Real Name | Debasish Mandal |
---|---|
Email address | debasishm89 at gmail.com |
First Active | 2011-08-20 |
Last Active | 2013-06-22 |
PEiD version 0.95 memory corruption proof of concept exploitation details.
d53ea6b79606c299c81e860d64d534a6a783b267cc16bf3fda88ca1114fd92d5
PEStudio version 3.69 suffers from a denial of service vulnerability.
894e7f4fc68a36429f7c80e4ae5b799448f3a8f2cf6a057e92074baaf53a4122
Apple QuickTime Player Windows version 7.7.3 suffers from an out of bounds read vulnerability.
3d60aec0fbab876dd922d47e86103c69e20f4e9c1f873e349d83a0f172ffc979
Inmatrix Ltd. Zoom Player version 8.5 memory corruption and arbitrary code execution exploit that leverages a crafted JPEG file.
e93c531005e5c45acf7db63cf82c525cc84d2dc9abe53bbded611012472ddc3f
Qutecom version 2.2.1 suffers from a heap overflow vulnerability that can cause a denial of service condition.
8979a5344fd1e6d62cc166575ebc2de5f7baf4af9f28e8e3e23438c58be21cc1
This whitepaper discusses using ICMP as a covert tunnel for traffic. An example of this technique is tunneling complete TCP traffic over ping requests and replies. More technically it works by injecting arbitrary data into an echo packet sent to a remote computer. The remote computer replies in the same manner, injecting an answer into another ICMP packet and sending it back.
b3f9abf0a20186c20b5029836a0257f08fc519a4a564f7ad5fd760ed03754755
Win32 speaking shellcode that says "You are owned!" when injected into a process.
7c2ceba938f0258137c96e2d24741196da0e046078a38019daefa66e87cf8bfc
Win32/XP Pro SP3 (EN) 32-bit beep beep shellcode.
6e94bfb9d2b94082ecd1a9d972bdb0de79297cda77b7484f32f0b7fbafb9b244
This Metasploit module exploits a stack buffer overflow in GOM Player version 2.1.33 by creating a specially crafted .asx file which will allow an attacker to execute arbitrary code.
b3d6b213896bb1a0f9594f5b388cc6189527081d4b00c1e99a39ed41e41f07f9
GOM Player version 2.1.33.5071 unicode stack buffer overflow exploit that creates a malicious .asx file.
971fa225476af793630fed50acafc906d65f2a06c6b21985a2ea4f591586bbfe
rtspFUZZ is a real time streaming protocol server fuzzer. It uses 6 basic crafting techniques OPTIONS,DESCRIBE,SETUP,PLAY,GET_PARAMETER,TEARDOWN,PAUSE etc rtsp commands and 9 advanced crafting techniques to test any target application. It has the ability to fuzz with Metasploit Pattern (pattern_create.rb) which can be helpful for finding the offset.
b3f05d18dd413771887842b4ada5d866099b1674425ad0bca2f4323f6772668f
infIP is a python script that checks output from netstat against RBLs from Spamhaus.
acaf94c32dc5c063b56c758069a47017f5241b5e40be15e2c29c276a04297652
Free Float FTP server response stack buffer overflow exploit that spawns a bindshell on port 1234.
aa5903f9fa7cdb08dec686e921512adce723deb9722cb2091f16ae67b51d05ff