exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 35 of 35 RSS Feed

Files from scut

Email addressscut at team-teso.net
First Active1999-08-17
Last Active2003-08-10
zodiac-0.4.6.tar.gz
Posted Dec 31, 1999
Authored by scut | Site packetfactory.net

Zodiac is a portable, extensible and multithreaded DNS tool. It is meant to be used as a DNS packet monitor and DNS protocol test and debuging tool. It's basic features are: sniffing of DNS datagrams on an ethernet device, decoding of all types of DNS packets, including safe decompression (partly finished, SOA record are, for example, not decoded yet), nice display and gui, if you like ncurses and text based frontends, always interactive in all situations through built in command line, threaded and flexible design. Advanced features include: local DNS spoof handler, jizz DNS spoof, exploiting a weakness in old bind implementations, determines jizz-weakness, id-prediction and resolver type remotely, id spoofing, exploiting a weakness in the dns protocol itself, implements some advanced DNS denial of service attacks, including flood, label compression and unres attack, advanced DNS smurf.

tags | denial of service, local, spoof, protocol
systems | unix
SHA-256 | 9177cc687008fb78cc392b441323b5ec9f051c351001d1c448f35f7c9a88324a
ascend-foo.c
Posted Dec 31, 1999
Authored by scut

ascend foo denial of service exploit - basically just another lame echo/echo link, but has nice results on ascend, the router needs to be rebooted.

tags | denial of service
SHA-256 | fe530210211c98eb326d365ad3afea020c2bcac0189958f184e1b378dc1e2bec
grabbb-0.0.7.tar.gz
Posted Nov 26, 1999
Authored by scut | Site team-teso.net

Clean, functional, and fast banner scanner.

Changes: Portability fix: Now works on Linux, BSD and Solaris.
tags | tool, scanner
systems | unix
SHA-256 | 86258d4a2f264691c77ffa0a0993644a51c8e6e327f63358160b93a492155b7d
grabbb-0.0.5.tar.gz
Posted Nov 16, 1999
Authored by scut | Site team-teso.net

Clean, functional, and fast banner scanner.

tags | tool, scanner
systems | unix
SHA-256 | d3a5bf0b9a3e63c5b84dbc7c7ca06de53564482024ab93e88b6138b33eb0a863
prxtools.tar.gz
Posted Aug 17, 1999
Authored by scut

prxtools is a suite of proxy tools used to find/identify/test/abuse/use http proxys. 'fizzbounce' maps a tcp connection from a local port over a remote http proxy server which does http-relay to a remote host (defaultly insecure cacheflow proxies and misconfigured squids will do fine). 'polysyndeton' is a simple http proxy (not a real proxy though), that splits http requests among a variable number of http proxies, partly anonymizing your requests and making it more (far away from impossible) difficult to trace you. 'prxtest' reliably tests a http proxy for relay and proxying ability. 'soxtest' reliably tests a socks 5 server for relay ability.

tags | remote, web, local, tcp
systems | unix
SHA-256 | 598694a327e47f56b8466e3c5754da9134ac1dabeea8f411f3ce5227dc5965d2
tesoiis.c
Posted Aug 17, 1999
Authored by scut

UNIX port of the eEye NT4+IIS4 URL buffer overflow remote exploit, coded in C.

tags | exploit, remote, overflow
systems | unix
SHA-256 | 3397266642014e8f2162eab579ab1c4eee1e65882fd0712630dfc4d3223a8eb3
cfusion.tar.gz
Posted Aug 17, 1999
Authored by scut

This is by far not only the best Cold Fusion vulnerability scanner I've seen, but simply top quality networking functions and library too. This is damn fine code. In fact, the networking functions are so good and portable, that they can and should be used for other network-related code.

tags | exploit
SHA-256 | ce8fc4b1a5a5a7a7bb3022e43a8f7a0902101cb22d601463dd49e898630070a9
dns.label.decoding.txt
Posted Aug 17, 1999
Authored by scut

Weaknesses in DNS label decoding leave Intrusion Detection Systems, sniffers, and many other security and network tools and software vulnerable to denial of service attacks.

tags | exploit, denial of service
SHA-256 | 371b9212bbae432bc7eedba5eada8bd430b25b2e4a3f56563e58a253b7e23eef
zlip.tar.gz
Posted Aug 17, 1999
Authored by scut

Three examples of exploit code for the weaknesses in DNS label decoding discovered by scut. zlip-1.c - endless, pointing to itself message decompression flaw, ethereal crashes linux; zlip-2.c - endless cross referencing at message decompression, ethereal crashes linux even faster; zlip-3.c - creating a very long domain through multiple decompression of the same hostname, again and again, overflows ethereal, exploitable.

tags | exploit, overflow
systems | linux
SHA-256 | 93295e200333c49dab5b478a1cd74c348e837feacd7c4a2bdc67938cb921b9e2
lin35.c
Posted Aug 17, 1999
Authored by scut

More new exploit code for the tcp flaw found in Linux kernels route's Libnet.

tags | exploit, kernel, tcp
systems | linux
SHA-256 | a48269f64ff7ed83a2dacba420290d5f431d45a3e6827bba7b727e25d34855e3
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close