what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Debasish Mandal

Real NameDebasish Mandal
Email addressdebasishm89 at gmail.com
First Active2011-08-20
Last Active2013-06-22
View User Profile

Personal Background

Debasish Mandal(23) a security enthusiast from Calcutta,India living in the Bangalore,India.Debasish started working in information security at age 21 with iViZ Techno solutions Private Limited.Currently he is working as Penetration Tester at iViZ.His passion for computers started when he was 14.His hobbies include vulnerability discovery,exploit development,security tool development, reverse engineering,blogging,music,cards etc.As a big enthusiast for IT security and ethical hacking,he loves to learn and discover new things and to share knowledge and experience.


PEiD 0.95 Memory Corruption
Posted Jun 22, 2013
Authored by Debasish Mandal

PEiD version 0.95 memory corruption proof of concept exploitation details.

tags | exploit, proof of concept
SHA-256 | d53ea6b79606c299c81e860d64d534a6a783b267cc16bf3fda88ca1114fd92d5
PEStudio 3.69 Denial Of Service
Posted Jun 4, 2013
Authored by Debasish Mandal

PEStudio version 3.69 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 894e7f4fc68a36429f7c80e4ae5b799448f3a8f2cf6a057e92074baaf53a4122
Apple QuickTime Player 7.7.3 Out Of Bounds
Posted Jan 29, 2013
Authored by Debasish Mandal

Apple QuickTime Player Windows version 7.7.3 suffers from an out of bounds read vulnerability.

tags | exploit
systems | windows, apple
SHA-256 | 3d60aec0fbab876dd922d47e86103c69e20f4e9c1f873e349d83a0f172ffc979
Inmatrix Ltd. Zoom Player 8.5 Memory Corruption / Code Execution
Posted Jan 10, 2013
Authored by Debasish Mandal

Inmatrix Ltd. Zoom Player version 8.5 memory corruption and arbitrary code execution exploit that leverages a crafted JPEG file.

tags | exploit, arbitrary, code execution
SHA-256 | e93c531005e5c45acf7db63cf82c525cc84d2dc9abe53bbded611012472ddc3f
Qutecom 2.2.1 Heap Overflow
Posted Jun 23, 2012
Authored by Debasish Mandal

Qutecom version 2.2.1 suffers from a heap overflow vulnerability that can cause a denial of service condition.

tags | advisory, denial of service, overflow
SHA-256 | 8979a5344fd1e6d62cc166575ebc2de5f7baf4af9f28e8e3e23438c58be21cc1
Covert Channel Over ICMP
Posted Mar 9, 2012
Authored by Debasish Mandal

This whitepaper discusses using ICMP as a covert tunnel for traffic. An example of this technique is tunneling complete TCP traffic over ping requests and replies. More technically it works by injecting arbitrary data into an echo packet sent to a remote computer. The remote computer replies in the same manner, injecting an answer into another ICMP packet and sending it back.

tags | paper, remote, arbitrary, tcp
SHA-256 | b3f9abf0a20186c20b5029836a0257f08fc519a4a564f7ad5fd760ed03754755
Win32 Speaking Shellcode
Posted Feb 12, 2012
Authored by Debasish Mandal

Win32 speaking shellcode that says "You are owned!" when injected into a process.

tags | shellcode
systems | windows
SHA-256 | 7c2ceba938f0258137c96e2d24741196da0e046078a38019daefa66e87cf8bfc
Win32/XP Pro SP3 Beep Beep Shellcode
Posted Jan 31, 2012
Authored by Debasish Mandal

Win32/XP Pro SP3 (EN) 32-bit beep beep shellcode.

tags | shellcode
systems | windows
SHA-256 | 6e94bfb9d2b94082ecd1a9d972bdb0de79297cda77b7484f32f0b7fbafb9b244
GOM Player 2.1.33 (ASX) Stack Buffer Overflow
Posted Jan 16, 2012
Authored by KedAns-Dz, Debasish Mandal | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in GOM Player version 2.1.33 by creating a specially crafted .asx file which will allow an attacker to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | b3d6b213896bb1a0f9594f5b388cc6189527081d4b00c1e99a39ed41e41f07f9
GOM Player 2.1.33.5071 Stack Buffer Overflow
Posted Nov 30, 2011
Authored by Debasish Mandal

GOM Player version 2.1.33.5071 unicode stack buffer overflow exploit that creates a malicious .asx file.

tags | exploit, overflow
SHA-256 | 971fa225476af793630fed50acafc906d65f2a06c6b21985a2ea4f591586bbfe
rtspFUZZ 0.1
Posted Nov 19, 2011
Authored by Debasish Mandal | Site debasish.in

rtspFUZZ is a real time streaming protocol server fuzzer. It uses 6 basic crafting techniques OPTIONS,DESCRIBE,SETUP,PLAY,GET_PARAMETER,TEARDOWN,PAUSE etc rtsp commands and 9 advanced crafting techniques to test any target application. It has the ability to fuzz with Metasploit Pattern (pattern_create.rb) which can be helpful for finding the offset.

tags | tool, protocol, fuzzer
SHA-256 | b3f05d18dd413771887842b4ada5d866099b1674425ad0bca2f4323f6772668f
infIP 0.1 Blacklist Checker
Posted Sep 8, 2011
Authored by Debasish Mandal

infIP is a python script that checks output from netstat against RBLs from Spamhaus.

tags | tool, python
systems | unix
SHA-256 | acaf94c32dc5c063b56c758069a47017f5241b5e40be15e2c29c276a04297652
Free Float FTP Server Buffer Overflow
Posted Aug 20, 2011
Authored by Debasish Mandal

Free Float FTP server response stack buffer overflow exploit that spawns a bindshell on port 1234.

tags | exploit, overflow
SHA-256 | aa5903f9fa7cdb08dec686e921512adce723deb9722cb2091f16ae67b51d05ff
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close