Exploit the possiblities
Showing 76 - 100 of 100 RSS Feed

Files from van Hauser

Email addressprivate
Websitewww.thc.org
First Active1999-08-17
Last Active2017-07-22
View User Profile
amap-4.2.tar.gz
Posted Aug 10, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Application Mapper is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Various bug fixes, added 28 new response ids and triggers, and more.
tags | tool, protocol
MD5 | ec781fe4ed97d8d3fcccf64951aefa3e
vmap-0.6.tar.gz
Posted Aug 10, 2003
Authored by van Hauser, thc, Whyking | Site thc.org

Version mapper 0.5.2 is a utility for fingerprinting services by checking features and replies of bogus commands being fed to the daemon. Currently supports FTP, SMTP, POP3, IMAP, and HTTP.

tags | web, imap
MD5 | 0bacf8350c52a2fdc37cb80beaece6c2
amap-4.0.tar.gz
Posted Jul 22, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap Version 4.0 is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Rewritten from scratch to enhance speed and reliability. There are also new features, better documentation, and various other bug fixes.
tags | tool, protocol
MD5 | c92a0f159c1ccd34f63e932b81a5b660
login_hacker-1.1.tar.gz
Posted Jun 29, 2003
Authored by van Hauser, thc | Site thc.org

THC Modem Login Hacker - A tool that will attempt to break into modem dialups using scripts written for minicom. Extremely configurable and a must have for any penetration test.

MD5 | 73d0b6398194c65e3ddd67741fe2adcd
amap-2.7.tar.gz
Posted Jun 17, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Added the ability to compile under Cygwin, Added some triggers and responses, and various bug fixes.
tags | tool, protocol
MD5 | 742448f85d6abf0897a7d0a703b66328
amap-2.5.tar.gz
Posted May 31, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Bug fix in the -o output and RPC scanning.
tags | tool, protocol
MD5 | 61ac4d3ebf00d0239927e0fc41918032
amap-2.1.tar.gz
Posted May 8, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap V2.1 is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: More application fingerprints, better identification, speed enhancements, amapcrap added, new features and bugfixes.
tags | tool, protocol
MD5 | 465f118051158b2a5c6760b39ac88436
amap-1.2.1.tgz
Posted Dec 29, 2002
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: More application fingerprints, less bugs and SSL support!
tags | tool, protocol
MD5 | c84cdd211628573fc516575829629896
parasite-1.2.tar.gz
Posted Jul 12, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.2 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security. Works on Linux, OpenBSD, and Solaris.

Changes: More portable.
tags | spoof
systems | linux, solaris, openbsd
MD5 | 21f441d4b6acb00348dc602c10d1a37c
rwwwshell-2.0.pl.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

Reverse-WWW-Tunnel-Backdoor v2.0 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.

Changes: Now has full HTTP v1.0 compliance.
systems | linux, solaris, openbsd, aix
MD5 | b54eb0a55405d0b11681391f70fe0be6
THC Secure Deletion v2.3
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Secure Deletion v2.3 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: Bug fixes.
systems | unix
MD5 | 68ca1ec39b9f6b560214a4214664fc4c
parasite-1.1.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.1 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security.

tags | spoof
MD5 | 37e6c8de8034e8f55db18251d9810fc7
wardrive-2.3.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.3 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Rewrote the GPS data gathering function. Fixed lots of bugs!
systems | linux
MD5 | 0f9ac16de64a6f49c968adbaefe9524f
amap-0.95.tar.gz
Posted Mar 6, 2002
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on (a) specific port(s). It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

tags | tool, protocol
MD5 | e0fd9e1491a1db50663473ab47fe7824
wardrive-2.1.tar.gz
Posted Oct 12, 2001
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.1 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Added -R option to allow wavelan resets after 3 seconds, added -W option to print SSID and access point MAC, added start_wardrive, reset_wvlan.sh, and wardrive.conf, get_coords_from_stat.sh, and clean_stat.sh scripts, and fixed bugs.
tags | tool, wireless
systems | linux
MD5 | 9b6702c25a6e8fbeb453226c7143bb34
wardrive-2.0.tar.gz
Posted Sep 27, 2001
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.0 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

tags | tool, wireless
systems | linux
MD5 | 43736fff1ca1e6a6bda14947e43f6190
fw-backd.htm
Posted Jan 27, 2000
Authored by van Hauser, thc | Site thc.org

Placing Backdoors Through Firewalls version 1.5 - Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which does its job is not easily detectable. The kind of backdoor needed depends on the firewall architecture used. As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included.

tags | vulnerability
MD5 | 3e0af4692cc7192b54ae9a66e8498cc6
anonymous-unix-0.9.tar.gz
Posted Oct 7, 1999
Authored by van Hauser, thc | Site thc.org

"Anonymizing UNIX Tools v0.9" - Tools for securing your UNIX systems(s), keeping your data and actions as private as possible, as described in Anonymizing UNIX Systems v0.9 Whitepaper.

systems | unix
MD5 | 95da18f5f78bcaf27040464474147e04
rwwwshell-1.6.perl
Posted Oct 7, 1999
Authored by van Hauser, thc | Site thc.org

Reverse-WWW-Tunnel-Backdoor version 1.6 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.

Changes: Included www-proxy authentication.
systems | linux, solaris, openbsd, aix
MD5 | e9bb738bb156d411c7b6c0d27eaaa281
cover-tracks2.htm
Posted Aug 17, 1999
Authored by van Hauser

Interesting text explaining how to cover your tracks when you leave the system.

tags | paper
MD5 | 4a2e105548abea403482893d5f03dd68
thc-ts20.zip
Posted Aug 17, 1999
Authored by van Hauser, thc

THC-SCAN v2.0 - Latest release of an excellent phone scanner. See the video on how this scanner works here. Features in this release: ODBC support so you can import your results intro SQL or Excel Spreadsheets, source code, runs on any DOS emulating operating system, supports the usual Carrier and PBX Scanning mode plus a special manual mode for trying out PBXs and VMBs, many primary identifications possible and secondary id's for countries and ccitts, can identify VMBs and Unused numbers automatically if configured correctly, scan numbers specified in a textfile, autodetecting 8N1, 7E1 and 7O1 carrier modes, many more options and features.

MD5 | ec96144e496883b12e5c4aeb3bfa7f4e
THC Secure Deletion v2.1
Posted Aug 17, 1999
Authored by van Hauser, thc

THC-Secure Deletion v2.1 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: (all) added the -f(ast) option; (smem) added a new tool: smem, which wipes free memory; (srm/sfill/smem) added rlimit resets; (sfill/sswap) quadrupled the buffer size; (srm/sfill/sswap) fix for openbsd which doesn't know O_SYNC open(2); (srm) added the -d(ot) option. Ignores "." and ".." on the commandline; (srm) fixed directory and file link races.
systems | unix
MD5 | e36ff21c4b9962eda55b49c57884f6ae
anonymous-unix-0.7.tar.gz
Posted Aug 17, 1999
Authored by van Hauser, thc

Anonymous UNIX v0.7 tools, including scripts, example configuration files, and the Anonymizing UNIX Systems v0.7" whitepaper. An excellent package of tools that can be used as the basis for an "Anonymous UNIX" system.

systems | unix
MD5 | 926f3593287a8435116e96fd23775bf0
anonymous-unix.html
Posted Aug 17, 1999
Authored by van Hauser, thc

"Anonymizing UNIX Systems v0.7" - Excellent whitepaper detailing methods and tools that can and should be used to secure your UNIX systems(s), keeping your data and actions as private as possible. This is the "must read whitepaper of the month", and is included in the anonymous-unix-0.7.tar.gz package.

systems | unix
MD5 | a5fcb8c6e0b79e90415710af627b8771
manipulate_data-1.0.tar.gz
Posted Aug 17, 1999
Authored by van Hauser, thc

Manipulate_Data V1.0 - Search data on a harddisk/partition/file, extract the part you are interested in, and write it back after you (maybe) modified it.

MD5 | 269874883baf16e455177352c1653097
Page 4 of 4
Back1234Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    1 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close