Twenty Year Anniversary
Showing 1 - 8 of 8 RSS Feed

Files Date: 2016-10-02

Nmap Port Scanner 7.30
Posted Oct 2, 2016
Authored by Fyodor | Site

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Integrated 12 IPv6 OS fingerprint submissions from June to September. Added 7 NSE scripts, from 3 authors, bringing the total up to 541. New service probes and match lines for DTLS, IPMI-RMCP, MQTT, PCWorx, ProConOS, and Tridium Fox. Various updates and fixes.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | a46631700c796be1ce24c261c36f46a7
Ansvif 1.6
Posted Oct 2, 2016
Authored by Marshall Whittaker | Site

Ansvif is "A Not So Very Intelligent Fuzzer". It feeds garbage arguments and data into programs trying to induce a fault.

Changes: This release includes lots of bug fixes, and better Windows compatibility. Now there is no need for the extra .dll files in the Windows version.
tags | tool, fuzzer
systems | unix
MD5 | 78574201a60bed0e73d23ea05e7aa536
Mandos Encrypted File System Unattended Reboot Utility 1.7.11
Posted Oct 2, 2016
Authored by Teddy | Site

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: Various updates.
tags | tool, remote, root
systems | linux
MD5 | 229876166a00ef3814c4c34d781dd765
Ghostscript -dSAFER Not Working
Posted Oct 2, 2016
Authored by Tavis Ormandy, Google Security Research

The ghostscript -dSAFER parameter that is used when handling untrusted documents appears broken on multiple distributions. This could result in arbitrary file disclosure on systems that process pdf, ps, use ImageMagick or graphicsmagick, etc.

tags | exploit, arbitrary
MD5 | 90b620e820ea623c87fbe30ee96b9162
Adobe Flash AVC Slice Decoding Crash
Posted Oct 2, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from an AVC slice decoding crash.

tags | exploit
advisories | CVE-2016-4275
MD5 | aaed35974f44c7be3f4fe2a7fffefcbd
Apache Tomcat 8.0.36-2 Privilege Escalation
Posted Oct 2, 2016
Authored by Dawid Golunski

Apache Tomcat versions 8.0.36-2 and below, 7.0.70-2 and below, and 6.0.45+dfsg-1~deb8ul and below suffer from a local root privilege escalation vulnerability.

tags | exploit, local, root
advisories | CVE-2016-1240
MD5 | dcf2beeda84d1c33b8f60d5b10460d33
Adobe Flash MP4 Processing Overflow
Posted Oct 2, 2016
Authored by Google Security Research, natashenka

Adobe Flash suffers from an overflow vulnerability when processing MP4 files.

tags | exploit, overflow
MD5 | 72ad99113deffc2e9fc3083e7aad3fb0
Android Pointer Leak
Posted Oct 2, 2016
Authored by Jann Horn, Google Security Research

Android suffers from a pointer leak via insufficient binder message verification.

tags | exploit
MD5 | 2c65be36bddd12222ba4e9453022a4f4
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    8 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By