Twenty Year Anniversary
Showing 1 - 9 of 9 RSS Feed

Files from Dan Kaminsky

Email addressdan at
First Active1999-08-17
Last Active2010-11-16
Phreebird DNSSEC Proxy 1.02
Posted Nov 16, 2010
Authored by Dan Kaminsky

Phreebird is a DNSSEC proxy that operates in front of an existing DNS server (such as BIND, Unbound, PowerDNS, Microsoft DNS, or QIP) and supplements its records with DNSSEC responses. Features of Phreebird include automatic key generation, realtime record signing, support for arbitrary responses, zero configuration, NSEC3 "White Lies", caching and rate limiting to deter DoS attacks, and experimental support for both Coarse Time over DNS and HTTP Virtual Channels. The suite also contains a large amount of sample code, including support for federated identity over OpenSSH. Finally, "Phreeload" enhances existing OpenSSL applications with DNSSEC support.

tags | tool, web, arbitrary
systems | unix
MD5 | 13afe1a7aa6ab753275c0b5289b6a8bc
Mozilla NSS NULL Character CA SSL Certificate Bypass
Posted Nov 17, 2009
Authored by Dan Kaminsky | Site

Mozilla NSS NULL character CA SSL certificate validation security bypass vulnerability.

tags | exploit, bypass
MD5 | 3a02a4eed8006d3a2834913dde03f727
Mozilla Firefox Remote Command Execution
Posted Sep 11, 2009
Authored by Dan Kaminsky | Site

Mozilla Firefox versions up through 3.0.13 suffer from an arbitrary command execution vulnerability due to the pkcs11.addmodule function.

tags | exploit, arbitrary
MD5 | 2676a9f8501c41fc246aceeafdea7a92
Posted Oct 23, 2008
Authored by Dan Kaminsky | Site

DNS TXT record parsing in LibSPF2 suffers from a memory corruption vulnerability. Heap overflow exploit included for reproduction purposes.

tags | exploit, overflow
MD5 | 480c18dde5e57166e2d350956e56f893
Posted Dec 7, 2004
Authored by Dan Kaminsky | Site

Stripwire is a tool which demonstrates vulnerabilities in md5 checks described in this paper. Contains a perl script which proves that if md5(x) == md5(y), then md5(x+q) == md5(y+q) (assuming length(x) and length(y) are 0 mod 64, and q is any arbitrary data). This is true because once two blocks converge upon the same hash, the nature of them being different has thereafter been lost.

tags | paper, arbitrary, perl, vulnerability
MD5 | aa5a1a01f2f6e05656fff5d5304c59b2
Posted Dec 7, 2004
Authored by Dan Kaminsky | Site

Collision vulnerabilities in MD5 Checksums - It is possible to create different executables which have the same md5 hash. The attacks remain limited, for now. The attack allows blocks in the checksumm'd file to be swapped out for other blocks without changing the final hash. This is an excellent vector for malicious developers to get unsafe code past a group of auditors, perhaps to acquire a required third party signature. Alternatively, build tools themselves could be compromised to embed safe versions of dangerous payloads in each build. A tool to demonstrate these vulnerabilities is available here.

tags | paper, vulnerability
MD5 | 5e1605409d78efd92cdce0d11489010b
Posted Dec 24, 2002
Authored by Dan Kaminsky | Site

Paketto Keiretsu v1.10 implements many of the techniques described in recent here.

Changes: Now has OpenBSD and Solaris support. A new Distco mode actively discovers the distance to remote hosts by analyzing the TTL in returned TCP RST packets. Libnet was patched to pack its variables. Traceroute hopcount determination was improved.
systems | unix
MD5 | 7fd82af09a6493f24c8681f7bbf03898
Posted Nov 19, 2002
Authored by Dan Kaminsky | Site

Paketto Keiretsu v1.0 implements many of the techniques described in recent here.

systems | unix
MD5 | f974f9f115a422c4ddff73fb1e98269c
Posted Aug 17, 1999
Authored by Dan Kaminsky

TCP Chorusing in the Windows 9x TCP/IP Stack - Flaws in the Windows 9x TCP/IP Stack can lead to Denial of Service attacks - this issue is not new, but the problems described by Dan Kaminsky in this article are.

tags | exploit, denial of service, tcp
systems | windows, 9x
MD5 | ffd495391bd83e8e47526540373e0024
Page 1 of 1

File Archive:

December 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    1 Files
  • 3
    Dec 3rd
    18 Files
  • 4
    Dec 4th
    40 Files
  • 5
    Dec 5th
    16 Files
  • 6
    Dec 6th
    50 Files
  • 7
    Dec 7th
    10 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By