what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 130 RSS Feed

Files from van Hauser

Email addressprivate
Websitewww.thc.org
First Active1999-08-17
Last Active2024-04-15
View User Profile
THC Secure Deletion v3.1
Posted Nov 21, 2003
Authored by van Hauser, thc | Site thc.org

THC-Secure Deletion v3.1 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: Linux LKM for secure file deletion included. Bug fixes.
systems | unix
SHA-256 | 84723b3bc93dbba5d4c86c232ca6c84566ef1cbf281823588a7b902a539b70ac
thc-ipf10.zip
Posted Oct 30, 2003
Authored by van Hauser, thc, Doc Holiday | Site thc.org

IPF is the first command line tool for configuring the packet filter of Windows NT4 and Window 2000 systems. It replaces the annoying GUI alternatives and can be used as an elegant entry for writing advanced firewall scripts under the Windows system.

systems | windows
SHA-256 | c46f4f02954aa5e7db1c4c29cdde1a7774c2112b79cd65edb7097fa134fe9cd1
THC Secure Deletion v3.0
Posted Oct 30, 2003
Authored by van Hauser, thc | Site thc.org

THC-Secure Deletion v3.0 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: Bug fixes.
systems | unix
SHA-256 | b218d13f203672b1361f8387242d89fdf58135875e60dd7def28e581a5ac1d23
hydra-2.4.tar.gz
Posted Oct 30, 2003
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallized login hacker for Samba, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support and is part of Nessus.

Changes: Added mysql module, fixed VNC module, and a new ./configure script for better Solaris and *BSD support.
tags | web, cracker, imap
systems | cisco
SHA-256 | 693645829a78ed3b1dcdc74f3741819dbe8eaf67b14b72b0ec6a4223ceeaa0b1
amap-4.3.tar.gz
Posted Sep 21, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Application Mapper is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: More identifications added and various bug fixes.
tags | tool, protocol
SHA-256 | 4450b9ecd3bc40104031d83fad31d0bb3fc7aa15de4088460aa734c06f2e1f2b
amap-4.2.tar.gz
Posted Aug 10, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Application Mapper is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Various bug fixes, added 28 new response ids and triggers, and more.
tags | tool, protocol
SHA-256 | a2826954e3dafa6ed8b2e3866603be894a0363d4ef2157de174bb9e5e407d089
vmap-0.6.tar.gz
Posted Aug 10, 2003
Authored by van Hauser, thc, Whyking | Site thc.org

Version mapper 0.5.2 is a utility for fingerprinting services by checking features and replies of bogus commands being fed to the daemon. Currently supports FTP, SMTP, POP3, IMAP, and HTTP.

tags | web, imap
SHA-256 | 315d3d9e5cf65be910fc47d159fe64a09effc31240e987426e119ac6e5524275
amap-4.0.tar.gz
Posted Jul 22, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap Version 4.0 is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Rewritten from scratch to enhance speed and reliability. There are also new features, better documentation, and various other bug fixes.
tags | tool, protocol
SHA-256 | 2093ae53f387b8dfbd45483389d5031cf82dd14770bd294b48f87d7917b52210
login_hacker-1.1.tar.gz
Posted Jun 29, 2003
Authored by van Hauser, thc | Site thc.org

THC Modem Login Hacker - A tool that will attempt to break into modem dialups using scripts written for minicom. Extremely configurable and a must have for any penetration test.

SHA-256 | 828570b792839f01260c13d3a4c84290f8ec66299dfceef31ab46fc2941ec452
amap-2.7.tar.gz
Posted Jun 17, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Added the ability to compile under Cygwin, Added some triggers and responses, and various bug fixes.
tags | tool, protocol
SHA-256 | 94fab83628b9447bc141df6b16c39f31750777f88ee84a8d1eb31ceb8b387221
amap-2.5.tar.gz
Posted May 31, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Bug fix in the -o output and RPC scanning.
tags | tool, protocol
SHA-256 | 6df1e33d4c0dea8aae82e949aa3198c14cb677bce90ca0f5998b50a39229a476
amap-2.1.tar.gz
Posted May 8, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap V2.1 is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: More application fingerprints, better identification, speed enhancements, amapcrap added, new features and bugfixes.
tags | tool, protocol
SHA-256 | a2fcff73f3df3c1bcf73d1501e95403b8c981c8c823a2d9d6763f52252bbb3ad
amap-1.2.1.tgz
Posted Dec 29, 2002
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: More application fingerprints, less bugs and SSL support!
tags | tool, protocol
SHA-256 | 81509d637b18008571d20a69abeb7186061b19f044b882b42974720a61efebdf
parasite-1.2.tar.gz
Posted Jul 12, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.2 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security. Works on Linux, OpenBSD, and Solaris.

Changes: More portable.
tags | spoof
systems | linux, solaris, openbsd
SHA-256 | 88ed01c5809275069ed28ab27da53c28745abe567a2e31a9d02b41c7f4067e83
rwwwshell-2.0.pl.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

Reverse-WWW-Tunnel-Backdoor v2.0 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.

Changes: Now has full HTTP v1.0 compliance.
systems | linux, solaris, openbsd, aix
SHA-256 | 012239d21cbf76e09bca91cb3f7c23c5960360129f2f512bc096f55b74fb111a
THC Secure Deletion v2.3
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Secure Deletion v2.3 for UNIX is the latest release of van Hauser's suite of secure deletion and overwriting utilities. Included are 'srm' - secure deletion of files

Changes: Bug fixes.
systems | unix
SHA-256 | 1d5629b0f83a0352b0d2654208ad38a2aee6ce78c9f94f8d2b044b5316b164b7
parasite-1.1.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-Parasite v1.1 allows you to sniff on switched networks by using either ARP Spoofing or MAC Flooding. THC-Parasite is intelligent and its algorithms are designed to bypass the basic switch security.

tags | spoof
SHA-256 | b610d3a1f5525d3b5f3fa41e2d3efb3cfcea5af963e3f4aee759732839b7bf90
wardrive-2.3.tar.gz
Posted Jun 4, 2002
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.3 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Rewrote the GPS data gathering function. Fixed lots of bugs!
systems | linux
SHA-256 | 9810f45f7b163d85d8aaf5092726d2e26ba29ee6171d07999e36a2d771651a0f
amap-0.95.tar.gz
Posted Mar 6, 2002
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap is a scanning tool that allows you to identify the applications that are running on (a) specific port(s). It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

tags | tool, protocol
SHA-256 | 1c3ecd0a4363f4c64267e66bacdc383383ad7bbb4691f4d438aaece8d92ae73d
wardrive-2.1.tar.gz
Posted Oct 12, 2001
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.1 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

Changes: Added -R option to allow wavelan resets after 3 seconds, added -W option to print SSID and access point MAC, added start_wardrive, reset_wvlan.sh, and wardrive.conf, get_coords_from_stat.sh, and clean_stat.sh scripts, and fixed bugs.
tags | tool, wireless
systems | linux
SHA-256 | 8e82cd28f9c5f748d3b29c834dec5b9a6d0ea90c298d41b22c7ce6582952c966
wardrive-2.0.tar.gz
Posted Sep 27, 2001
Authored by van Hauser, thc | Site thc.org

THC-WarDrive v2.0 is a linux based tool for mapping your city for wavelan networks with a GPS device while you are driving a car or walking through the streets. It is effective and flexible, supporting NMEA GPS devices.

tags | tool, wireless
systems | linux
SHA-256 | 867fdb212fef9c2ee86ba52fd23b7ca63a5d5187f61ddb0c34345adb112a82cf
fw-backd.htm
Posted Jan 27, 2000
Authored by van Hauser, thc | Site thc.org

Placing Backdoors Through Firewalls version 1.5 - Hackers often want to retain access to systems they have penetrated even in the face of obstacles such as new firewalls and patched vulnerabilities. To accomplish this the attackers must install a backdoor which does its job is not easily detectable. The kind of backdoor needed depends on the firewall architecture used. As a gimmick and proof-of-concept, a nice backdoor for any kind of intrusion is included.

tags | vulnerability
SHA-256 | 8ef7f3e0278b056d10da9fd260d41e5f483cc869ba0c8728679ae31bf89e3ad2
anonymous-unix-0.9.tar.gz
Posted Oct 7, 1999
Authored by van Hauser, thc | Site thc.org

"Anonymizing UNIX Tools v0.9" - Tools for securing your UNIX systems(s), keeping your data and actions as private as possible, as described in Anonymizing UNIX Systems v0.9 Whitepaper.

systems | unix
SHA-256 | 9a9cb9fff4b40791ac3df85ebeab0f860cc0aa06678868412878fda29e08ace9
rwwwshell-1.6.perl
Posted Oct 7, 1999
Authored by van Hauser, thc | Site thc.org

Reverse-WWW-Tunnel-Backdoor version 1.6 - This backdoor should work through any firewall which has got the security policy to allow users to surf the WWW. Verified to work on Linux, Solaris, AIX and OpenBSD.

Changes: Included www-proxy authentication.
systems | linux, solaris, openbsd, aix
SHA-256 | 2dc02b8a40272350f1c66e2ee87bc8661f905a84b84f532a3a2dc4cd1167027c
Covering Your Tracks
Posted Aug 17, 1999
Authored by van Hauser

Interesting text explaining how to cover your tracks when you leave the system.

tags | paper
SHA-256 | d9c1e68a8518fff37df1b395e9629ff68524e7dd103307da1968cff4bcb1c288
Page 5 of 6
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close