what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 69 RSS Feed

Files from Mixter

Email addressmixter at newyorkoffice.com
First Active1999-09-23
Last Active2006-10-05
libmix-105.tgz
Posted Mar 7, 2000
Authored by Mixter | Site mixter.void.ru

LibMix v1.05 is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread).

tags | spoof
SHA-256 | a43c83e60f1526ed38138346b9102a4cb27bc1531e235eb0bd78c583dea8a013
coding.txt
Posted Feb 25, 2000
Authored by Mixter | Site mixter.void.ru

Coding in C - a summary of some popular mistakes. Most of them are not detected at compile time with all warnings enabled, which makes them very nasty and hard to detect.

SHA-256 | 737d50616c03d55f8e032bb3348892b062e5ced53d2c378786dbda33ef725c28
shlog.c
Posted Feb 25, 2000
Authored by Mixter | Site mixter.void.ru

shlog.c is a small program that will do getpeername on its input descriptor, and log a remote host, if it is invoked via a remote session, along with uid/gid to syslog. can be used as additional logging tool for login shells (by putting it into the system profile).

Changes: This version works.
tags | remote, shell
SHA-256 | bd42d52088d6edf926cf9b9ece53c386df3616f092ad9588f1a8757e43cc353f
tfn3k.txt
Posted Feb 14, 2000
Authored by Mixter

TFN3k is a paper about the future of DDOS tools, how they can be used, and the dangerous features that can and probably will be implemented in the future. Also has information on establishing Network Intrusion Detection (NIDS) Rules for DDOS attacks.

tags | denial of service
SHA-256 | 81f6b4c0bc45d0a32a93a7d9053beb1a229a36193e7cbb36d1a180bcf41cc5f6
pcfs.c
Posted Feb 11, 2000
Authored by Mixter | Site mixter.void.ru

pcfs.c is a tool that creates a fake CFS (cryptographic file system) encrypted directory tree, which is reasonable indistinguishable from a real CFS directory. It proves that just having a CFS styled directory doesn't prove it actually contains real encrypted data.

SHA-256 | cb278ff823f8b81b672492dcb35960e85ed6420efa14288465dab6f4d48d20ae
firstaid.txt
Posted Feb 11, 2000
Authored by Mixter | Site mixter.void.ru

Mixters guide to defending against DDOS - 10 Proposed 'first-aid' security measures which should be implemented by anyone at risk.

tags | denial of service
SHA-256 | a45bc9efc6b77fa911f41e367dd8ef7a0a6a867f5d47435a7fe799d7074c2ae5
webscan.c
Posted Feb 8, 2000
Authored by Mixter | Site mixter.void.ru

webscan.c is a fast multithreaded CGI and HTTP version scanner that is based off cgichk and can easily be updated. the cgi scanning y2k problem has been fixed in this version.

tags | web, cgi
SHA-256 | 372b8f130488d7e78531ef9c5af3f4d89272bf0bea639a363479d76074b96827
virii.tgz
Posted Feb 8, 2000
Authored by Mixter | Site mixter.void.ru

virii.tgz is a collection of files that are supposedly infected by a linux/elf virus that could be out and spreading in the wild. it also contains a detailed description of the suspicious actions the virus performs and the patterns that can be found in the files.

tags | virus
systems | linux
SHA-256 | 691df8cc678c2caba81db01501a7fea033cd8923437ce4c457b094a89f4c0b82
trojans.txt
Posted Feb 8, 2000
Authored by Mixter | Site mixter.void.ru

trojans.txt is a paper that deals with methods of analyzing, debugging and disassembling unix binaries, looking for viruses, trojans and other malicious code.

tags | trojan
systems | unix
SHA-256 | 2f61e64d50b8c2d733f5e9c50f4c109ea0f3666891cdbb2f2f1d557a1acfded7
rawpowr.c
Posted Feb 8, 2000
Authored by Mixter | Site mixter.void.ru

rawpowr.c can access a block device containing an EXT2 file system in raw mode, changing all executables into suid executables. this demonstrates that security can easily be breached as soon as block devices are directly writable by the attacker.

SHA-256 | f5afd86837980a670a4ef1348fba298322ae697efa523ae82d8a9196380a98bf
stasis.c
Posted Jan 28, 2000
Authored by Mixter | Site mixter.void.ru

Stasis is a tool to fool atime/mtime timestamp checking. It records the timestamp of files, then periodically finds atime/mtime changes and restores the old timestamps, as if the files were never accessed / changed.

SHA-256 | eb63609efc1350e5ecc18faffda1b59339dc10d5a460127fa971feb32673d225
ides.c
Posted Jan 24, 2000
Authored by Mixter | Site members.tripod.com

Intrusion Detection Evasion System is a daemon that monitors connections, and forges additional packets to hide from and disturb network monitoring processes of IDS and sniffers. It does this by inserting rst/fin and ack packets with bogus payloads and invalid sequence numbers that only affect network monitors. It also sends a custom amount of SYN requests from arbitrary sources on every real connection attempt it sees, which can for example be used to simulate coordinated scans.

tags | arbitrary
SHA-256 | 70928c72e9594e3b31e86cabaaf959e292ac9e456f7add9f9d4fb015debc78bc
Mixter.doc
Posted Jan 21, 2000
Authored by Mixter, 000 Prize Winner!

Winning Packet Storm Contest Entry - Protecting Against the Unknown - A guide to improving network security to protect the Internet against future forms of security hazards.

tags | paper
SHA-256 | 0e6222b8be5665deed5eefcf97e95600e15395e70fc048b75e1a1963cb6c8da9
Q-1.0.tgz
Posted Jan 18, 2000
Authored by Mixter | Site members.tripod.com

Q 1.0 is a client / server backdoor which features remote shell access with strong encryption for root and normal users, and a encrypted on-demand tcp relay/bouncer that supports encrypted sessions with normal clients using the included tunneling daemon. Also has stealth features like activation via raw packets, syslog spoofing, and single on-demand sessions with variable ports. This version is downward compatible and includes a few bugfixes that make the remote access daemon work reliably.

tags | remote, shell, root, spoof, tcp
SHA-256 | 35ffdfbefeac850bb2ce4ff8a3613dbf68aaa7ef7147b5b4a9a14bcbff725692
webdecoy.tgz
Posted Jan 11, 2000
Authored by Mixter

webdecoy.tgz is a small script that can find, remove and replace vulnerable CGI scripts on the local webserver with "decoy" CGIs, which log exploit attempts.

tags | local, cgi
SHA-256 | 853f3f8326f0656b1f9c046c35b006d4d37ff9fd19357e3909da8eb0e31eb4f8
nsat-1.12.tgz
Posted Jan 11, 2000
Authored by Mixter

Nsat is a fast bulk security scanner designed for long-range scans written in C++ which scans and audits about 60 different services and 170 cgis with different scan intensity.

Changes: Several bugfixes, stability upgrades, 5 new cgi checks, updated vulnerability information and Cisco router detection.
tags | tool, cgi, scanner
systems | unix
SHA-256 | 3ab2a97528f2860fe8da6c53e97c0b30414f7de6150a4d2fb4dfed024c39a521
solinger.c
Posted Jan 5, 2000
Authored by Mixter | Site mixter.void.ru

"solinger" Denial Of Service - bind 8.1.*, 8.2, 8.2.1 - causes a bind8 server to stop responding to requests for up to 120 seconds. Quick proof of concept of the bug pointed out by ISC.

tags | exploit, denial of service, proof of concept
SHA-256 | c00f49a4683589b7cdfeab5c617c94f4a65bf5320693b205eae0c9f7ca5745e1
e4d.tgz
Posted Dec 31, 1999
Authored by Mixter | Site 1337.tsx.org

Echelon for Dummies is a distributed sniffer which tries to show how the "echelon" network could be designed. It uses sniffer servers that can be installed and run on remote hosts, and will dig through local network traffic, useing custom pattern/keyword matching to find packets with interesting content, which are then forwarded to a central loghost on which the logging daemon is run that gathers and logs the data. For stealth purposes, Sniffers and the logger communicate via random protocols and encryption, and are compatible to many Unix systems and NT.

tags | remote, local, protocol
systems | unix
SHA-256 | 70592b2730b49a0cb5f11ce7b3258462d9a60e8f4b8feb94b9d5590f6af2438c
nsat-1.11.tgz
Posted Dec 28, 1999
Authored by Mixter

Nsat is a fast bulk security scanner designed for long-range scans written in C++ which scans and audits about 60 different services and 170 cgis with different scan intensity. Updates in this version include detection of sendmail 8.9 remote exploitability, more CGI scripts that can be used in MDAC IIS attack, improved rpc service and -backdoor scanning, all latest solaris RPC vulnerabilities added, and detection of trinoo distributed DoS masters with default ports.

tags | tool, remote, cgi, scanner, vulnerability
systems | unix, solaris
SHA-256 | 6f56824e13f9d05aa0eb1eef2be048cfcf35fd35354da8cabd0ade5d70de5df4
tfn2k.tgz
Posted Dec 20, 1999
Authored by Mixter | Site 1337.tsx.org

Tribe Flood Network 2000. Using distributed client/server functionality, stealth and encryption techniques and a variety of functions, TFN can be used to control any number of remote machines to generate on-demand, anonymous Denial Of Service attacks and remote shell access. The new and improved features in this version include Remote one-way command execution for distributed execution control, Mix attack aimed at weak routers, Targa3 attack aimed at systems with IP stack vulnerabilities, Compatibility to many UNIX systems and Windows NT, spoofed source addresses, strong CAST encryption of all client/server traffic, one-way communication protocol, messaging via random IP protocol, decoy packets, and extensive documentation. Currently no IDS software will recognise tfn2k.

tags | remote, denial of service, shell, spoof, vulnerability, protocol
systems | windows, unix
SHA-256 | 07f94c742546e490bd6c8ab103c0ffa31399129812380e0bece242fcdf7a4cba
clientexp.tgz
Posted Dec 17, 1999
Authored by Mixter

Paper on exploiting security issues in client and other non-server software. Includes a sample exploit against tar.

tags | paper
SHA-256 | 67a289316796316f40e67df6386dfe291a4eba9fce5c20763db7bc76da920954
spidernet-1.2.tar.gz
Posted Dec 13, 1999
Authored by Mixter

spidernet uses a network of host-based IDS and a logging monitor that allows to watch a large amount of remote systems for file changes of a defined list of files and for promisc network interfaces. Sessions are strongly encrypted with cast, and checksums are generated using the reliable md5 algorithm.

tags | remote
SHA-256 | baf7f2637c9eb566884edd1a273592dc130ba3738d83a677d39d9c9321a2624e
logs.txt
Posted Dec 7, 1999
Authored by Mixter | Site members.tripod.com

Commonly overlooked audit trails on intrusions. This is my attempt of compiling a 'top list' of audit trails that are being left after intrusions where the intruders try to cover their tracks but don't do a good job. To put it short, there are actually a lot of audit trails on a normal UNIX system, which can almost all be overcome, but with some effort, that most intruders evade.

tags | paper
systems | unix
SHA-256 | 62983ffce65d3105e159e3fe5efb6acaa712499108530acd484c96b44d5f628b
exo-0.3.tgz
Posted Dec 7, 1999
Authored by Mixter | Site members.tripod.com

Exo is a handy little tool that 'sweeps' a range of ports on a list of hosts. It works by sending out raw packets and waiting for replies with two separate threads. This method makes exo able to find open ports without any delay, i.e. effectively at the rate that your bandwidth allows. A 56k dialup connection can scan for one open port on 65280 hosts in 160 seconds.

tags | tool, scanner
systems | unix
SHA-256 | a60c48f440035e2d53ede947853d80e3f98e95622144113c2ad58eb2cf57a539
wu25.c
Posted Dec 7, 1999
Authored by Mixter | Site members.tripod.com

Yet another wu-ftpd 2.5.0 exploit, which finds world writable directories automatically. Tested on Redhat5, Redhat6, and Debian linux.

tags | exploit
systems | linux, debian
SHA-256 | 070dcb17b0983c82941c323daaf00a487f9924adb8255f6edc18b6260baabac8
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close