Exploit the possiblities
Showing 1 - 11 of 11 RSS Feed

Files

finger.htm
Posted Apr 27, 2000
Authored by Lance Spitzner | Site enteract.com

Passive Fingerprinting is a method to learn more about the enemy, without them knowing it. Specifically, you can determine the operating system and other characteristics of the remote host using nothing more then sniffer traces. Though not 100% accurate, you can get surprisingly good results by looking at the TTL, TOS, Window Size, and DF bit. Includes information on changing your machines fingerprint on Linux and Solaris.

tags | paper, remote
systems | linux, unix, solaris
MD5 | 8bee07cbafbcbd2801a8aff717f7959d

Related Files

FingerTec Default Root Password / Remote Enrollment
Posted Jan 12, 2016
Authored by Daniel Lawson

FingerTec devices have a default root password that allows for remote enrollment.

tags | exploit, remote, root
MD5 | ce2fe3a49eb7de45039888fc293ea5d6
SinFP3 Fingerprinting Tool 1.00
Posted Sep 27, 2012
Authored by GomoR | Site networecon.com

SinFP3 is a complete framework for network discovery. Its main purpose is to perform active fingerprinting, but it can also do passive fingerprinting. Both modes are available over IPv4 and IPv6. This new version introduces a plugin-based architecture, allowing anyone to develop their own tools around the framework.

tags | tool, scanner
systems | unix
MD5 | 73c1155f61818b5d1407d6577d9fab76
fingerd.zip
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | a8d2b5d2ad73353de0585c641e3dbf0f
fingerd.zip
Posted Aug 26, 2002

Fingerd backdoor - finger a certain username, and

tags | bbs
MD5 | e9b9aa7db232c20843ac3041cd874637
fingerprinting-2.txt
Posted Mar 8, 2002
Authored by Zenomorph | Site cgisecurity.com

Fingerprinting Port 80 Attacks - A look into web server, and web application attack signatures, Part Two. Includes fingerprints, advanced fingerprints, cross site scripting examples, modified headers, more encoding, webserver codes and logging, and more.

tags | paper, web, xss
MD5 | 017c5af72321622e81779bcd097b07fa
fingerd-cgi.txt
Posted Nov 22, 2001
Authored by gobbles | Site bugtraq.org

Berkeley finger.cgi has a remote command execution vulnerability because it does not strip out newlines.

tags | exploit, remote, cgi
MD5 | 9684aed3ac871b146dc84de43c08404f
fingerprint-port80.txt
Posted Nov 6, 2001
Authored by Zenomorph | Site cgisecurity.com

Fingerprinting Port 80 Attacks - This paper looks at some of the signatures that are used in web server attacks and what to look for in your logs.

tags | paper, web
MD5 | 75f97cc427a782ee2a221d5344634bbd
netsec23.txt
Posted Jul 24, 2000
Site net-security.org

Weekly Newsletter from Help Net Security Issue 23 - 24.07.2000 - Covers weekly roundups of security related events. In this issue: Roxen v2.0.68 vulnerability, Local INN vulnerability, Outlook Persistant mail-browser link, Outlook malformed Email header vulnerability, O'Reilly Website Professtional overflow in webfind.exe, Ikey 1000 problems, HP Jetdirect FTP dos, Remotely Exploitable buffer overflow in Outlook, New encryption regulations, ACLU Challenge to Carnivore, First Autocad virus, Linux Distribution Security Report, Passive Fingerprinting, To Build a Honeypot, Auditing your Firewall Setup, and more.

tags | overflow, local, virus
systems | linux
MD5 | 480d71607e4c2a56aa9266b03465c7c4
fingerprinting.txt
Posted May 16, 2000
Authored by Lance Spitzner | Site enteract.com

IDing remote hosts, without them knowing. This paper details the process of Passive Fingerprinting. Passive fingerprinting is based on sniffer traces from the remote system. Instead of actively querying the remote system, all you need to do is capture packets sent from the remote system. Based on the sniffer traces of these packets, you can determine the operating system of the remote host. Just like in active fingerprinting, passive fingerprinting is based on the principle that every operating system's IP stack has its own idiosyncrasies. By analyzing sniffer traces and identifying these differences, you may be able to determine the operating system of the remote host. Craig Smith has written a proof of concept tool called passfing.tar.gz.

tags | paper, remote, proof of concept
MD5 | 2aa7b3dc1c6b55b5165fe2debf6d98a4
fingerprint.html
Posted Aug 17, 1999
Authored by PGCI Inc

"Preventing remote OS detection via tcp/ip stack fingerprinting" - An excellent security improvement module describing how you can mask your operating system from tcp/ip stack fingerprinting tools such as nmap and queso while still being functional.

tags | remote, tcp
systems | unix
MD5 | d1f347a72ec4ad6abf4029e50e1538db
fingerd-DoS.txt
Posted Aug 17, 1999

Solaris 2.5.1/2.6 fingerd DoS attack.

tags | exploit, denial of service
systems | solaris
MD5 | 6596de0e5b2aead373e064be0dbf5472
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    4 Files
  • 19
    Nov 19th
    2 Files
  • 20
    Nov 20th
    9 Files
  • 21
    Nov 21st
    14 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close