what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

Recon Informer 1.2
Posted Oct 6, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.

Changes: Fixed minor window title bug and removed a module.
tags | tool
systems | linux, windows, unix
MD5 | 01e3fdb17ce9ebb4bdd944a17576de40

Related Files

Ubuntu Security Notice USN-1523-1
Posted Aug 6, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1523-1 - It was discovered that the NVIDIA graphics drivers could be reconfigured to gain access to arbitrary system memory. A local attacker could use this issue to gain root privileges.

tags | advisory, arbitrary, local, root
systems | linux, ubuntu
MD5 | 09a33a861a0d135139ea101e70337422
Portspoof Service Signature Obfuscator
Posted Aug 5, 2012
Authored by Piotr Duszynski | Site portspoof.duszynski.eu

The portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports. The general goal of the program is to make the port scanning process very slow and output very difficult to interpret, thus making the attack reconnaissance phase a challenging and bothersome task.

tags | tool
systems | unix
MD5 | 12b4fbe3591f8bdd8f06597a4d89ed53
Ubuntu Security Notice USN-1506-1
Posted Jul 13, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1506-1 - It was discovered that Puppet incorrectly handled certain HTTP GET requests. An attacker could use this flaw with a valid client certificate to retrieve arbitrary files from the Puppet master. It was discovered that Puppet incorrectly handled Delete requests. If a Puppet master were reconfigured to allow the "Delete" method, an attacker on an authenticated host could use this flaw to delete arbitrary files from the Puppet server, leading to a denial of service. Various other issues were also addressed.

tags | advisory, web, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2012-3864, CVE-2012-3865, CVE-2012-3866, CVE-2012-3867, CVE-2012-3864, CVE-2012-3865, CVE-2012-3866, CVE-2012-3867
MD5 | b24b5fccd1a73bb1d4a15a08af33b3b7
Liferay JSON Request Control Takeover
Posted Apr 20, 2012
Authored by Jelmer Kuperus

Liferay Portal suffers from a takeover vulnerability due to a single HTTP request allowing an attacker to reconfigure which memcached to use. Proof of concept code included. Version 6.1 ce is confirmed vulnerable.

tags | exploit, web, proof of concept
systems | linux
MD5 | 842f6b4765772a61cdc4b88e3ce9067f
Ubuntu Security Notice USN-1420-1
Posted Apr 11, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1420-1 - It was discovered that the NVIDIA graphics drivers could be reconfigured to gain access to arbitrary system memory. A local attacker could use this issue to possibly gain root privileges.

tags | advisory, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2012-0946
MD5 | fcf3621d1e929a10c6ff0a8f0afed521
iSpy: Using Reflections To Spy On iPhones
Posted Nov 7, 2011
Authored by Fabian Monrose, Andrew M. White, Rahul Raguram, Jan-Michael Frahm, Dibenyendu Goswami

Whitepaper called iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections. The authors investigate the implications of the ubiquity of personal mobile devices and reveal new techniques for compromising the privacy of users typing on virtual keyboards.

tags | paper
MD5 | 54e86e6fe36f2007f0646dcd130de5e1
Autonomy Keyview Ichitaro Object Reconstruction Logic
Posted Oct 7, 2011
Site secunia.com

Secunia Research has discovered a vulnerability in Autonomy Keyview, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by a logic error in the Ichitaro speed reader (jtdsr.dll) when attempting to reconstruct higher-level objects and can be exploited to cause a heap-based buffer overflow. Successful exploitation may allow execution of arbitrary code. Version 10.3 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2011-0339
MD5 | 29ef3d10b744023a2b425ab168de4956
Secunia Security Advisory 45735
Posted Aug 30, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jose Carlos de Arriba has reported a vulnerability in JAMF Casper Suite, JAMF Recon Suite, and JAMF Imaging Suite, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | e9a85292eb2477b260d7980c813bbe92
QuickRecon 0.3.2
Posted Aug 22, 2011
Authored by Filip Szymanski | Site code.google.com

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

Changes: Improved code. Shodan DB integration.
tags | tool, scanner, python
systems | unix
MD5 | 41f48dd2ee33988d2bf42342a497c1ee
Pentesting In Local Networks Part 1
Posted Jul 1, 2011
Authored by ph0x90bic

Whitepaper called Pentesting in Local Networks Part 1. It discusses performing recon, ARP poisoning, traffic analysis techniques, and more.

tags | paper, local
MD5 | 38898281f2a6ee37346d3adef4d80b39
QuickRecon 0.3.1
Posted May 30, 2011
Authored by Filip Szymanski

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

Changes: Small changes in the GUI.
tags | tool, scanner, python
systems | unix
MD5 | 66a313c9b6301bafb2889965bdff7347
QuickRecon 0.3
Posted May 16, 2011
Authored by Filip Szymanski

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

Changes: Qt4 based GUI. Improved Code.
tags | tool, scanner, python
systems | unix
MD5 | 87af04213091078b37aef1399f9a71c0
QuickRecon 0.2.4
Posted Mar 27, 2011
Authored by Filip Szymanski

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

Changes: Gather email addresses mode improved.
tags | tool, scanner, python
systems | unix
MD5 | aafab2e4fd8280d48a955b843e27be15
ClubHACK Magazine Issue 14
Posted Mar 14, 2011
Authored by clubhack | Site chmag.in

ClubHACK Magazine Issue 14 - Topics covered include JS Recon, remote thread execution in system processes, laws related to unauthorized access, and more.

tags | remote, magazine
MD5 | 6d27fb32f6bca9dfd4d1b8cb6df322a5
QuickRecon 0.2.3
Posted Mar 9, 2011
Authored by Filip Szymanski

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

Changes: Improved error handling.
tags | tool, scanner, python
systems | unix
MD5 | dc9ac6e7242cbc004a6be9d33cfe11ac
RECON 2011 Call For Papers
Posted Mar 7, 2011
Authored by RECON 2011 | Site recon.cx

RECON 2011 Call For Papers - RECON is a security conference taking place in downtown Montreal from July 8th through the 10th.

tags | paper, conference
MD5 | 7ec97d56cee0974e0732ac83a21af9e0
QuickRecon 0.2.2
Posted Feb 16, 2011
Authored by Filip Szymanski

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

Changes: Bug fix release.
tags | tool, scanner, python
systems | unix
MD5 | 0e5adc48a7bc08d11ca9759277f0cd2d
QuickRecon 0.2
Posted Feb 15, 2011
Authored by Filip Szymanski

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

Changes: Bug fix release.
tags | tool, scanner, python
systems | unix
MD5 | 7becb66d6de1b27ce0056b0b86776429
QuickRecon 0.1.2
Posted Feb 7, 2011
Authored by Filip Szymanski

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

Changes: Various updates.
tags | tool, scanner, python
systems | unix
MD5 | dd2b81d6078a04ce941e7481db04fd58
QuickRecon 0.1.1
Posted Feb 1, 2011
Authored by Filip Szymanski

QuickRecon is a python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.

tags | tool, scanner, python
systems | unix
MD5 | 2e76f6e180f5757a5a3e22768205e932
Microsoft IE9 Math.random Vulnerability
Posted Dec 3, 2010
Authored by Amit Klein | Site trusteer.com

The IE9 (platform preview) Javascript Math.random implementation is vulnerable to seed reconstruction. The seed reveals the computer's boot time (and on Windows 7 - also CPU clock speed). These can be used to finger-print computers and track users within the same Windows session even if they close and open their IE9 (platform preview) browser multiple times. Interestingly enough, this technique also provides some information regarding the client hardware (namely clock source and possibly CPU clock speed), and may be used to detect virtualized machines "over the web". Additionally, the Math.random implementation is flawed in such way that it returns non-uniform values (this holds for IE9 beta as well).

tags | advisory, web, javascript
systems | windows, 7
MD5 | dc3a27c47ed6ce29faabb5f4c266ab07
Skipfish Web Application Scanner 1.78b
Posted Nov 23, 2010
Authored by Michal Zalewski | Site code.google.com

Skipfish is a fully automated, active web application security reconnaissance tool. It is high speed, has a low false positive rate, and is easy to use.

Changes: Substantial bugs in coverage and security checks were fixed. Multiple feature and stability improvements were made. Differential scanning tools were added.
tags | tool, web, scanner
systems | linux, unix
MD5 | a9f9eef2f860cadcc86e12785dc3057f
HITB Magazine Volume 1 Issue 4
Posted Oct 10, 2010
Authored by hitb | Site hackinthebox.org

HITB Magazine Volume 1 Issue 4 - Topics include Decrypting TrueCrypt Volumes with a Physical Memory Dump, Reconstructing Dalvik applications using UNDX, Custom console hosts on Windows 7, and more.

tags | magazine
systems | windows, 7
MD5 | 5aebb710bfeb77e099970cc40b272e95
NetReconn Scanning Tool Collection 1.78
Posted Sep 8, 2010
Authored by Jay Fink

Netreconn is a collection of network scan/recon tools that are relatively small compared to their larger cousins. These include nstrobe, ipdump, and ndecode.

Changes: Tools have been collapsed into one front end. Runs faster than previous versions. Experimental passive and ipv6 active scanning has been added.
tags | tool
systems | unix
MD5 | dcfe141a58babc0277f7d58e4102a934
Skipfish Web Application Scanner 1.52b
Posted Jul 23, 2010
Authored by Michal Zalewski | Site code.google.com

Skipfish is a fully automated, active web application security reconnaissance tool. It is high speed, has a low false positive rate, and is easy to use.

Changes: Fixed HTTP read loop after 1.48b.
tags | tool, web, scanner
systems | unix
MD5 | 5ac0a84afa132a5fc302f292c897a954
Page 1 of 4
Back1234Next

File Archive:

December 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    22 Files
  • 2
    Dec 2nd
    33 Files
  • 3
    Dec 3rd
    16 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close