what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

A Vulnerability In Implementations of SHA-3, SHAKE, EdDSA, And Other NIST-Approved Algorithms
Posted Mar 7, 2023
Authored by Nicky Mouha, Christopher Celi | Site eprint.iacr.org

This paper describes a vulnerability in several implementations of the Secure Hash Algorithm 3 (SHA-3) that have been released by its designers. The vulnerability has been present since the final-round update of Keccak was submitted to the National Institute of Standards and Technology (NIST) SHA-3 hash function competition in January 2011, and is present in the eXtended Keccak Code Package (XKCP) of the Keccak team. It affects all software projects that have integrated this code, such as the scripting languages Python and PHP Hypertext Preprocessor (PHP). The vulnerability is a buffer overflow that allows attacker-controlled values to be eXclusive-ORed (XORed) into memory (without any restrictions on values to be XORed and even far beyond the location of the original buffer), thereby making many standard protection measures against buffer overflows (e.g., canary values) completely ineffective.

tags | paper, overflow, cryptography, php, python
advisories | CVE-2022-37454
SHA-256 | e5ce94c802fc96b96a37593074295283819a7abf859a04a1c1cbfcdb566dcdb1

Related Files

grout-pre.tar.gz
Posted Apr 20, 2000
Authored by Ambient Empire

The geographical tracerouter for unix. It combines the fastest tracerouter with the ability to locate where the intermediate machines are located in the world.

tags | tool
systems | unix
SHA-256 | 957f35ba6bc4b75bb8076c3128b95ecfa078b5d0d8f18661cc29bd277d65b82a
lincrack.c
Posted Apr 20, 2000
Authored by w0rm

This is a very flexible, easy to use password cracker for the Linux/Unix platform. Just specify the dictionary file and the passwd file and your set. It attempts to crack each password in the passwd file using the words from the dictionary file.

tags | cracker
systems | linux, unix
SHA-256 | aaa548be3dd9642b28de076a0c47d9219f6698481dd270e20087bb6b40e3c253
ports2.c
Posted Apr 20, 2000
Authored by Dorian Goldman

Port scanner with a nice interface. Prompts for banner.

tags | tool, scanner
systems | unix
SHA-256 | 8bd800104043b93ad61675985333a24b5e4beecff4a27488c42726047481d2a1
f_ps.c
Posted Apr 20, 2000
Authored by telar

Fake PS. A ps trojan that hides multiple services of your choice.

tags | tool, trojan
systems | unix
SHA-256 | 3e09bcc70563d501bf7435df4fda3acaa09a7abdba7db06486c4dfa3bbb3af65
adv5.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in wmcdplay (installed on Halloween 4 Linux) (advisory + exploit

systems | linux
SHA-256 | 6477942c86ee6dd52bac80bf956cbed6863e52d464ae92b66bef9d20f7902b03
adv4.tar.gz
Posted Apr 20, 2000
Authored by teso

vulnerability in atsadc (installed on Halloween 4 Linux) (advisory + exploit)

systems | linux
SHA-256 | 189114c1fe799648b677c16aa36fcc179942f685bacb5b0318c678f0cb0f01b9
x11amp.txt
Posted Apr 19, 2000
Authored by Grampa Elite

Vulnerability: Any user can overwrite any file in the system with x11amp ver .70.

tags | exploit
SHA-256 | f854507d6d5cef408de353bd42cf556273c973adfc5e305c7058e4a61a099eab
ids.ps
Posted Apr 19, 2000

Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection

tags | paper, denial of service
SHA-256 | 2159a30060cec7d5e267b083c2935a46e14e8b1e37d3534565f3efa1ef7b3539
mrtg-2.8.12.tar.gz
Posted Apr 19, 2000

MRTG is a The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing GIF images which provide a LIVE visual representation of this traffic. Check http://www.ee.ethz.ch/stats/mrtg/ for an example. MRTG is based on Perl and C and works under UNIX and Windows NT. MRTG is being successfully used on many sites around the net.

tags | tool, web, perl
systems | windows, unix
SHA-256 | 04f52e0390bd6cc108991b7624c21faa480891f43b97c671a973436de3a5f26b
cnd.txt
Posted Apr 15, 2000

Calling Number Delivery: An explanation of Caller ID and how it works.

tags | telephony
SHA-256 | 63b8cbc2ad0c10c550351d2b5c22369b7301879e7b3adede2c751ae2a07e7fb5
anon_email.txt
Posted Apr 4, 2000
Authored by David Mazi, M. Frans Kaashoek

The Design, Implementation and Operation of an Email Pseudonym Server - Attacks on servers that provide anonymity generally fall into two categories: attempts to expose anonymous users and attempts to silence them. This paper describes the design, implementation, and operation of nym. alias. net, a server providing untraceable email aliases.

tags | paper, protocol
SHA-256 | 0c099b336055f09c9351fc9c1f4348ed952daddd46f6257773bb376358b5bfab
ddos-routing.txt
Posted Feb 24, 2000
Authored by Fernando P. Schapachnik

Distributed Deniel Of Service attacks - A proposal based on routing. This paper describes a technique that -hopefully- can be used to defeat the recent DDOS attacks. The solution presented here is bases on routing. It requires a certain amount of extra network infrastructure.

tags | denial of service
SHA-256 | d4db3368713cb2f7d6a456ebc627dd45e014bc76bf35def353db951d27f392a7
UW-CSE-00-02-01.tgz
Posted Feb 11, 2000
Authored by Stefan Savage | Site cs.washington.edu

This paper describes a technique for tracing anonymous attacks in the Internet back to their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed", source addresses. In this paper we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by an attacker without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed "post-mortem" -- after an attack has completed. We present one implementation of this technology that is incrementally deployable, (mostly) backwards compatible and can be efficiently implemented using conventional technology. In pdf and postscript format.

tags | denial of service, spoof
SHA-256 | bb7e781a8fbc104cfd9119ecf7c8caf54c5aab786c654c2d11dd9b87b1c48922
ssh-1.2.27.tar.gz
Posted Dec 21, 1999

Secure Shell 1.2.27

tags | shell, encryption
SHA-256 | d8019676755739309815d9817b7335f0c3327e2fd6c7be60e4eea1500764d5cd
ssh-2.0.13.tar.gz
Posted Dec 21, 1999

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

tags | remote, shell, encryption
SHA-256 | 449d88890616bf676cfd4765d574bcc00c229de6f95d705ca527a86b5ca61eb9
syn.jpg
Posted Dec 10, 1999
Authored by synnergy

Synnergy Logo

SHA-256 | 7f4dc86b1699f79f287979fb5965ebcbcb44700c6c727c0f27567bfc66c6dbf6
Hacking Root
Posted Aug 17, 1999

Text about hacking from your web browser by checking the PHF bug and some CGI bugs.

tags | paper, web, cgi
SHA-256 | 6083224d95d5acfbc20b146b869d6b1a8aa0534b55712a0e774946fd4dd73105
crh004.zip
Posted Aug 17, 1999
Authored by crh

Issue 4 of the Confidence Remains High e-zine - Contains 1. Generic scanner 2. VITO 3. Jolt.c 4. Phf shell spawning tekneek 5. Hide.c 6. Tridentd.c Phones / Scanning / Radio. 1. Norweigen PABX list.Miscellaneous. 1. Windows trick 2. sIn inf0z 3. DCC trick 4. Mars systems @*.jpl.nasa.gov 5. The issues list 6. Damned warez pups 7. Simple NFS techniques 8. #hebrew 9. Lord Somer

tags | shell, magazine
systems | windows
SHA-256 | ab3673a5fd3d0e022797d0cf47b3f120ea1c2ccd33dc3fe8f05d9a13b0a5aa72
crh005.zip
Posted Aug 17, 1999
Authored by crh

Issue 5 of the Confidence Remains High e-zine - 1. Gerbil.c 2. Replaceit.sh 3. Security.sh 4. Wozzeck.sh 5. Chattr tekneeq Phones / Scanning / Radio. 1. 617 dialups 2. FM radio bugs Miscellaneous. 1. AT&T and Intel assembly syntax 2. sIn inf0z 3. Wassup with NT?! 4. More #hebrew 5. Linking to /dev/zero 6. Creating a crypto-worm (philosophy)

tags | worm, cryptography, magazine
SHA-256 | 3fa51934a88561954c8318ec3d69cf59f1abadc37f847d6bc2e5f99c554cf641
crh006.zip
Posted Aug 17, 1999
Authored by crh

Issue 6 of the Confidence Remains High e-zine

tags | magazine
SHA-256 | c4a0a44b238b7db100423cd98f926f7890008ea6786b74d0a641bfcfd9030a5c
crh007.zip
Posted Aug 17, 1999
Authored by crh

Issue 7 of the Confidence Remains High e-zine - 1. ipwatch.c 2. Automountd remote exploit for SunOS 5.5.1 3. statscan.c - statd scanner 4. FrontPage exploit 5. sunscan.sh 6. classb.c 7. icmp444v.c Phones / Scanning / Radio. 1. Realistic Pro-50 scanner discriminator mod Miscellaneous.1. rpc-stat.pgp 2. If you're really dumb 3. inetd backdoors 4. 0wned 5. dnscan 6. The issues list for 1998

tags | remote, magazine
systems | solaris
SHA-256 | 0000b18b83a8bc1c2fafae6e1a5a952328f0b66526fd26bb4a84e4f2f47c78d8
crh008.zip
Posted Aug 17, 1999
Authored by crh

Issue 8 of the Confidence Remains High e-zine - 1. Jimmy J's "vintage warez" 2. routed remote 3. Wingate scanner 4. LinSniffer 0.666 5. SunOS 5.5.1 in.rshd trojan Phones / Scanning / Radio. 1. Outdials 2. BlueBoxing in the UK in '98 3. UK Phone Definitions and Abbreviations. Miscellaneous. 1. Top 10 reasons why 2. Hacking Digital Unix 4.0 3. FreeBSD 2.2.5 rootkit 4. l0ckd0wn.sh

tags | remote, trojan, magazine
systems | unix, solaris, freebsd
SHA-256 | 8d7a0d6c07136e9c1f56dd87465718cc4042e19e34b5fcb43820fd4cff4bfda8
NoisyBear.class
Posted Aug 17, 1999

Class file for NoisyBear hostile java applet.

tags | java
SHA-256 | 2356e655ef8f65240ce3e9e815263d301aded77d0bb5cda9b8d7d23294d4d67e
NoisyBear.java
Posted Aug 17, 1999

This Java Applet displays a stupid looking bear with a clock superimposed on his belly. It refuses to shut up until you quit the browser. Warning: Hostile applet!

tags | java
SHA-256 | a8fb75cb44029d31c379268156b4ceadae295db0140bc1d061957f3b057e2cfd
NoisyBear.txt
Posted Aug 17, 1999

Small text file on NoisyBear

tags | java
SHA-256 | 44bf00cb1fe432fe31d781a71262f0946a36f00f83328204b43c32407474a753
Page 4 of 4
Back1234Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close