exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Pluf

First Active2002-06-03
Last Active2006-08-30
Linux_PerProcess_Syscall_Hooking.txt
Posted Aug 30, 2006
Authored by Pluf

This document describes a new syscall hooking technique for Linux systems and exposes how it can be implemented as part of a virus or a backdoor in order to take full control over an userland application. Although there are some well- known methods for hooking functions, they are mostly based on the ELF format itself. This technique is focused on those pieces of code that are externally called by the main program and invoke a system call or system service.

tags | paper, virus
systems | linux
SHA-256 | 30fdbdfab2efb4eab95a25eb94384d63a0a3f4af1470486ff3e9730bb54e262c
7a69-PUP.txt
Posted Mar 31, 2006
Authored by Pluf

Pitbull is an example of a system that takes advantage of a process address space in order to execute ELF binaries. It is primarily useful for building post-exploitation frameworks and rootkits.

tags | paper
SHA-256 | 6b8aa7b6377d967b86b1fd1628c9963bcc5c4633bc33d92b9ab83b2f2de35b2a
7a69ezine Advisory 23
Posted Apr 18, 2005
Authored by Pluf, 7a69ezine | Site 7a69ezine.org

Various Java development kits all suffer from a jar tool directory traversal vulnerability.

tags | advisory, java
SHA-256 | dd8273fc003847bed700dff37cd4bd5cfb910422db91bfed77a781284a19ad78
libvg-0.3.0.tar.gz
Posted Jan 7, 2005
Authored by Pluf | Site 7a69ezine.org

First public released of libvg, a runtime process manipulation library. Libvg was designed to provide a powerful and portable interface for writing non-complex programs that can get or change information of processes on the system.

tags | library
SHA-256 | 6cd35b18473ff6e881f833beb66fec0945da66f0b773f0b6ddbca106622065fb
elfdoctor.c
Posted Sep 6, 2003
Authored by Pluf

Scanner to look up infection techniques that can be used in ELF modules. Includes function hijacking, relocation files, etc. Runs on linux 2.4.X.

systems | linux
SHA-256 | dcd0e0b68ca65f72ca23959a54204f1f589d2cac48c5840fd77dc0b45db13d17
plushs-1.0.tar.gz
Posted Jun 3, 2002
Authored by Pluf | Site plushs.sourceforge.net

PluSHS allows a user to resolve the names of a single IP address or entire network of addresses to maintain a "map" of the names that comprise a certain network.

tags | tool, scanner
systems | unix
SHA-256 | 0d5bddb0ccc196ba0c98783a19d57e738ffda70e5cd718a83e2c996cfb0a742c
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close