exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 124 RSS Feed

Files from Michal Zalewski

Email addresslcamtuf at coredump.cx
First Active1999-11-03
Last Active2024-09-01
Skipfish Web Application Scanner 1.03b
Posted Mar 20, 2010
Authored by Michal Zalewski | Site code.google.com

Skipfish is a fully automated, active web application security reconnaissance tool. It is high speed, has a low false positive rate, and is easy to use.

tags | tool, web, scanner
systems | unix
SHA-256 | b8be1811b5922084c753cd6de2d0b9a6cc88bcfc43203dab14e4d92599a9f218
Multiple Browser Vulnerabilities
Posted Jun 11, 2009
Authored by Michal Zalewski

Michal Zalewski has released some details with links to proof of concept code for a MSIE same-origin bypass race condition, MSIE memory corruption on page transitions, CANVAS implementation crashes, and Safari page transition tailgating.

tags | advisory, proof of concept
advisories | CVE-2007-3091, CVE-2008-2321, CVE-2009-1684
SHA-256 | aada75a86af557c06b7ae5af9b0eebe4b1e6812bafa534a00cb5dd004ecdf459
RatProxy Security Audit Tool
Posted May 14, 2009
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

Changes: Another round of minor tweaks to the connection handling logic to improve compatibility with certain Web servers.
tags | tool, web, sniffer
SHA-256 | 2142d5643305713d9be7fcc82a244048076190851e697b645c49b549a7ae0725
RatProxy Security Audit Tool
Posted Apr 17, 2009
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

Changes: This release adds new checks for Flash crossdomain.xml and Silverlight clientaccesspolicy.xml, and reverts HTTP/1.1 logic introduced in 1.55.
tags | tool, web, sniffer
SHA-256 | 51824925542ec9c1f2120b1b5cc8c0bfcf73bceeb9fb57026dc1ad012aa1f8c5
RatProxy Security Audit Tool
Posted Mar 27, 2009
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

Changes: A minor change was made to always output HTTP/1.1 headers to avoid the activation of certain Web server heuristics.
tags | tool, web, sniffer
SHA-256 | 2db436645d5c4fd4aa3e24d589a455b9080aa44753040e6cd39990256867c094
RatProxy Security Audit Tool
Posted Feb 16, 2009
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

tags | tool, web, sniffer
SHA-256 | 64074f2927e1d1f4a9dbc4878cdcbb6c98940d01e2588f6f9bdc85fac7498fda
RatProxy Security Audit Tool
Posted Jan 2, 2009
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

tags | tool, web, sniffer
SHA-256 | e9907b0e2fc105dec78c5bc9fc35d7d54625ed3896eb3d1ee7ece536646a03bb
RatProxy Security Audit Tool
Posted Dec 31, 2008
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

tags | tool, web, sniffer
SHA-256 | 07abd5e607305563bfb83338f034a1191ce24b39d95a1e7104a23f65ac331c5b
p0f-2.0.8-db-20080806.tar.gz
Posted Aug 8, 2008
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

Changes: Added better handling of MySQL error codes.
tags | tool, remote, local, scanner
systems | windows, unix
SHA-256 | b1b3a50167e875ae8a49b1069e893267ee5dd2ab3c6ef6b733760e63b4bdc904
RatProxy Security Audit Tool
Posted Jul 10, 2008
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

tags | tool, web, sniffer
SHA-256 | f58a40d021988874c1bac177413c7b07b985721ff1282cd6734623c08fed634b
tmin-0.04.tar.gz
Posted Jun 19, 2008
Authored by Michal Zalewski | Site code.google.com

tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.

tags | fuzzer
SHA-256 | f80bf14e4e0e2aef70ffee1065caee30c845ca9dae1448701ff20d7f6853e261
bunny-0.93.tgz
Posted May 22, 2008
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

Changes: Bug fix release.
tags | protocol, fuzzer
SHA-256 | 30c7765b960b131246bfe8c25b79d20eae49f282dd0ac3b7e1e293233a446f99
tmin-0.03.tar.gz
Posted Apr 28, 2008
Authored by Michal Zalewski | Site code.google.com

tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.

tags | fuzzer
SHA-256 | 6fa417edb887bc2a9b30f10caf309c076293186b24d00cd9af098a7243ff02a0
dom-checker-1.00.tgz
Posted Jan 26, 2008
Authored by Michal Zalewski, Filipe Almeida | Site code.google.com

A simple utility to thoroughly validate DOM, XMLHttpRequest, and cookie security restriction handling in modern web browsers. Notable features include exhaustive hierarchy crawling, cross-domain IPC system for blind write verification, page transition checks, and more.

tags | web
SHA-256 | 3193283a884cf29dab7eb6c658285fc4ab255c371456911b95b7541483b34432
bunny-0.92.tgz
Posted Nov 8, 2007
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

Changes: IPC handling bug fix.
tags | protocol, fuzzer
SHA-256 | dae9be447ea202eb4d5eeb0cba317136fe15861630c1562730ff011f8ecb33c7
bunny-0.91.tgz
Posted Nov 7, 2007
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

Changes: Various bug fixes.
tags | protocol, fuzzer
SHA-256 | ebfb03563564202d26c9314f19b2cbbdf98cdb2c16d21f6628ccf680af7d3db6
bunny-0.9.tgz
Posted Oct 31, 2007
Authored by Michal Zalewski | Site code.google.com

Bunny the Fuzzer - A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. Uses compiler-level integration to seamlessly inject precise and reliable instrumentation hooks into the traced program. These hooks enable the fuzzer to receive real-time feedback on changes to the function call path, call parameters, and return values in response to variations in input data. This architecture makes it possible to significantly improve the coverage of the testing process without a noticeable performance impact usually associated with other attempts to peek into run-time internals.

tags | protocol, fuzzer
SHA-256 | 7316d0f0a285a94b48f522cda8e5a4963a67a6b63cbe7e8aaa2dd7ed46a4b9ef
p0f-2.0.8-db-20070919.tar.gz
Posted Sep 20, 2007
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

Changes: Insufficient OS description escapes fixed. Other fixes.
tags | tool, remote, local, scanner
systems | windows, unix
SHA-256 | dd38a277cf5f75bd141c92c52d4a943be4377fb60f3ec5a8fd8b6e6d380f4122
ie-entrap.txt
Posted Jul 17, 2007
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

It appears that Microsoft Internet Explorer suffers from a browser entrapment vulnerability in document.open() calls.

tags | advisory
SHA-256 | 1b23865dd5ab90c94ef1fe835486566129d4f40e9c19376db573494978d39288
Mozilla Firefox wyciwyg:// Psuedo-URI Advisory
Posted Jul 10, 2007
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

A vulnerability exists in how Mozilla Firefox handles internal wyciwyg:// pseudo-URIs.

tags | advisory
SHA-256 | 93f02ea123437363186523aeae7e0ca0e0d453814f6ae1c66ad755016eaf7b78
p0f-2.0.8-win32.zip
Posted Jun 19, 2007
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

tags | tool, remote, local, scanner
systems | windows, unix
SHA-256 | e5665aaef9dea1dbdd6c08e7f76453874a605f513f2c431e34a940104a886c8e
browserbugs.txt
Posted Jun 7, 2007
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Multiple vulnerabilities have been discovered that affect Microsoft Internet Explorer and Mozilla Firefox.

tags | advisory, vulnerability
SHA-256 | 44c9aebc984e47399f696a485a24a8b42bac000661c73e65fc9147ffc41af37e
firefox-bookmark.txt
Posted Feb 24, 2007
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

There is an interesting vulnerability in how Firefox handles bookmarks. The flaw allows the attacker to steal credentials from commonly used browser start sites.

tags | advisory
SHA-256 | 21a72e3c2e3f73ba1fa951e5bf911498d17a63954a83b0046a2309ac71528a4b
firefox-flaw.txt
Posted Feb 17, 2007
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Firefox suffers from a design flaw that can be used to confuse casual users and evoke a false sense of authority when visiting a fraudulent website. The flaw can be also used to bypass a fix for an old UI spoofing bug that was thought to be addressed.

tags | advisory, spoof
SHA-256 | f6bd7f2d92b5234b2a324dfe908f0423708a3b99e3a54cda6bb17a733bc75aba
firefox-boom.txt
Posted Feb 16, 2007
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Mozilla Firefox versions 2.0.0.1 and below does not handle writes to the location.hostname DOM property.

tags | advisory
SHA-256 | 81515b1e790b10e90b83ec02a5bb06c1e8df12e3cdaad7f108b23389020be511
Page 2 of 5
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close