exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Missinglnk

Email addressmissnglnk at tribune.intranova.net
First Active1999-12-15
Last Active2000-03-30
drop.large-icmp.patch
Posted Mar 30, 2000
Authored by Missinglnk | Site tribune.intranova.net

Unofficial FreeBSD patch to drop all ICMP packets with a size greater than 8,184 bytes.

tags | patch
systems | unix, freebsd
SHA-256 | a71b3b0b939c6e6d229c913bdca2f7e3ed0bb6df6f34dbc1a979de1a4e7a4f16
unused.bit.patch
Posted Mar 30, 2000
Authored by Missinglnk | Site tribune.intranova.net

Unofficial FreeBSD patchfile with recommended unused bit attack patch from LigerTeam.

tags | patch
systems | unix, freebsd
SHA-256 | bd4b03760419f88ad3e8c031f8c9e3f2f739d9d5a86f4e8719b6f93466529135
drop.zero.patch
Posted Mar 30, 2000
Authored by Missinglnk | Site tribune.intranova.net

Unofficial FreeBSD patch to drop all TCP packets with a sequence and/or acknowledgement number of 0.

tags | tcp, patch
systems | unix, freebsd
SHA-256 | bddfb3e361bb24d9627c76791fcc131730673d50ed341fc805e404d50e389e7f
findfixed.pl
Posted Mar 20, 2000
Authored by Missinglnk | Site tribune.intranova.net

Findfixed.pl searches through C code looking for fixed-length buffers.

systems | unix
SHA-256 | 01d0d1983a1244903c29f0891f8551f178f9ab00f53ef34a47f1e24869d2240d
spurf.c
Posted Feb 23, 2000
Authored by Missinglnk | Site tribune.intranova.net

A little mail-like 'smurf' that uses mail relays instead of broadcasts.

tags | denial of service
SHA-256 | 126ffdb072440ea199f8c3cf4a9f678df92c6ea8c85fdced2af0b70874d3668b
trypop3.c
Posted Feb 23, 2000
Authored by Missinglnk | Site tribune.intranova.net

Some code I put together to do some testing on the POP3 daemons on some machines installed at work. Attempts to overflow user/password variables.

tags | overflow
systems | unix
SHA-256 | 66d36de7633bd79a74baa7b18fea4a59b9256c0aeee7c3c1b4c4794f411d831b
qpop-exploit-net.c
Posted Jan 28, 2000
Authored by Missinglnk | Site tribune.intranova.net

A modified version of the original qpopper 3.0beta29 exploit by Zhodiac, added network support (no need for netcat) and allowed the user to specify which command to execute.

tags | exploit
SHA-256 | bcdd1859b2a33b6f0bdced21cd68b20e314cb4ff2fe1dafccab9dfb8f9a3be82
portchk.c
Posted Jan 11, 2000
Authored by Missinglnk | Site tribune.intranova.net

Simple port checker that either takes command-line input or file input and checks each host if a given port is open.

tags | tool, scanner
systems | unix
SHA-256 | c6196cb0030306034df4e5f018b488e74133893235f29df326bb4ff2de6299ec
plusmail.c
Posted Jan 11, 2000
Authored by Missinglnk | Site tribune.intranova.net

PlusMail CGI remote exploit - This posts the form to the victim, reads the data, binds to a port on the local machine, then you open up a browser and go to http://localhost:4040.

tags | exploit, remote, web, local, cgi
SHA-256 | 65735cef498dd42d12cd9b4a11b9ed5eb2ec95a330443001f62c15aa73e980df
getwksinfo.exe
Posted Jan 11, 2000
Authored by Missinglnk | Site tribune.intranova.net

Getwksinfo is a little program coded for Windows 95/98/NT/2000 that gets the parameters of a remote Windows NT server, parameters include NetBIOS name, NetBIOS domain/workgroup, amount of users currently logged in, and remote operating system version.

tags | remote
systems | windows
SHA-256 | 2e05d6ca2a325c70bf4d891313dede50016ea3ec3834a29b7f44982e18cac92d
identd-fetch.c
Posted Jan 7, 2000
Authored by Missinglnk | Site tribune.intranova.net

Daemon that sits on a port and waits for a connection, once found, it sends an ident request. Demonstrates use of syslogd functions and fork().

systems | unix
SHA-256 | d3582d599a2efa226f1a781330ededa68e9215243eceed781f2d855a0d8777e3
surgery-0.1.tar.gz
Posted Jan 7, 2000
Authored by Missinglnk | Site tribune.intranova.net

Surgery is a CGI-based UTMP modifier/cleaner.

tags | cgi
systems | unix
SHA-256 | a0eade81e6bdaa3b0ae78f6ea945686a45db2aa39b28e880ebd865b2e89b9ee0
tryX.c
Posted Dec 15, 1999
Authored by Missinglnk | Site tribune.intranova.net

Some testing code I put together to try on a friend's old machine, it essentially tries to overflow the DISPLAY variable in X-based programs.

tags | exploit, overflow
SHA-256 | 7613d5b29ec47d7d33a9be662b0d6ff29d63ff54026a3473136af5f95fc5b577
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close