exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2003-07-22

simple.pl
Posted Jul 22, 2003
Authored by Fugi

Simple brute forcing utility to audit Cisco network devices.

systems | cisco
SHA-256 | 401085ebf79d3df4a0fa20d1ad5e10d72692d708ae9f4977f598fece73242f47
amap-4.0.tar.gz
Posted Jul 22, 2003
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Amap Version 4.0 is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Rewritten from scratch to enhance speed and reliability. There are also new features, better documentation, and various other bug fixes.
tags | tool, protocol
SHA-256 | 2093ae53f387b8dfbd45483389d5031cf82dd14770bd294b48f87d7917b52210
hh7.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 7: Covert Channel and Tunneling over the HTTP protocol, Generic attacks against a honeypot, Innovative Mailbombs, New Beginnings, Technology without policy.

tags | web, protocol
SHA-256 | 3c4bb0c48243e32d61174cb50c3253882eb3d7f5615d6df939802de15c17ffec
hh6.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 6: Shellcode : The assembly cocktail, Interview - Dan Verton, Applying steganography.

tags | shellcode
SHA-256 | 44ca03ac7c42be247785655fd267025aa6dc41cc553ed8ee8b21b1eb53504f38
hh5.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 5: An unwired Universe, Tales from the Void - assorted topics including race conditions and algorithms, safe security practises etc.

SHA-256 | 8a72b9c0133b4795344bc8556a4982a0030c31d4decd4b2bc3c5f5ca601dd4ab
hh4.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 4: Reviewing buffer overflow issues/concepts covered in Aleph One's seminal paper, Conclusion of "Advanced Meal - A keylogger in an API", Report on the forensics experiment.

tags | overflow
SHA-256 | 394cc60c5406a5c4298bef738a6be77237f8f0304d005f15e31e248a1a992ee9
hh3.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 3: Keylogger in an API (Continued from #2), H/P/V - The Inc. story, Welcome to my world.

SHA-256 | 222901ce3fa1ea6d8a67ff80dfe02f2562101f68532a36aa9e0c978e5e4e1b80
hh2.html
Posted Jul 22, 2003
Authored by hh | Site infosecwriters.com

The Hitchhiker's World Issue 2: Notes on Win32 programming, Keylogger in an API (Part #1).

systems | windows
SHA-256 | b14b00ecbe106388135e2485324abe441bf8fb645734512698128c6f86ff1040
insider.zip
Posted Jul 22, 2003
Authored by Nick Snickers | Site www15.brinkster.com

Insider v1.0 is a utility to set up a reverse backdoor for Win32 platforms that simply connects out to a server over HTTP and has the server tunnel commands back over the inbound connection.

tags | web
systems | windows
SHA-256 | e7cece4e645fed1621351c2637c92bedb0b538088336909aa2a135779cbbd731
lsdRPC.txt
Posted Jul 22, 2003
Authored by The Last Stage of Delirium | Site lsd-pl.net

Confirmation and further information regarding RPC attack vectors with Microsoft Windows.

tags | advisory
systems | windows
SHA-256 | d8522d29d9ba80a1c53f25e4a2e0cd28f9335ba6c03d7a01da14c21111376bab
0x333bru-fmtx.c
Posted Jul 22, 2003
Authored by nic | Site 0x333.org

Local root exploit for bru, or Backup and Restore Utility for Unix, that makes use of a stack overflow.

tags | exploit, overflow, local, root
systems | unix
SHA-256 | b98536c6e1a3e49c1d82ad082df3d8a82a78354fe1ccb3989ef8cca6e6886949
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close