exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files from David Coomber

First Active2006-01-03
Last Active2022-10-14
Panda SM Manager 2.0.10 Certificate Validation Fail
Posted Mar 3, 2016
Authored by David Coomber

Panda SM Manager versions 2.0.10 and below fail to verify the SSL certificate they receive when connecting to a secure site.

tags | advisory
SHA-256 | dfe5300d2107330ced841e180c483ee653bc38ee91c0e0d2ee0ee149d923f6e8
Dell SecureWorks iOS Certificate Validation Failure
Posted Feb 5, 2016
Authored by David Coomber

The Dell SecureWorks iOS application versions 2.0.6 and below do not validate the SSL certificate they receive when connecting to a secure site.

tags | advisory
systems | ios
SHA-256 | e14bb5ea2c56a96650327f66aa9280d786bba3fbf57df445d93d940bb0c67386
Webroot SecureAnywhere Business 1.10.316 SSL Validation
Posted Sep 6, 2015
Authored by David Coomber

Webroot SecureAnywhere Business versions 1.10.316 and below fail to validate SSL certificates.

tags | advisory
SHA-256 | 6616ed1138b3c82afa9932a56e43ce8c705fd7242b264fe7a0bc7e78411b3522
Avira Mobile Security Insecure Transit
Posted Sep 5, 2015
Authored by David Coomber

Avira Mobile Security versions 1.5.7 and below send credentials in the clear over HTTP.

tags | advisory, web
SHA-256 | 07268a63a10e9e04ee38ecd991fda216994295c0b1d633261d7e59f97a112f35
Thycotic Password Manager Secret Server MITM
Posted May 27, 2015
Authored by David Coomber

Thycotic Password Manager Secret Server suffers from a man-in-the-middle SSL certificate verification vulnerability.

tags | advisory
SHA-256 | ca0c577c1b40652ec6da8907fc9e9a09da168ae5fa678784033520dabc1f55de
McAfee Advanced Threat Defense Sandbox Fingerprinting / Bypass
Posted Jan 17, 2015
Authored by David Coomber

McAfee Advanced Threat Defense suffers from sandbox fingerprinting and bypass vulnerabilities.

tags | advisory, vulnerability, bypass
SHA-256 | 2624fb2773fbb3eb3d8992461ab80c9bd568b23d1658a54e5724fd69b9e9c767
p0f 3.07b Windows Port
Posted May 23, 2014
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Version 3 is a complete rewrite of the original codebase, incorporating a significant number of improvements to network-level fingerprinting, and introducing the ability to reason about application-level payloads (e.g., HTTP).

Changes: This is a Windows port of the latest release created by David Coomber.
tags | tool, web, scanner, tcp
systems | unix
SHA-256 | f2dd6d877e15363bbb90325683e06abdd781aa3fa18b4e97de95fd0b8d904817
p0f 3.03b Windows Port
Posted Jan 25, 2012
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Version 3 is a complete rewrite of the original codebase, incorporating a significant number of improvements to network-level fingerprinting, and introducing the ability to reason about application-level payloads (e.g., HTTP).

Changes: This is a Windows port of the latest release created by David Coomber.
tags | tool, web, scanner, tcp
systems | windows
SHA-256 | ae853ced1e0f3446f86a75db60b1aa28e2344aae92002f1ae7860e5b0620124e
p0f-2.0.8-db-20080806.tar.gz
Posted Aug 8, 2008
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

Changes: Added better handling of MySQL error codes.
tags | tool, remote, local, scanner
systems | windows, unix
SHA-256 | b1b3a50167e875ae8a49b1069e893267ee5dd2ab3c6ef6b733760e63b4bdc904
p0f-2.0.8-db-20070919.tar.gz
Posted Sep 20, 2007
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

Changes: Insufficient OS description escapes fixed. Other fixes.
tags | tool, remote, local, scanner
systems | windows, unix
SHA-256 | dd38a277cf5f75bd141c92c52d4a943be4377fb60f3ec5a8fd8b6e6d380f4122
p0f-2.0.8-win32.zip
Posted Jun 19, 2007
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

tags | tool, remote, local, scanner
systems | windows, unix
SHA-256 | e5665aaef9dea1dbdd6c08e7f76453874a605f513f2c431e34a940104a886c8e
macgen.tgz
Posted Jan 3, 2006
Authored by David Coomber, Doug Hoyte | Site info-sec.ca

macgen is a small utility designed to produce a random MAC address.

tags | tool
systems | unix
SHA-256 | e555731bf84423b4d1422136dd8ec47eb0c099ac47a16eb1ca81e690071bf489
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close