exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from Ben-z

Email addressbentothez at phayze.com
First Active1999-08-17
Last Active2001-05-30
tyrone1.tgz
Posted May 30, 2001
Authored by Ben-z | Site og.chickenz.net

Tyrone is a difficult to trace DoS tool for Linux which uses Back Orifice servers.

tags | denial of service
systems | linux
SHA-256 | a681fc113a8a1846f8afc61b05d832a7392968c7ec8999f6404693bd5e02ebcc
smailx.sh
Posted Nov 30, 1999
Authored by Ben-z

remote root exploit for Smail-3.2 (rpmmail). A vulnerability exists in the rpmmail package distributed on the Red Hat 6.0 Extra Applications CD. The potential compromise for this bug could be remote or local root or simply remote command execution as "nobody" or similar, depending on your system configuration.

tags | exploit, remote, local, root
systems | linux, redhat
SHA-256 | 380aa4640a74c6d87378d77d01c5f3879de78c5d2ef92d148aed6914b118f849
vanilla.sh
Posted Aug 17, 1999
Authored by Ben-z

vanilla.sh is a simple tcp portscanning utility (ala strobe) for non-root users.

tags | tool, root, scanner, tcp
systems | unix
SHA-256 | df7ee633d00543af46c74fcd40d7f96b02a7e2f245e8e5befd8ca2ca928642b9
fts-rvscan.v1-b1.tgz
Posted Aug 17, 1999
Authored by Ben-z

rvscan v1b1 (remote vulnerability scanner) determines the remote operating system, then procedes to find common vulnerabilites. Checks for over 30 cgi scripts, and 15 exploits.

tags | tool, remote, cgi, scanner
systems | unix
SHA-256 | 260c1846c6792e67358e0f7156e244b150c96c2670848a488aeff188a0172607
fts-rvscan.v1-r1.tgz
Posted Aug 17, 1999
Authored by Ben-z

rvscan v1r1 (remote vulnerability scanner) determines the remote operating system, then procedes to find common vulnerabilites. New features: dual OS guessing [telnet banner grabbing + nmap OSScan], remote exploit checks [bind, imap, wuftpd, rpc.mountd, qpop, sendmail, iquery], multiple pop3 authentication, anonymous ftp services, httpd exploits [cold fusion, website pro, frontpage extensions, 52 vulnerable cgis], icmp echo filters, nfs exports, and over 10 sendmail holes.

tags | tool, remote, cgi, scanner, imap
systems | unix
SHA-256 | e44176c5b6ea2b5da009552a9f0f57757eef89b89be216afe4a110eddfff5648
fts-rvscan.v2-b3.tgz
Posted Aug 17, 1999
Authored by Ben-z

rvscan v2b3 (remote vulnerability scanner) determines the remote operating system, then procedes to find common vulnerabilites. New features: scans for more exploits, code optimizations.

tags | tool, remote, scanner
systems | unix
SHA-256 | 5e27f7767dfd2fa645716d31e4fd86aeabb8454b21e9d8663391eec5d2125612
tcplog
Posted Aug 17, 1999
Authored by Ben-z

Simple shell script that utilizes tcpdump to log all network traffic to /var/log/tcplog.

tags | shell, system logging
systems | unix
SHA-256 | 70d15b8c6211b38581e817cfaa17d53e03cc395c63950af2b9b91d18796ce192
lsekure.v1-alpha3.fts.tgz
Posted Aug 17, 1999
Authored by Ben-z

lsekure v1a3 (local [linux] security auditing tool) checks for several local security holes.

tags | local
systems | linux, unix
SHA-256 | 17c346dad73f0dd8dd1792d4d3e521a5e034b3227ff4ea63cee02bc80baae859
ng.sh
Posted Aug 17, 1999
Authored by Ben-z

ng.sh (netgaurd v1a1) uses tcpdump monitor for common attacks and then activates ipfwadm.

tags | tool, intrusion detection
systems | unix
SHA-256 | 6eec12f70551fb2ed4f635e522c8517f376c837a4ff7f81b587f7fb02a076cf3
fehmalfv1.tgz
Posted Aug 17, 1999
Authored by Ben-z

New Denial of Service suite that utilizes Back Orifice servers to launch very effective "spoofed" smurf-like attacks with malformed packets and a very impressive amplification ratio.

tags | exploit, denial of service, spoof
SHA-256 | f7734d4876141f17b8d3a8d7cb53270036699186d63d4f46c2f3eb2a40b3585b
fawx.c
Posted Aug 17, 1999
Authored by Ben-z

fawx.c is an igmp-8+frag attack for linux, similar to ssping.c, that sends oversized fragmented IGMP packets to a box either making it freeze (WinNT/9x), or lagging it to hell and back. Since most Win32 firewalls dont support IGMP, the attack successfully penetrates most systems, making it much more effective than an ICMP attack which is likely to be filtered. It has successfully crashed NT4.0+sp1+2, Win95, Win95 with ConSeal PC firewall blocking icmp, Win95 with McAfee PC firewall. It also passed undetected through ipfwadm and ipchains (useful for flooding).

tags | exploit
systems | linux, windows
SHA-256 | 3bceefae0c99f8589c025cb707a2813f18fb5385a697fd53eb3a30be6fce1021
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close