev

Pirelli DRG A115 ADSL router unauthenticated remote DNS changer exploit.

tags | exploit, remote
MD5 | e6496808aedaeaebfcf2b61e265bb3dc
Linux ntpd 4.2.8 derive_nonce Stack Overflow
Posted Nov 25, 2016
Authored by Todor Donev

Linux ntpd 4.2.8 derive_nonce remote stack overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
systems | linux
MD5 | 82c7c116090828fd0e56ef327c62c461
Linux Kernel 2.6.32-642 / 3.16.0-4 Inode Integer Overflow
Posted Nov 23, 2016
Authored by Todor Donev

Linux kernels 2.6.32-642 and 3.16.0-4 inode integer overflow proof of concept exploit.

tags | exploit, overflow, kernel, proof of concept
systems | linux
MD5 | 5e4bac26711257f2b173173b9a893edf
BlackNurse Spoofed ICMP Denial Of Service Proof Of Concept
Posted Nov 15, 2016
Authored by Todor Donev

Blacknurse is a low bandwidth ICMP attack that is capable of doing denial of service to well known firewalls. Most ICMP attacks that we see are based on ICMP Type 8 Code 0 also called a ping flood attack. BlackNurse is based on ICMP with Type 3 Code 3 packets. We know that when a user has allowed ICMP Type 3 Code 3 to outside interfaces, the BlackNurse attack becomes highly effective even at low bandwidth. Low bandwidth is in this case around 15-18 Mbit/s. This is to achieve the volume of packets needed which is around 40 to 50K packets per second. It does not matter if you have a 1 Gbit/s Internet connection. The impact we see on different firewalls is typically high CPU loads. When an attack is ongoing, users from the LAN side will no longer be able to send/receive traffic to/from the Internet. All firewalls we have seen recover when the attack stops. Various firewalls such as Cisco ASA 5515/5525/5550/5515-X, Fortigate, SonicWall, and more are affected.

tags | exploit, denial of service
systems | cisco
MD5 | 1ce5fd54e281243721b63900ac937de9
D-Link ADSL Router DSL-2750E SEA_1.07 Remote File Disclosure
Posted Nov 9, 2016
Authored by Todor Donev

D-Link ADSL router DSL-2750E with firmware version SEA_1.07 suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
MD5 | b33e4f935d005ddc84e767c18e9a3996
NETGEAR ADSL Router JNR2010 1.0.0.20 Authenticated Remote File Disclosure
Posted Nov 9, 2016
Authored by Todor Donev

NETGEAR ADSL router JNR2010 with firmware version 1.0.0.20 suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 9f7119b611338f755bd44463adf9289f
NETGEAR ADSL Router JNR1010 1.0.0.32 Authenticated Remote File Disclosure
Posted Nov 9, 2016
Authored by Todor Donev

NETGEAR ADSL router JNR1010 with firmware version 1.0.0.32 suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
MD5 | dc78f7475d2feb6edc13dc66faad0205
NETGEAR ADSL Router WNR612v3 1.0.0.9 Authenticated Remote File Disclosure
Posted Nov 9, 2016
Authored by Todor Donev

NETGEAR ADSL router WNR612v3 with firmware version 1.0.0.9 suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
MD5 | b6b00e91ac9b19ff80c1b1dcb7013f0f
D-Link ADSL Router DSL-2750U IN_1.08 Remote File Disclosure
Posted Nov 9, 2016
Authored by Todor Donev

D-Link ADSL router DSL-2750U with firmware version IN_1.08 suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 37d089b90f88639bc9040529322410fc
NETGEAR ADSL Router WNR500 1.0.7.2 Authenticated Remote File Disclosure
Posted Nov 8, 2016
Authored by Todor Donev

NETGEAR ADSL router WNR500 with firmware version 1.0.7.2 suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 747f55dee43e920764d5ecd3ac92e6be
Page 1 of 4
Back1234Next

File Archive:

September 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    5 Files
  • 2
    Sep 2nd
    5 Files
  • 3
    Sep 3rd
    3 Files
  • 4
    Sep 4th
    13 Files
  • 5
    Sep 5th
    16 Files
  • 6
    Sep 6th
    15 Files
  • 7
    Sep 7th
    20 Files
  • 8
    Sep 8th
    16 Files
  • 9
    Sep 9th
    4 Files
  • 10
    Sep 10th
    2 Files
  • 11
    Sep 11th
    15 Files
  • 12
    Sep 12th
    19 Files
  • 13
    Sep 13th
    20 Files
  • 14
    Sep 14th
    38 Files
  • 15
    Sep 15th
    31 Files
  • 16
    Sep 16th
    1 Files
  • 17
    Sep 17th
    7 Files
  • 18
    Sep 18th
    15 Files
  • 19
    Sep 19th
    40 Files
  • 20
    Sep 20th
    8 Files
  • 21
    Sep 21st
    1 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close