UPNP mass infector exploit.
18e0f419929aa859e5a7ec066be1b57c720c219044cd322fe7335ffc7841c819
This document details the procedure for performing microcode updates on the AMD K8 processors. It also gives background information on the K8 microcode design and provides information on altering the microcode and loading the altered update for those who are interested in microcode hacking. Source code is included for a simple Linux microcode update driver for those who want to update their K8's microcode without waiting for the motherboard vendor to add it to the BIOS. The latest microcode update blocks are included in the driver.
4ecff8d0555e0bd10657e9dff39c32e92fc331ea26ca0cac5995390818707ac2
THC-RUT (aRe yoU There) is a local network discovery tool developed to brute force its way into wvlan access points. It offers arp-request on ip-ranges and identifies the vendor of the NIC, spoofed DHCP, BOOTP and RARP requests, icmp-address mask request and router discovery techniques. This tool should be 'your first knife' on a foreign network.
b32f3d71ac540248b7643baa39d8ecfb75af493228caaeb64608e49f2f092473
Bind-tsig.c is a trojan which pretends to be a Bind 8 exploit, but actually attacks dns1.nai.com.
10c2b4ca2df782e81fa88f0f3754c17edbda8d021f0e95790037e92d99e82698
OpenBSD 2.6 local / remote denial of service attack. Sends a large number of ARP packets, causing the kernel to run out of memory and panic. Only works on machines connected to the same network segment.
c315e76c3370cc028713b496c13dfe8221b257801769c58c9b190e32627b5f03