what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

hunt-1.5bin.tgz
Posted May 30, 2000
Authored by Pavel Krauz | Site cri.cz

Hunt (linux binary distribution) is a program for intruding into a tcp connection, watching it and resetting it. It can handle all connections it sees. Features: Connection Management - setting what connections you are interested in, detecting an ongoing connection (not only SYN started), Normal active hijacking with the detection of the ACK storm, ARP spoofed/Normal hijacking with the detection of successful ARP spoof, synchronization of the true client with the server after hijacking (so that the connection don't have to be reset), resetting connection, watching connection; Daemons - reset daemon for automatic connection resetting, arp spoof/relayer daemon for arp spoofing of hosts with the ability to relay all packets from spoofed hosts, MAC discovery daemon for collecting MAC addresses, sniff daemon for logging TCP traffic with the ability to search for a particular string; Packet Engine - extensible packet engine for watching TCP, UDP, ICMP and ARP traffic, collecting TCP connections with sequence numbers and the ACK storm detection; Switched Environment - hosts on switched ports can be spoofed, sniffed and hijacked too; much, much more. Requires Linux 2.2, GlibC 2.1 with LinuxThreads, Ethernet.

Changes: Bug fix release - computation of packet checksum has been fixed, packet relaying for routers has been corrected, unprintable characters are printed in <hex> and printing of terminal control characters can be turned off.
tags | tool, udp, spoof, sniffer, tcp
systems | linux
SHA-256 | ac19041b44e008c04d61ff7f5b5814d6dca222360f7b72d642db09ae5b89b9b3

Related Files

Rootkit Hunter 1.3.8
Posted Nov 18, 2010
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: The change log lists 24 bug fixes, 29 changes and 18 new items.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | fb1fb8bac53bab476142b5556140c59d589bc0f45d3dc058f400f2edada77a33
Foxit Reader 4.1.1 Stack Overflow
Posted Nov 16, 2010
Authored by dookie

Foxit Reader version 4.1.1 stack overflow exploit with egghunter shellcode.

tags | exploit, overflow, shellcode
SHA-256 | 9780b51aa733813b396e6fc1a53431ca2e325e1962af0b5c9d51ca76f2250eef
GNU SIP Witch Telephony Server 0.9.2
Posted Nov 11, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Fixes were made for issues related to TLS SIP support, publishing of contact information in registration replies, and clean shutdown on server failure.
tags | telephony
SHA-256 | f00861ee6f7e585ce9d2ae6ddb5901a650f59a99fd2152c83e5a17a2c9369cf7
Network Associates PGP KeyServer 7 LDAP Buffer Overflow
Posted Nov 5, 2010
Authored by patrick | Site metasploit.com

This Metasploit module exploits a stack overflow in the LDAP service that is part of the NAI PGP Enterprise product suite. This Metasploit module was tested against PGP KeyServer v7.0. Due to space restrictions, egghunter is used to find our payload - therefore you may wish to adjust WfsDelay.

tags | exploit, overflow
advisories | CVE-2001-1320
SHA-256 | da96c2a19be199b131c7fc8a865bf1900872f9605e31b1421acca3503f58840f
PyProxy Proxy Hunter And Tester 9
Posted Oct 22, 2010
Authored by gunslinger | Site gunslingerc0de.wordpress.com

PyProxy Proxy Hunter and Tester version 9 high-level cross protocol proxy-hunter python library.

tags | protocol, python, library
SHA-256 | cba978bee526ceb35eb10cd5ce910c0b25b9b45364e32bfc6f7fb676d869f026
Secunia Security Advisory 41733
Posted Oct 17, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Dupehunter Professional, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a6300a38726246e1f442037eef571b179f069bb7942e9115b939da7168f7b510
Dupehunter Professional DLL Hijacking
Posted Oct 6, 2010
Authored by anT!-Tr0J4n

Dupehunter Professional DLL hijacking exploit that leverages fwpuclnt.dll.

tags | exploit
SHA-256 | fc0c631f01578170965c5664090a0d3a1ec4cae4dce83ea001062041ff69bd44
Shellcode Checksum Routine
Posted Sep 3, 2010
Authored by Ron Henry

This shellcode is an egg hunter checksum routine.

tags | shellcode
SHA-256 | fee040ab77ec20438f18cdd7bb579cf821c42ad1bdd3604706b762910166ec3b
GNU SIP Witch Telephony Server 0.9.1
Posted Aug 17, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Refactoring of the API to take advantage of command parsing, internationalization, and other features offered in the newest ucommon releases.
tags | telephony
SHA-256 | 1788efed459f3c65d34a9c46fc689a46ce93e6565ae899162092325710b860ff
EasyFTP Server <= 1.7.0.11 list.html path Stack Buffer Overflow
Posted Jul 27, 2010
Authored by ThE g0bL!N, jduck | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.11 and earlier. EasyFTP fails to check input size when parsing the 'path' parameter supplied to an HTTP GET request, which leads to a stack based buffer overflow. EasyFTP allows anonymous access by default; valid credentials are typically unnecessary to exploit this vulnerability. After version 1.7.0.12, this package was renamed "UplusFtp". Due to limited space, as well as difficulties using an egghunter, the use of staged, ORD, and/or shell payloads is recommended.

tags | exploit, web, overflow, shell
SHA-256 | db54552b60a46cc551e6f2b027066ebce8c0bf14e91553ea190e2a4206a71b5a
GNU SIP Witch Telephony Server 0.8.4
Posted Jul 13, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Improved prack support and proper error tracking for invalid or unresolvable URI requests.
tags | telephony
SHA-256 | 3a312087d3ceb09926c6a460c4fed5913a2e96a9e5b326abb442dfcedfb23b45
GNU SIP Witch Telephony Server 0.8.3
Posted May 20, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Automatic server reloading has been added for network interface state changes. This release publishes routing information in zeroconf srv records.
tags | telephony
SHA-256 | a51fec64170d06884a4f450c401e497c9dce2dda2d4e847a9e55f048f585a98f
GNU SIP Witch Telephony Server 0.8.0
Posted Apr 9, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Introduction of a libnotify plugin and support for the ucommon 2.1 ABI.
tags | telephony
SHA-256 | f59d87763e9db45caceb9a81acdbaa71e476db669b7f82bf9f01b1b7b151205e
JITed Egg-Hunter Stage-0 Universal Shellcode
Posted Mar 28, 2010
Authored by Alexey Sintsov

JITed egg-hunter stage-0 universal shellcode for XP/Vista/Win7.

tags | shellcode
SHA-256 | 2d004f2c91c53dbedcbebed03fa8b080202f0fe9aa9e00a74332fa6c4479dc69
jitedegg-shellcode.txt
Posted Mar 24, 2010
Authored by Alexey Sintsov

JITed egg-hunter stage-0 shellcode (permanent DEP bypass).

tags | shellcode
SHA-256 | c0457bd37fa64a3dd66bfe32d6241af964f283e3fe7bec27a59d2d87f5a45c82
eDisplay Personal FTP Server 1.0.0 Stack Buffer Overflow
Posted Mar 22, 2010
Authored by corelanc0d3r

eDisplay Personal FTP Server version 1.0.0 post-authentication stack buffer overflow exploit with egg hunter shellcode.

tags | exploit, overflow, shellcode
SHA-256 | d8bcac4e6d3681225a51e49277ef1f2caa310dfb4ef9362e17866f83feece047
GNU SIP Witch Telephony Server 0.7.4
Posted Mar 17, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Sending of hash rather than realm to server when a user changes the authentication secret with a live server instance running was fixed. Automatic activation of generated UUID SIP realm when no realm is explicitly set by the user was fixed.
tags | telephony
SHA-256 | 5752c7ce999be90ab8d14a248c177559e9b5df5199b29e62eed05a8e1aeaf94e
GNU SIP Witch Telephony Server 0.7.3
Posted Mar 16, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Additional server management commands were added. Proper installation of the sipwitch CGI Web service is done to support introduction of a separately installable sipwitch-cgi package in Debian and RPM packaging.
tags | telephony
SHA-256 | 650a5d4bc8dd0f9726545daee450684d5dfefeef3b24c3ccb5e63a1432b1f774
Win32 Egg Hunting
Posted Mar 9, 2010
Authored by Peter Van Eeckhoutte | Site corelan.be

Win32 Egg Hunting. Part 8 in a series of tutorials.

tags | paper, shellcode
systems | windows
SHA-256 | 10e73a2c8d92681faa9e39235b47821f5f3bf942e2cfd8556dc2fee20a9ffa8e
QuickZip 4.x Buffer Overflow
Posted Mar 9, 2010
Authored by corelanc0d3r, mr_me

QuickZip version 4.60 local buffer overflow proof of concept exploit that creates a malicious .zip file. This version does not have the egghunter.

tags | exploit, overflow, local, proof of concept
SHA-256 | 3fbe6073961b268eabead158a13d7511eaec9db110657a8f6c485ad7f1e516de
Win32 Egg Hunting
Posted Feb 27, 2010
Authored by corelanc0d3r

Exploit writing tutorial 8 - Win32 Egg Hunting.

tags | paper
systems | windows
SHA-256 | cdc785e5c04945be39fd37440864d660ed1b41c96631356fd999a24924338d8d
GNU SIP Witch Telephony Server 0.7.2
Posted Feb 23, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP rver, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: New support was added for runtime activation and access to sipwitch server debugging facilities, including recent errlog and sip message tracing.
tags | telephony
SHA-256 | 5b439b4b8916602787be846d8167141ed12986fcb2e04297d83fdc9391150374
GNU SIP Witch Telephony Server 0.7.0
Posted Feb 9, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Basic RTP media proxy, preliminary NAT support, and integrated SDP rewrite functionality have been introduced. This will enable stand-alone sipwitch hosts to call each other even when locations are both behind NATs or different subnets. Furthermore, since sipwitch handles NAT functionality in one place and transparently, desktop VoIP clients need not be configured for or aware of NAT functionality. Other changes include consolidation of realm and functional SIP domain.
tags | telephony, protocol
SHA-256 | 90688516dbffced54136ef63565990250c71eed5d7473f77d72560a73caa148c
sipwitch-0.6.2.tar.gz
Posted Feb 4, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Use of default UUID-based SIP authentication realms when none is explicitly set. A new and more practical default config file with saner defaults. No generation of extension numbers for user accounts made into SIP accounts if not configured for extension numbering plans.
tags | telephony, protocol
SHA-256 | fa69d6f275cb27a0f5b4c9a77078300e6c4bee0b9d22f6d78a4470d05aef05a5
sipwitch-0.6.0.tar.gz
Posted Feb 4, 2010
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: This release focuses on development of GNU SIP Witch as a new kind of desktop VoIP service and includes integration of standard user accounts as sip users to enable one to more easily setup and deploy sipwitch with minimal configuration effort.
tags | telephony, protocol
SHA-256 | 1e1825520ac5562a841f753f15814b63efd9c0dbb1c45dd555487b221eadf537
Page 2 of 4
Back1234Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    10 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close