what you don't know can hurt you
Showing 1 - 25 of 38 RSS Feed

Files

NTP Denial Of Service
Posted Feb 17, 2014
Authored by ShadowHatesYou

This is a small perl script called NTP DRDoS which is a denial of service tool for use against NTP.

tags | denial of service, perl
MD5 | 2d962184caf83044296ccfae04065109

Related Files

NTPsec 1.1.2 ntp_control Null Pointer Dereference
Posted Jan 16, 2019
Authored by Magnus Klaaborg Stubman

NTPsec version 1.1.2 suffer from a null pointer dereference vulnerability in ntp_control.

tags | exploit
advisories | CVE-2019-6445
MD5 | 221111085dd241b948c35bf89c3810ab
NTPsec 1.1.2 ntp_control Out-Of-Bounds Read
Posted Jan 16, 2019
Authored by Magnus Klaaborg Stubman

NTPsec version 1.1.2 suffers from an out-of-bounds read vulnerability in ntp_control.

tags | exploit
advisories | CVE-2019-6444
MD5 | 46587dc2cfbba65855cf0240c0c8560f
NTPsec 1.1.2 config Out-Of-Bounds Write
Posted Jan 16, 2019
Authored by Magnus Klaaborg Stubman

NTPsec version 1.1.2 suffer from a config related out-of-bounds write vulnerability.

tags | exploit
advisories | CVE-2019-6442
MD5 | f2bfd49b7a043ceaa0774df14e754f31
NTPsec 1.1.2 ctl_getitem Out-Of-Bounds Read
Posted Jan 16, 2019
Authored by Magnus Klaaborg Stubman

NTPsec version 1.1.2 suffers from an out-of-bounds read vulnerability in ctl_getitem.

tags | exploit
advisories | CVE-2019-6443
MD5 | 069688fb7dacc5d4cc815d6201c09963
ntpd 4.2.8p10 Out-Of-Bounds Read
Posted Nov 15, 2018
Authored by Magnus Klaaborg Stubman

ntpd version 4.2.8p10 out-of-bounds read proof of concept exploit.

tags | exploit, proof of concept
advisories | CVE-2018-7182
MD5 | a3796c56972d661561564cb59bda9084
NetworkManager Daemon Command Execution
Posted Sep 6, 2018
Authored by FX, Sameer Goyal

This is a small tutorial write up that provides a DynoRoot exploit proof of concept.

tags | exploit, proof of concept
advisories | CVE-2018-1111
MD5 | 34564033c2577542c76d3de9c82d2615
ntp 4.2.8p11 Local Buffer Overflow
Posted Jun 21, 2018
Authored by Fakhri Zulkifli

ntp version 4.2.8p11 local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
advisories | CVE-2018-12327
MD5 | 2fd8ead2c4c5a791240661a169476a78
NTP Privilege Escalation
Posted Apr 1, 2017
Authored by halfdog

NTP suffers from a privilege escalation vulnerability.

tags | exploit
advisories | CVE-2016-0727
MD5 | f0332636d6c950483b8adc38e39c671a
ntpd 4.2.8 Stack Overflow Proof Of Concept
Posted Nov 30, 2016
Authored by N_A

Remote ntpd version 4.2.8 stack overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
MD5 | 736431083273dddf2edec7ebea2090c2
NTP 4.2.8p3 Denial Of Service
Posted Nov 25, 2016
Authored by Magnus Klaaborg Stubman

NTP version 4.2.8p3 suffers from a denial of service vulnerability.

tags | exploit, denial of service
advisories | CVE-2015-7855
MD5 | 0db2a24411693e3343d677a90ea11f8a
Linux ntpd 4.2.8 derive_nonce Stack Overflow
Posted Nov 25, 2016
Authored by Todor Donev

Linux ntpd 4.2.8 derive_nonce remote stack overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
systems | linux
MD5 | 82c7c116090828fd0e56ef327c62c461
ntpd 4.2.7.p22 / 4.3.0 Denial Of Service
Posted Nov 22, 2016
Authored by Magnus Klaaborg Stubman

ntpd versions 4.2.7p22 up to but not including 4.2.8p9 and 4.3.0 up to, but not including 4.3.94 suffer from a remote denial of service vulnerability. The vulnerability allow unauthenticated users to crash ntpd with a single malformed UDP packet, which cause a null pointer dereference.

tags | exploit, remote, denial of service, udp
advisories | CVE-2016-7434
MD5 | be759033c96dac4a8b8ca928858c34f1
Ntpd ntp-4.2.6p5 ctl_putdata() Buffer Overflow
Posted Feb 16, 2016
Authored by Marcin Kozlowski

Ntpd versions ntp-4.2.6p5 and below ctl_putdata() buffer overflow exploit.

tags | exploit, overflow
MD5 | cf5f515d92a7b19604afb18d863b1a15
Shell Shock Auto Exploitation Script
Posted Oct 6, 2015
Authored by Rafay Baloch

This is a small python script that will enumerate through a list of targets and test their user agent for the shellshock vulnerability.

tags | exploit, tool, python
MD5 | 46a727bfeb409d8d5ff59e33fd541e66
NTP MON_GETLIST Query Amplification DDoS
Posted Jul 9, 2015
Authored by Todor Donev

A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publicly accessible NTP servers to overwhelm a victim system with UDP traffic. The NTP service supports a monitoring service that allows administrators to query the server for traffic counts of connected clients. This information is provided via the "monlist" command. The basic attack technique consists of an attacker sending a "get monlist" request to a vulnerable NTP server, with the source address spoofed to be the victim's address. This tool is a proof of concept that demonstrates this attack.

tags | exploit, denial of service, udp, spoof, protocol, proof of concept
MD5 | 927b290ed377bd2256daf8009c796658
Ntpdc 4.2.6p3 Buffer Overflow
Posted Jan 9, 2015
Authored by drone

Ntpdc version 4.2.6p3 suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
MD5 | 88d7b0cb49729812c8fda28923df10c3
NTP Amplification Denial Of Service Tool
Posted Jul 16, 2014
Authored by DaRkReD

Proof of concept code to exploit an NTP amplification attack. Written in Python.

tags | exploit, proof of concept, python
advisories | CVE-2013-5211
MD5 | 6c5cf2590eeeddb61a8253c5713431c3
NTP DDoS Amplification
Posted May 5, 2014
Authored by Danilo PC

NTP distributed denial of service amplification tool that uses "get monlist".

tags | exploit, denial of service
advisories | CVE-2013-5211
MD5 | f71733635049c1f598c2587ce3e48bd8
NTP DDoS Amplification
Posted Apr 28, 2014
Authored by Danilo PC

NTP ntpd monlist query reflection denial of service exploit.

tags | exploit, denial of service
advisories | CVE-2013-5211
MD5 | ce7b989c80bd3e604a329625563a56e2
NTP Spoofed "monlist query" Denial Of Service Proof Of Concept
Posted Mar 19, 2014
Authored by Mark Osborne

NTP_SPQUERY.C is a spoofed "monlist query" program which can generate packets like those used in reflected amplification NTP attacks that were common in early 2014. Written entirely in C, it requires no special libs or header files. It has been designed to run on most LINUXs.

tags | exploit, denial of service, spoof, proof of concept
MD5 | b1b7e74fd45bd5a336855af010521b6e
Binary 2 Shellcode
Posted Feb 24, 2013
Authored by Hamza Megahed | Site hamza-mega.blogspot.com

This is a small tool that will convert a binary to shellcode. Additional usage information can be found via the homepage link.

tags | tool, shellcode
systems | unix
MD5 | bd76bb9ae846e23bbc92700e0fce641c
PHP Data Stream File Inclusion To Command Execution Tool
Posted Jan 21, 2013
Authored by infodox

This is a small proof of concept tool that leverages the data:// stream to gain remote code execution from a file inclusion vulnerability.

tags | remote, code execution, proof of concept, file inclusion
MD5 | 69dd6d5717304dbb657405d2903b0b06
EAZY Web Scanner
Posted Oct 22, 2012
Authored by r0ckin

This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.

tags | tool, shell, scanner, php, python
systems | unix
MD5 | ab41fed27a614c86292d0168f1d29d3a
darkBC Python Connect-Back Script
Posted Feb 24, 2012
Authored by baltazar

This is a small connect-back script written in Python.

tags | tool, rootkit, python
systems | unix
MD5 | 2a7f1e94c35ca603a309de806dfd4ef6
PgSql Brute Force
Posted Jan 31, 2012
Authored by James Stevenson | Site stev.org

This is a small application built to demo the weakness in pgsql and networking. It is capable of running login attempts from multiple threads in parallel and can run up to 1024 concurrent connections.

tags | tool, cracker, sql injection
MD5 | 03063b5fb60455e221127d4bf6e4ed58
Page 1 of 2
Back12Next

File Archive:

January 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    8 Files
  • 2
    Jan 2nd
    11 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    2 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    18 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    10 Files
  • 10
    Jan 10th
    13 Files
  • 11
    Jan 11th
    2 Files
  • 12
    Jan 12th
    4 Files
  • 13
    Jan 13th
    21 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    12 Files
  • 16
    Jan 16th
    18 Files
  • 17
    Jan 17th
    11 Files
  • 18
    Jan 18th
    3 Files
  • 19
    Jan 19th
    2 Files
  • 20
    Jan 20th
    15 Files
  • 21
    Jan 21st
    21 Files
  • 22
    Jan 22nd
    19 Files
  • 23
    Jan 23rd
    19 Files
  • 24
    Jan 24th
    11 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close