what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from Haroon Meer

Real Nameharoon meer
Email addressprivate
Websiteblog.thinkst.com
First Active2001-05-10
Last Active2007-08-11
View User Profile
dc-15-meer_and_slaviero-WP.pdf
Posted Aug 11, 2007
Authored by Haroon Meer, Marco Slaviero | Site sensepost.com

Whitepaper discussing cross site request timing attacks. This was originally presented at Black Hat 2007 and Defcon 15.

tags | paper
SHA-256 | 88fce15c0a9ed8dc4bc6ad55deb64e3a3b97add18472559f9a0f7481f2f6d3d2
squeeza-0.21.tar.gz
Posted Aug 11, 2007
Authored by Haroon Meer, Marco Slaviero | Site sensepost.com

squeeza is a tool helps exploits SQL injection vulnerabilities in broken web applications. Its functionality is split into creating data on the database (by executing commands, copying in files, issuing new SQL queries) and extracting that data through various channels (dns, timing, http error messages).

tags | tool, web, scanner, vulnerability, sql injection
systems | unix
SHA-256 | ed5de3ae05d77b7285523cc1c34484c73029565ace873988605f4b640b76d635
sr.pl
Posted Jul 18, 2001
Authored by Roelof Temmingh, Haroon Meer | Site sensepost.com

Checkpoint Firewall-1's SecureRemote allows any IP to connect and download sensitive network information. This perl script gives a potential attacker a wealth of information including ip addresses, network masks (and even friendly descriptions).

tags | exploit, perl
SHA-256 | e3619e7d295ef6e80dc77aada9c151eaf7aeff1c25021ef117f8331019de3414
6thSense.tgz
Posted May 10, 2001
Authored by Haroon Meer | Site sensepost.com

6thsense is a TCP port scanning technique which allows you to remain completely invisible to the scanned host, as described in a Bugtraq post by Antirez. This perl script automates the tedious process.

tags | tool, scanner, perl, tcp
systems | unix
SHA-256 | 1d1a5d827807512fba0b4550e510f4dc9a65667e1ff2831570e59dd613bc14c2
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close