exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Nelson Brito

Email addressnbrito at sekure.org
First Active1999-12-28
Last Active2012-12-24
Exploit Next Generation SQL Fingerprint 1.42.24-102144
Posted Dec 24, 2012
Authored by Nelson Brito | Site code.google.com

The Exploit Next Generation® SQL Fingerprint tool uses a combination of crafted packets for SQL Server Resolution Protocol (SSRP) and Tabular Data Stream Protocol (TDS) (protocols natively used by Microsoft SQL Server) to accurately perform version fingerprinting and determine the exact Microsoft SQL Server version.

Changes: This is the Perl version.
tags | tool, scanner, protocol
systems | linux, unix
SHA-256 | a9da9389d828f4a7b3af5d779e87fb3ae513be7cc7645331252f6b8c668f4c79
Exploit Next Generation SQL Fingerprint 1.12.120115/RC0
Posted Jan 16, 2012
Authored by Nelson Brito

The Exploit Next Generation® SQL Fingerprint tool uses well-known techniques based on several public tools capable of identifying the Microsoft SQL Server version (such as: SQLping and SQLver), but, instead of showing only the "raw version" (i.e., Microsoft SQL Version 10.00.2746), the Exploit Next Generation® SQL Fingerprint shows the mapped Microsoft SQL Server version (i.e., Microsoft SQL 2008 SP1 (CU5)).

tags | tool, scanner
systems | windows
SHA-256 | bf4a7c2d83f70c89142fb442c4c5a64539b4f8b6d26e806e53e2c6a7329d4ac4
Permutation Oriented Programming
Posted Jul 23, 2011
Authored by Nelson Brito | Site code.google.com

Permutation Oriented Programming (formerly known as Exploit Next Generation) introduces a different and powerful approach to IDS/IPS subversion. It can be applied to almost all vulnerabilities and targets the vulnerability triggers. Slides and various code examples are provided.

tags | paper, vulnerability
systems | linux
SHA-256 | a8f327e035945e95529355ad1c6e409b7ebe3f14585a03c7a2bbd9196ba731ea
T50 Sukhoi PAK FA Mixed Packet Injector 5.3
Posted Apr 25, 2011
Authored by Nelson Brito | Site fnstenv.blogspot.com

T50 Sukhoi PAK FA Mixed Packet Injector (f.k.a. F22 Raptor) is a tool designed to perform "Stress Testing". It is a powerful and an unique packet injection tool. The author has added in some anti-kiddo tricks.

Changes: New license (GPL 2.0), CIDR support added, eleven new protocols added, encapsulation, and more.
tags | tool, scanner
systems | unix
SHA-256 | 80f68d67528814b6f2516915067c0d6a66ade4ee9ca86e4b79355e57a18fdfbe
T50 Sukhoi PAK FA Mixed Packet Injector 2.45r-H2HC
Posted Jan 11, 2011
Authored by Nelson Brito | Site fnstenv.blogspot.com

T50 Sukhoi PAK FA Mixed Packet Injector (f.k.a. F22 Raptor) is a tool designed to perform "Stress Testing". It is a powerful and an unique packet injection tool. The author has added in some anti-kiddo tricks.

tags | tool, scanner
systems | linux, unix
SHA-256 | 1a4f11b993b8a80388bd33f4cc736819517ff227be6e83f04f3403aa15bb4234
ENG_in_a_nutshell.pdf
Posted Oct 7, 2008
Authored by Nelson Brito

Exploit Creation - The Random Approach. A paper about using Encore Next Generation techniques to create exploits.

tags | paper
SHA-256 | f3cb8d8b88ca60c6aa32ef8d30eccb4d594744d759477f4b2a3fa7bcc60405d3
eng-4.23-public.rar
Posted Sep 20, 2008
Authored by Nelson Brito

ENG, or Encore Next Generation, is a false-negative morphic tool that can bypass IDS/IPS via the randomization of return addresses, random writable addresses, junk code injection, and more.

tags | tool, intrusion detection
systems | unix
SHA-256 | 98147acc62fc6afb8a017830278e2f8800d2ded4cc07b1e6e2a203b3c93a17d2
nng-4.13r-public.rar
Posted Sep 17, 2008
Authored by Nelson Brito

NNG is a tool that creates crafted packets to cause MS02-039 false-positives against IPS/IDS. NNG does not have the same approach used by Snot and Stick, where the main goal is DoSing the IPS. Instead, NNG tries to make IPS/IDS "numbed" enough to have the leakage of real attack.

tags | tool, intrusion detection
systems | unix
SHA-256 | f759bdb230d8d7811722b13de7ab29bac3a81015503ca1f914d35ddf568cc0b0
nb-isakmp.pl
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.pl is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. Perl version.

tags | exploit, remote, denial of service, perl, proof of concept
systems | windows
SHA-256 | 6ef25b8d1ba114841a8d4ccc55e140f50dd17a4700763333202bc66f1293b338
nb-isakmp.c
Posted Dec 26, 2001
Authored by Nelson Brito | Site nelson.wwsecurity.net

Nb-isakmp.c is a proof of concept exploit for Bugtraq # 3652 - ISAKMP/IKE remote denial of service against Win2k. This code may exploit other bugs as well. C version.

tags | exploit, remote, denial of service, proof of concept
systems | windows
SHA-256 | f5486daacf1b331ad898ccb4e9629d84abc8a606c7e8d3b2b80234edda1df027
signatures.tgz
Posted Jul 31, 2000
Authored by Nelson Brito | Site stderr.sekure.org

Signatures.pl is a tool to check fingerprint signatures. Tested on Linux, all comments are in Portugese.

systems | linux, unix
SHA-256 | 853e57deb8cc4ec4067d2875ab05a7fcfe9615041b0d8641fc515bce387f6cd9
farpce.pl
Posted Apr 19, 2000
Authored by Nelson Brito | Site stderr.sekure.org

farpce.pl - Force ARP Cache Entries. Force ARP Cache Entries Perl Script was designed to help System/Network administrators to prevent ARP Cache Poisoning / ARP spoofing. It's a simple and powerful perl script, based on forcehwaddr by John Goerzen.

tags | perl, spoof
systems | unix
SHA-256 | 901b59be0ff785bba17c8553b59e3c1d7e22c94ccfcbf9bb9750261bd81ae958
nadas
Posted Dec 28, 1999
Authored by Nelson Brito

The Real Log Clean for Linux OS - Cleans logs under linux and tests the attributes in Ext2fs.

tags | system logging
systems | linux, unix
SHA-256 | d4951b8435f5e9459b7093cfd71f19f94acf17d0720fd17a57b68b16a7834907
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close