Twenty Year Anniversary
Showing 1 - 25 of 2,212 RSS Feed

TCP Files

Asterisk Project Security Advisory - AST-2018-007
Posted Jun 11, 2018
Authored by Sean Bright | Site asterisk.org

Asterisk Project Security Advisory - When connected to Asterisk via TCP/TLS if the client abruptly disconnects, or sends a specially crafted message then Asterisk gets caught in an infinite loop while trying to read the data stream. Thus rendering the system as unusable.

tags | advisory, tcp
MD5 | 128c0dfe088bcd61f964d066fe306cc1
GNUnet P2P Framework 0.11.0pre66
Posted Jun 6, 2018
Authored by Christian Grothoff | Site ovmj.org

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

Changes: This is a pre-release to assist developers and downstream packagers to test the package before the final release after four years of development.
tags | tool, web, udp, tcp, peer2peer
systems | unix
MD5 | 808b7aeee1439935e3e061b3bd84d3db
Linux/x86 TCP/4444 Bindshell Shellcode
Posted May 31, 2018
Authored by Paolo Perego

105 bytes small Linux/x86 bindshell shellcode that spawns on TCP/4444.

tags | x86, tcp, shellcode
systems | linux
MD5 | 843af161ff8f5f667b5b1c61ca684aff
Linux/x86 TCP/5555 Bindshell Shellcode
Posted May 28, 2018
Authored by Luca Di Domenico

98 bytes small Linux/x86 TCP/5555 bindshell shellcode.

tags | x86, tcp, shellcode
systems | linux
MD5 | 460b0890fcf26db29390427ea3c1ed44
Reptile LKM Rootkit
Posted May 27, 2018
Authored by mempodippy

Reptile is a Linux kernel module rootkit that hides files, processes, etc. It implements ICMP/UDP/TCP port-knocking backdoors, supports kernels 2.6.x/3.x/4.x, and more.

tags | advisory, tool, kernel, udp, tcp
systems | linux
MD5 | 0a1d449c8d146ccda6f1aaa0a27c3261
Linux/x86 Reverse TCP Shell To 10.0.7.17:4444 Shellcode
Posted May 24, 2018
Authored by Jonathan Crosby

101 bytes small Linux/x86 reverse TCP shell shellcode that connects to 10.0.7.17:4444.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 6eeac0567a3fef4c667bd7ed8a53c0af
Linux/x86 IPv6 TCP Bindshell Port 4444 Shellcode
Posted May 24, 2018
Authored by Matteo Malvica

113 bytes small Linux/x86 IPv6 TCP bindshell on port 4444 shellcode.

tags | x86, tcp, shellcode
systems | linux
MD5 | 0b9eb7ceb9c4c0a8506d11f903a814d1
Linux/x86 Reverse TCP Shell Shellcode
Posted May 24, 2018
Authored by Nuno Freitas

68 bytes small Linux/x86 reverse TCP shell shellcode.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 992c716611405f56f700612608127ead
HPE iMC 7.3 Remote Code Execution
Posted May 18, 2018
Authored by mr_me, trendytofu | Site metasploit.com

This Metasploit module exploits an expression language injection vulnerability, along with an authentication bypass vulnerability in Hewlett Packard Enterprise Intelligent Management Center before version 7.3 E0504P04 to achieve remote code execution. The HP iMC server suffers from multiple vulnerabilities allows unauthenticated attacker to execute arbitrary Expression Language via the beanName parameter, allowing execution of arbitrary operating system commands as SYSTEM. This service listens on TCP port 8080 and 8443 by default. This Metasploit module has been tested successfully on iMC PLAT v7.3(E0504P02) on Windows 2k12r2 x64 (EN).

tags | exploit, remote, arbitrary, tcp, vulnerability, code execution, bypass
systems | windows
advisories | CVE-2017-12500, CVE-2017-8982
MD5 | 409c199dae62513789f6016cba7903bd
Red Hat Security Advisory 2018-1372-01
Posted May 15, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-1372-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include buffer overflow and denial of service vulnerabilities.

tags | advisory, web, denial of service, overflow, tcp, vulnerability
systems | linux, redhat
advisories | CVE-2018-10184
MD5 | 73567ccdb0af5ca9e37e65140bbb02e5
Linux/x86 Reverse TCP Shell Shellcode
Posted May 15, 2018
Authored by Paolo Perego

96 bytes small Linux/x86 reverse TCP shell shellcode that connects to 127.0.0.1:4444.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 595d776824a93f7666b99a23897c290e
Linux/x86 TCP/9443 Bindshell Shellcode
Posted May 9, 2018
Authored by Amine Kanane

113 bytes small Linux/x86 bindshell forking null-free shellcode for TCP/9443.

tags | x86, tcp, shellcode
systems | linux
MD5 | 1d7c353245f7ee1d017285c4d7912ba9
Metasploit msfd Remote Code Execution Via Browser
Posted May 1, 2018
Authored by Robin Stenvi | Site metasploit.com

Metasploit's msfd-service makes it possible to get a msfconsole-like interface over a TCP socket. This Metasploit module connects to the msfd-socket through the victim's browser. To execute msfconsole-commands in JavaScript from a web application, this module places the payload in the POST-data. These POST-requests can be sent cross-domain and can therefore be sent to localhost on the victim's machine. The msfconsole-command to execute code is 'rbi -e "CODE"'. Exploitation when the browser is running on Windows is unreliable and the exploit is only usable when IE is used and the quiet-flag has been passed to msf-daemon.

tags | exploit, web, javascript, tcp
systems | windows
MD5 | 9424518a3a5f452ec2a431c5b398c292
Metasploit msfd Remote Code Execution
Posted May 1, 2018
Authored by Robin Stenvi | Site metasploit.com

Metasploit's msfd-service makes it possible to get a msfconsole-like interface over a TCP socket. If this socket is accessible on a remote interface, an attacker can execute commands on the victim's machine. If msfd is running with higher privileges than the current local user, this module can also be used for privilege escalation. In that case, port forwarding on the compromised host can be used. Code execution is achieved with the msfconsole command: irb -e 'CODE'.

tags | exploit, remote, local, tcp, code execution
MD5 | 21ee676f717921fe2b762176515eb4cd
Linux x86 Reverse TCP 127.1.1.1:5555 Shellcode
Posted Apr 20, 2018
Authored by Anurag Srivastava

73 bytes small Linux x86 reverse TCP shellcode that binds to 127.1.1.1:5555.

tags | x86, tcp, shellcode
systems | linux
MD5 | 9e96cce76f9491a2d09409a32e416c26
Linux x86 TCP Port 1337 Bindshell Shellcode
Posted Apr 19, 2018
Authored by Anurag Srivastava

92 bytes small Linux x86 tcp/1337 bindshell shellcode.

tags | x86, tcp, shellcode
systems | linux
MD5 | ff78686f2571f1c5269ce33e66a58c85
Nmap Port Scanner 7.70
Posted Mar 21, 2018
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Integrated 728 service/version detection fingerprints. Integrated 667 IPv4 OS fingerprint submissions. Integrated 33 IPv6 OS fingerprint submissions. Added 9 NSE scripts. Various other updates and fixes.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 0003e4361ea844a40496678c8e58b1c2
Ubuntu Security Notice USN-3586-1
Posted Mar 1, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3586-1 - Konstantin Orekhov discovered that the DHCP server incorrectly handled a large number of concurrent TCP sessions. A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. It was discovered that the DHCP server incorrectly handled socket descriptors. A remote attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, tcp
systems | linux, ubuntu
advisories | CVE-2016-2774, CVE-2017-3144, CVE-2018-5732, CVE-2018-5733
MD5 | 08aea38d77f392f613434bd52973ae94
Red Hat Security Advisory 2018-0377-01
Posted Feb 28, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0377-01 - The quagga packages contain Quagga, the free network-routing software suite that manages TCP/IP based protocols. Quagga supports the BGP4, BGP4+, OSPFv2, OSPFv3, RIPv1, RIPv2, and RIPng protocols, and is intended to be used as a Route Server and Route Reflector. Security Fix: quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code.

tags | advisory, arbitrary, tcp, protocol
systems | linux, redhat
advisories | CVE-2018-5379
MD5 | 1aa812e7e13bb49278f80bf03fa6c091
Asterisk Project Security Advisory - AST-2018-005
Posted Feb 23, 2018
Authored by Sandro Gauci | Site asterisk.org

Asterisk Project Security Advisory - A crash occurs when a number of authenticated INVITE messages are sent over TCP or TLS and then the connection is suddenly closed. This issue leads to a segmentation fault.

tags | advisory, tcp
advisories | CVE-2018-7286
MD5 | 0733c7c77cd97a87cdc416aef921fea4
Linux/ARM BindShell Shellcode
Posted Feb 19, 2018
Authored by rtmcx

168 bytes small tcp/4444 shell-binding and IP controlled (192.168.1.190) null-free Linux/ARM shellcode.

tags | shell, tcp, shellcode
systems | linux
MD5 | e2400f0b4e82d6ae3fb4db72afd681e6
TCP Starvation
Posted Feb 12, 2018
Authored by Eplox

Whitepaper called TCP Starvation. It discusses a new variant of a denial of service attack.

tags | paper, denial of service, tcp
MD5 | c256b298d0c5d0f7869895857dde6836
Linux/x64 Bind TCP (4444/TCP) Shell (/bin/sh) + Password (1234567) Shellcode
Posted Feb 2, 2018
Authored by 0x4ndr3

136 bytes small Linux/x64 bind TCP (4444/TCP) shell (/bin/sh) + password (1234567) shellcode.

tags | shell, tcp, shellcode
systems | linux
MD5 | d05f6f0b7a7909402854121ee144dd64
Linux/ARM Reverse TCP Shell Null Free Shellcode
Posted Jan 28, 2018
Authored by rtmcx

80 byte small Linux/ARM reverse TCP shell (192.168.1.1:4444/TCP) null-free shellcode.

tags | shell, tcp, shellcode
systems | linux
MD5 | ca358c6e2e10a456f686560467fee49d
Linux/ARM Password Protected Reverse Shell Shellcode
Posted Jan 19, 2018
Authored by rtmcx

156 bytes small Linux/ARM password protected reverse TCP (192.168.1.1:4444/TCP) shell (/bin/sh) null-free shellcode.

tags | shell, tcp, shellcode
systems | linux
MD5 | b7131d0642486647b97ab38932c932e3
Page 1 of 89
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    14 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close