exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2002-08-27

Linux 2.2.20 Stealth Patch
Posted Aug 27, 2002
Authored by Sean Trifero | Site innu.org

The Stealth Kernel Patch for Linux v2.2.20 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.

Changes: Now works with kernel v2.2.20.
tags | kernel, tcp, patch
systems | linux, unix
SHA-256 | c5848d9fd5af0164aee0fca477ec5c21e39ce2cade88a6e50fd1b459e1b2bfa5
Linux 2.2.21 Stealth Patch
Posted Aug 27, 2002
Authored by Sean Trifero | Site innu.org

The Stealth Kernel Patch for Linux v2.2.21 makes the linux kernel discard the packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags. Does a very good job of confusing nmap and queso.

Changes: Now works with kernel v2.2.21.
tags | kernel, tcp, patch
systems | linux, unix
SHA-256 | 99738a62126c4165132bf7eefd3fe9cfe6759da6566671e53723ef5e13215b2f
stealth.c
Posted Aug 27, 2002
Authored by Sean Trifero | Site innu.org

Stealth.c is a Linux 2.2.x kernel module which discards packets that many OS detection tools use to query the TCP/IP stack. Includes logging of the dropped query packets and packets with bogus flags.

tags | kernel, tcp
systems | linux
SHA-256 | 617372d951b886ece66db028d0d134637d1a62f13ff55eb4e94be19b042ea7a4
ecrack-1.0.tgz
Posted Aug 27, 2002
Authored by Sean Trifero | Site innu.org

ECrack v1.0 - Energymech (StarGlider Class - IRC bot) brute force password cracker. Tested with emech-2.99.65 but should work with other versions also.

tags | cracker
SHA-256 | 6a6306078b8ec81f2f6aeac1743765e0efc9a5f9f11bbb112fe6a22cac4160db
UNFburninhell1.0.tar.gz
Posted Aug 27, 2002
Authored by Byterage | Site u-n-f.com

Burncrack is a burneye cryptographic layer 1 & 2 cracker which can work together with john the ripper for password generation. It can crack and unwrap burneye layer 1 and layer 2 protected binaries without having to run them, on both windows (Cygwin) and linux platforms.

systems | linux, windows, unix
SHA-256 | 4bd45ab82150e82102a11bddd896f81fc3cb82859ae990319935b62731410e09
SMBdie.zip
Posted Aug 27, 2002
Authored by Zamolx3

SMBdie is a proof of concept tool which crashes Windows machines with Netbios enabled by sending a specially crafted SMB request. Tested against Windows NT/2k/XP/.NET RC1.

tags | exploit, proof of concept
systems | windows
SHA-256 | 5b21793e665c14f40e6ca342af31b249f2d4e215b15cdc697564836471942749
gdam123-expl.c
Posted Aug 27, 2002
Authored by netric, Sacrine | Site netric.org

Local proof of concept exploit for the gdam123 software package. Exploits an unchecked buffer in filename option.

tags | exploit, local, proof of concept
SHA-256 | 79b4ed49fba81c1e9bbe29fb3aacdd661eeb60bcd533162c9e334f350afee027
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close