exploit the possibilities
Showing 1 - 25 of 100 RSS Feed

Files

p0fspoof.txt
Posted Feb 14, 2006
Authored by poplix | Site tripp.dynalias.org

A paper discussing passive OS fingerprinting and spoofing OpenBSD pf "os" rulesets.

tags | spoof
systems | openbsd
MD5 | 76d3abde5584b498d8c1a5bcc06a4495

Related Files

TORQUE-audit.pdf
Posted Oct 21, 2006
Authored by Luis Miguel Ferreira da Silva | Site csirt.fe.up.pt

A paper discussing a race condition vulnerability in a software package called TORQUE Resource Manager.

tags | advisory
MD5 | 792c8714f81ff6d2b8612d1b4fa4ec96
fmat.txt
Posted Oct 21, 2006
Authored by K-sPecial | Site xzziroz.net

An alternative method in format string exploitation - a paper discussing a method of making format string exploits static again on 2.6 with random VA.

tags | paper
systems | unix
MD5 | 3323b524868edd9e4a53cd3146c4d95f
binfmt-en.pdf
Posted Oct 9, 2006
Authored by GoodFellas Security Research Team | Site shellcode.com.ar

Polluting sys_execve() in kernel space without depending on the sys_call_table[]: A paper discussing design weaknesses in the linux kernel's handling of simply linked lists used to register binary formats.

tags | paper, kernel
systems | linux
MD5 | cbc9e056a14996a9afd144bb757b9ce5
binfmt-es.pdf
Posted Oct 9, 2006
Authored by GoodFellas Security Research Team | Site shellcode.com.ar

Polluting sys_execve() in kernel space without depending on the sys_call_table[]: A paper discussing design weaknesses in the linux kernel's handling of simply linked lists used to register binary formats. Spanish Version.

tags | paper, kernel
systems | linux
MD5 | ed63f18b799338c8d20d7f13b9c637fe
re-20060425-00312.pdf
Posted Apr 29, 2006
Authored by Markus Jansson | Site niscc.gov.uk

A paper discussing the various vulnerabilities in DNS: "The vulnerabilities described in this advisory affect implementations of the Domain Name System (DNS) protocol. Many vendors include support for this protocol in their products and may be impacted to varying degrees, if at all."

tags | paper, vulnerability, protocol
MD5 | c8abc61b42b138d3c3d926fb910adcba
Ad-Aware.txt
Posted Apr 29, 2006
Authored by Roy.Batty

A paper discussing the various vulnerabilities in Ad-Aware.

tags | advisory, vulnerability
MD5 | 27920d702e57f28ffbd214ea61a49bc2
authsyn.tgz
Posted Feb 14, 2006
Authored by poplix | Site tripp.dynalias.org

proof-of-concept tool for performing passive OS fingerprint spoofing to bypass OpenBSD pf firewall rules.

tags | spoof
systems | openbsd
MD5 | 4dda8dd683b1a851a409f5d18f7001da
Increasing_Performance_NIDS.pdf
Posted Mar 8, 2002
Authored by Neil Desai | Site snort.org

Increasing Performance in High Speed NIDS is a paper discussing a number of methods to increase performance in Snort and also NIDS in general. Discusses bottlenecks that Snort has, a brief history of snort pattern matching, and the work that Silicon Defense did with Aho-Corasick_Boyer-Moore, discussing the differences between network grep and protocol analysis.

tags | paper, protocol
MD5 | c12ed4958867665a73045b0276cf74d0
plogd2.c
Posted Nov 22, 2001
Authored by Venglin | Site freebsd.lublin.pl

Plogd v2 - syn/udp/icmp packet logger (freebsd version).

tags | udp, system logging
systems | unix, freebsd
MD5 | 8acf703296d17b76edc2716398aa9b38
PR09.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR09.txt.zip

tags | magazine
MD5 | f3dd4498769b1da00333963bb2471dbd
PR08.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR08.txt.zip

tags | magazine
MD5 | 0ce948f8c912117fd90a619e2d8b6dab
PR07.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR07.txt.zip

tags | magazine
MD5 | 77da16cec8c37cbd135647ccbad4be31
PR06.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR06.txt.zip

tags | magazine
MD5 | 2db8e860aa1f0ba496f1ec03c073c0a4
PR05.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR05.txt.zip

tags | magazine
MD5 | 05b7e226d46066bc5f37024dae75786c
PR04.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR04.txt.zip

tags | magazine
MD5 | 7712468359ed26815e08d05c7f875ecd
PR03.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR03.txt.zip

tags | magazine
MD5 | 6d82b7bd94d290ba2c0b53f45c570a3d
PR02.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR02.txt.zip

tags | magazine
MD5 | daaf75e00dd724d144c32e77cd807e04
PR01.txt.zip
Posted May 22, 2000
Authored by proyecto-r

PR01.txt.zip

tags | magazine
MD5 | 9670c08238864cf706da09c36b0118cb
preventing.worms
Posted May 17, 2000
Authored by Woody Thrower, Stan Burnett, Gary Wahlquist | Site www2.axent.com

Prevent Current and Future E-Mail Worms.

tags | worm
MD5 | ccb29df3cab7315b7bbe73ebc5426747
pam_console.bug
Posted May 17, 2000

When accepting luser console login, pam_console called by /bin/login tries to be user-friendly, doing several chowns on devices like login tty and corresponding vcs[a] device, as well as other interesting devices: fd*, audio devices (dsp*, mixer*, audio*, midi*, sequencer), cdrom, streamer/zip drive devices, frame buffer devices, kbd*, js*, video*, radio*, winradio*, vtx*, vbi* and so on. Probably it's designed to make console logins more comfortable, but has DEADLY effects on servers with console luser-login ability (and that's quite common).

tags | exploit
MD5 | 5e13080a2ceeb2115ba94946dda175b9
ports2.c
Posted Apr 20, 2000
Authored by Dorian Goldman

Port scanner with a nice interface. Prompts for banner.

tags | tool, scanner
systems | unix
MD5 | 3e009f9ae1655421c4bcd80435522a9c
pgp4pine-1.74.tgz
Posted Mar 13, 2000
Authored by Marcin Marszalek

pgp4pine is a script that automatically encrypts and decrypts mail under Pine using PGP. The user is not separated from things that PGP does. The program is compatible with PGP versions 2.6.3, 5.0, 6.5.1 and GNUPG 1.0, has support for an aliases file and signature-rotating programs, and can remember your passphrase for a session if you need.

Changes: Support for cleartext cache, which stores decoded messages in a cache file in your home directory for a couple of days.
tags | encryption
MD5 | 9f044176ff5ef58ed94c8edd94cac99e
phantom_security-1.00.tar.gz
Posted Mar 11, 2000
Authored by Joe Thielen | Site joethielen.com

GNU Phantom.Security is a computer-controlled security system. Using the software and a simple circuit board (schematics included) that you build, you can create a good basic security system that is computer controlled. The system can use off-the-shelf security devices like motion sensors, door magnets, and fire/smoke detectors with little to moderate modification. And if the machine the system is running on is connected to a LAN/WAN or the Internet, you can have it send e-mail. If you have a pager or cell phone capable of receiving e-mail, then you will have around the clock intrusion/fire detection for your home or office.

systems | linux
MD5 | b540be03dd45ee1f463bfc42490b1079
pocsag.txt
Posted Mar 9, 2000
Authored by Kuji

Pocsag v2.05, a popular pager decoding software by default accepts connections on port 8000 with a default password, even remote access is not enabled, allowing anyone to view the decoded data.

tags | exploit, remote
MD5 | b0a2520d22010417074c18d4cc50839f
Ports.c
Posted Mar 3, 2000
Authored by Zinc_Sh | Site maxlepi.zap.to

Handy TCP Portscanner - Simple TCP port scanner. Allows you to choose the range of ports to scan. Tested on slackware.

tags | tool, scanner, tcp
systems | linux, unix, slackware
MD5 | 3b10fb1b76ecd54b31a2a09a796f239c
Page 1 of 4
Back1234Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close