exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from ShadowHatesYou

First Active2010-01-11
Last Active2016-11-04
LDAP Amplication Denial Of Service
Posted Nov 4, 2016
Authored by ShadowHatesYou

This proof of concept is an LDAP Distributed Reflective Denial of Service/Bandwidth Amplification Attack, similar to DNS and NTP amplification attacks where the target of the DoS is spoofed as the source IP in a request to the reflectors(In this case, LDAP servers). The reflectors then respond to the spoofed target IP with a bigger answer than the original question, resulting in the target experiencing what appears to be a distributed denial of service attack, even though there may only be one true source. suffers from a denial of service vulnerability.

tags | exploit, denial of service, spoof, proof of concept
SHA-256 | 2d0188ea5dfc88ba53477d4affef50c7d2694d8f6c6ee1be7ce0517a277d71fb
NTP Denial Of Service
Posted Feb 17, 2014
Authored by ShadowHatesYou

This is a small perl script called NTP DRDoS which is a denial of service tool for use against NTP.

tags | denial of service, perl
SHA-256 | aace077f2d1467ac05f3510cdb0dd50536eb654724f84af89c96b51140890230
Python-wrapper Untrusted Search Path / Code Execution
Posted Jul 2, 2012
Authored by ShadowHatesYou

Python-wrapper executes any test.py script within the current working directory, when supplied with help('modules'). A non-privileged user may gain code execution by tricking root to help('modules') or help() and then modules from within python-wrapper while within a non-privileged user's work directory.

tags | exploit, root, code execution, python
SHA-256 | d58933fe94dc7d2c9f7f05b9dd9d6736fd4a43d5f37eee91e3e776a573bb8c24
Google Gears WiFi Geolocation API Query
Posted Dec 31, 2010
Authored by ShadowHatesYou

Cool write up detailing the Google Gears WiFi Gelocation API query.

tags | paper
SHA-256 | dda860a16437711471e75f336089057237c71d975e9a77893768079a3391ed50
Barracuda Networks Spam And Virus Firewall Configuration Retrieval
Posted Sep 28, 2010
Authored by ShadowHatesYou

Barracuda Networks Spam and Virus Firewall versions 4.1.1.021 and below remote configuration retrieval exploit.

tags | exploit, remote, virus
SHA-256 | 165ba97992e737fdb6fac9ce7c4bbf11e171a5ef6e1c4b1cdecc39389d32668d
Blackboxes - Owning Broadband Routers
Posted Jan 20, 2010
Authored by ShadowHatesYou

This is a brief whitepaper discussing how to own Blackboxes (typical broadband routers such as SB5120s, SMC Connect, D-Link dcm-202s, Toshiba PCX2600s, and a handful of RCA and Linksys modems).

tags | exploit
SHA-256 | 3fddebbe2117f3e5ef8cfb311b1cbed6273259f1ba1d32bd24a8c18db80cd5b4
2^6 TCP Control Bit Fuzzer
Posted Jan 11, 2010
Authored by ShadowHatesYou

2^6 TCP control bit fuzzer (no ECN or CWR).

tags | tcp, fuzzer
SHA-256 | acfc236162c8e9847ca2d395fb48be29cbbc9dc349fb97ccdf40724996d73882
Page 1 of 1
Back1Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close