exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 2,425 RSS Feed

TCP Files

Linux/x86_64 TCP/4444 Bindshell With Password Shellcode
Posted Aug 18, 2019
Authored by Goncalo Ribeiro

129 bytes small Linux/x86_64 bind (4444/TCP) shell (/bin/sh) + password (pass) shellcode.

tags | shell, tcp, shellcode
systems | linux
SHA-256 | d4df7719545e7762632fb6c573e77f75aa64c9e0841da45fd86112126ecf7a55
Nmap Port Scanner 7.80
Posted Aug 11, 2019
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: This is the Defcon release for 2019. Added 11 NSE scripts. Many bug fixes and code improvements.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 780cbf4a0ddb9e9cd49d8fbdfa5c7f368cc7ae857ddfc39102dd2b83a905d7a7
FreeBSD Security Advisory - FreeBSD-SA-19:21.bhyve
Posted Aug 6, 2019
Authored by Reno Robert | Site security.freebsd.org

FreeBSD Security Advisory - The e1000 network adapters permit a variety of modifications to an Ethernet packet when it is being transmitted. These include the insertion of IP and TCP checksums, insertion of an Ethernet VLAN header, and TCP segmentation offload ("TSO"). The e1000 device model uses an on-stack buffer to generate the modified packet header when simulating these modifications on transmitted packets. When TCP segmentation offload is requested for a transmitted packet, the e1000 device model used a guest-provided value to determine the size of the on-stack buffer without validation. The subsequent header generation could overflow an incorrectly sized buffer or indirect a pointer composed of stack garbage. A misbehaving bhyve guest could overwrite memory in the bhyve process on the host.

tags | advisory, overflow, tcp
systems | freebsd
advisories | CVE-2019-5609
SHA-256 | 5e5c704f8d1d9d95ef61652110af66385c6af7587e83674bd336e945b3308d47
Red Hat Security Advisory 2019-2110-01
Posted Aug 6, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2110-01 - The rsyslog packages provide an enhanced, multi-threaded syslog daemon. It supports MySQL, syslog/TCP, RFC 3195, permitted sender lists, filtering on any message part, and fine-grained control over output format. Issues addressed include a buffer overflow vulnerability.

tags | advisory, overflow, tcp
systems | linux, redhat
advisories | CVE-2018-16881
SHA-256 | 2efeb7249cb42d7593aece29d499cd6c456b47c8612bfa859aa531d3b5b061b9
Samhain File Integrity Checker 4.3.3
Posted Jul 11, 2019
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: Multiple bug fixes and one patch added.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 3ec2243a50ab43126d1f7db879665fae4489c8914749b29a5fb4e43bb59aba12
Linux/ARM64 Reverse (::1:4444/TCP) Shell (/bin/sh) + IPv6 Shellcode
Posted Jul 1, 2019
Authored by Ken Kitahara

140 bytes small Linux/ARM64 reverse (::1:4444/TCP) shell (/bin/sh) + IPv6 shellcode.

tags | shell, tcp, shellcode
systems | linux
SHA-256 | 7770ba1b346fac7e2ceadaf196f00aa6980cbacde25df0d35368e707d3f85bb4
Linux/ARM64 Reverse TCP Shell Null-Free Shellcode
Posted Jul 1, 2019
Authored by Ken Kitahara

128 bytes small Linux/ARM64 reverse (127.0.0.1:4444/TCP) shell (/bin/sh) + null-free shellcode.

tags | shell, tcp, shellcode
systems | linux
SHA-256 | 01b751be69225bdcbe39bb4f6a3d1e0830fffaa9a98db42a9bc0cf3d22a85c20
Linux/ARM64 Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode
Posted Jul 1, 2019
Authored by Ken Kitahara

164 bytes small Linux/ARM64 TCP/4444 /bin/sh binding shellcode that is null free.

tags | tcp, shellcode
systems | linux
SHA-256 | 2abf36d6dafe8cb2f85daa3a39d660928ecbd4918adecb13a0586f10b1fef07a
Linux/ARM64 Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode
Posted Jun 30, 2019
Authored by Ken Kitahara

176 bytes small Linux/ARM64 bind (4444/TCP) shell (/bin/sh) + IPv6 shellcode.

tags | shell, tcp, shellcode
systems | linux
SHA-256 | 52a5215cbf989a67b047dfe09125d552da1a9a577684f046ac51a3e784a0c04c
Ubuntu Security Notice USN-4041-1
Posted Jun 28, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4041-1 - USN-4017-1 fixed vulnerabilities in the Linux kernel for Ubuntu. Unfortunately, the update introduced a regression that interfered with networking applications that setup very low SO_SNDBUF values. This update fixes the problem. Jonathan Looney discovered that the Linux kernel could be coerced into segmenting responses into multiple TCP segments. A remote attacker could construct an ongoing sequence of requests to cause a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel, tcp, vulnerability
systems | linux, ubuntu
advisories | CVE-2019-11479
SHA-256 | 38c17aacbb7b32c138b118b5a4022a5ed59168bcf511fb1f084a35b7d0a6e202
GNUnet P2P Framework 0.11.5
Posted Jun 26, 2019
Authored by Christian Grothoff | Site ovmj.org

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

Changes: Added CAA record type. Various other updates.
tags | tool, web, udp, tcp, peer2peer
systems | unix
SHA-256 | 98e0355ff0627bf88112b3b92a7522e98c0ae6071fc45efda5a33daed28199b3
Linux/x86_64 Reverse(0.0.0.0:4444/TCP) Shell (/bin/sh) Shellcode
Posted Jun 24, 2019
Authored by Aron Mihaljevic

70 bytes small Linux/x86_64 reverse TCP shell over port 4444 shellcode.

tags | shell, tcp, shellcode
systems | linux
SHA-256 | 5b2cd8d9d58e04666560f366e8f66fd5cb9b9fdfdbab656bc1860b161d6d68ec
FreeBSD Security Advisory - FreeBSD-SA-19:08.rack
Posted Jun 21, 2019
Authored by Jonathan Looney | Site security.freebsd.org

FreeBSD Security Advisory - While processing acknowledgements, the RACK code uses several linked lists to maintain state entries. A malicious attacker can cause the lists to grow unbounded. This can cause an expensive list traversal on every packet being processed, leading to resource exhaustion and a denial of service. An attacker with the ability to send specially crafted TCP traffic to a victim system can degrade network performance and/or consume excessive CPU by exploiting the inefficiency of traversing the potentially very large RACK linked lists with relatively small bandwidth cost.

tags | advisory, denial of service, tcp
systems | freebsd, bsd
advisories | CVE-2019-5599
SHA-256 | 85f2ffcf89eae31c9b0babd62b1d66ae80b60a35fc0e3d2f7a258259db7a0aff
Kernel Live Patch Security Notice LSN-0052-1
Posted Jun 19, 2019
Authored by Benjamin M. Romer

Jonathan Looney discovered that an integer overflow existed in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service (system crash). Jonathan Looney discovered that the TCP retransmission queue implementation in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service.

tags | advisory, remote, denial of service, overflow, kernel, tcp
systems | linux
advisories | CVE-2019-11477, CVE-2019-11478
SHA-256 | 180fed7fbe08b89246da448a793e20ef76b9d263407b8a46ed5a13a5f4acca3b
Linux / FreeBSD TCP-Based Denial Of Service
Posted Jun 18, 2019
Authored by Jonathan Looney | Site netflix.com

Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the minimum segment size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed _"SACK Panic_," allows a remotely-triggered kernel panic on recent Linux kernels. There are patches that address most of these vulnerabilities. If patches can not be applied, certain mitigations will be effective.

tags | advisory, kernel, tcp, vulnerability
systems | linux, freebsd, bsd
advisories | CVE-2019-11477, CVE-2019-11478, CVE-2019-11479, CVE-2019-5599
SHA-256 | 2842c96d7b20ef5dfb0f2ea06c76a1334026b1cbd1953a2b31793af5c8fa3ba7
Ubuntu Security Notice USN-4017-1
Posted Jun 18, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4017-1 - Jonathan Looney discovered that the TCP retransmission queue implementation in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment sequences. A remote attacker could use this to cause a denial of service. Jonathan Looney discovered that an integer overflow existed in the Linux kernel when handling TCP Selective Acknowledgments. A remote attacker could use this to cause a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, overflow, kernel, tcp
systems | linux, ubuntu
advisories | CVE-2019-11477, CVE-2019-11478
SHA-256 | 2ab9f2ea541fb87d5442119d176290275584ea5d729e49d87b6cbc935e08db2f
Ubuntu Security Notice USN-4017-2
Posted Jun 18, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4017-2 - USN-4017-1 fixed vulnerabilities in the Linux kernel for Ubuntu. This update provides the corresponding updates for the Linux kernel for Ubuntu 16.04 ESM and Ubuntu 14.04 ESM. Jonathan Looney discovered that the TCP retransmission queue implementation in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment sequences. A remote attacker could use this to cause a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, kernel, tcp, vulnerability
systems | linux, ubuntu
advisories | CVE-2019-11477, CVE-2019-11478
SHA-256 | 30e2333d67524b336901c1f182fff58c9210ce78ed27a0ac681b4be3e438caf3
Red Hat Security Advisory 2019-1436-01
Posted Jun 11, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-1436-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include denial of service and information leakage vulnerabilities.

tags | advisory, web, denial of service, tcp, vulnerability
systems | linux, redhat
advisories | CVE-2018-11469, CVE-2018-20102, CVE-2018-20103
SHA-256 | 32edc2abaa3ffdf63a726d8bec1e2bdd7c03e376d519aba6fdfc9d05d7ae811e
Linux/x86_64 TCP/4444 Bindshell Shellcode
Posted Jun 10, 2019
Authored by Aron Mihaljevic

104 bytes small Linux/x86_64 shellcode that binds /bin/sh to TCP/4444.

tags | tcp, shellcode
systems | linux
SHA-256 | 743b2254f37ba0555d0cf683ea9b656bb70e58c99d17c089b1d256adef590f9d
Linux/x86_64 TCP/4444 Bindshell Shellcode
Posted Jun 7, 2019
Authored by Aron Mihaljevic

131 bytes small Linux/x86_64 /bin/sh TCP/4444 shellbinding shellcode.

tags | tcp, shellcode
systems | linux
SHA-256 | 36b740d1c0ce96481156628508a90d3d66bde049cebe2c49f57767c055f46f2a
Anviz M3 RFID Missing Access Controls
Posted May 23, 2019
Authored by WizLab.it | Site wizlab.it

Security issues have been found in the Anviz M3 RFID Access Control device when working in standalone mode connected to a TCP/IP network that could lead to access control bypass and private information leakage and alteration.

tags | exploit, tcp
advisories | CVE-2019-11523
SHA-256 | c1ad183da60120552ef4da27582e26b8013025e79bc583b88967bdff43a3cbeb
GNUnet P2P Framework 0.11.4
Posted May 13, 2019
Authored by Christian Grothoff | Site ovmj.org

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.

Changes: gnunet-identity can now output the public key on creation of new egos. gnunet-arm now logs to file by default -CG. Various other updates.
tags | tool, web, udp, tcp, peer2peer
systems | unix
SHA-256 | 7afeb638bd8b5a33c6b8dab24b90c5d7467439adc79794ff33218e9180f8b01b
Ubuntu Security Notice USN-3956-2
Posted May 9, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3956-2 - USN-3956-1 fixed a vulnerability in Bind. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that Bind incorrectly handled limiting the number of simultaneous TCP clients. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service. Various other issues were also addressed.

tags | advisory, remote, denial of service, tcp
systems | linux, ubuntu
advisories | CVE-2018-5743
SHA-256 | 92f0820e4e0b48968a72bf42560719fa484a428ac00b12eeca37d3daf694d334
Pycat Simple Windows Reverse TCP backdoor
Posted Apr 26, 2019
Authored by Daniel Moreno

Pycat is a simple Windows reverse TCP backdoor akin to a netcat TCP reverse connection clone. Written in Python.

tags | tcp, python
systems | windows
SHA-256 | 87c525e44512dcd47cc0d652b9ad377f81a2997c6ac650b9f0346ac0b7e1c508
Ubuntu Security Notice USN-3956-1
Posted Apr 25, 2019
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3956-1 - It was discovered that Bind incorrectly handled limiting the number of simultaneous TCP clients. A remote attacker could possibly use this issue to cause Bind to consume resources, leading to a denial of service.

tags | advisory, remote, denial of service, tcp
systems | linux, ubuntu
advisories | CVE-2018-5743
SHA-256 | 3d24ed0e149890bba90071f8a75a8241b8ac0de8924929c8af98c07861a6b0c0
Page 7 of 97
Back56789Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close