exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 301 - 325 of 917 RSS Feed

UDP Files

UDPSZ UDP Spoofing Tool
Posted Jul 14, 2009
Authored by Luigi Auriemma | Site aluigi.org

UDPSZ is a simple proof of concept exploit/tool for spoofing UDP.

tags | exploit, udp, spoof, proof of concept
SHA-256 | e8042b84d8869853e556af1e563425d40d6be10c6bc20ebe6ae535458a135f23
Green Dam Change System Time
Posted Jul 1, 2009
Authored by Anti GD

Green Dam remote change system time exploit that leverages the fact that UDP port 1234 listens and accepts time updates unauthenticated.

tags | exploit, remote, udp
SHA-256 | 62f3fc3dab18bda85cc06eba55d6d367c00ddddc4d145720651d8487b1dd2077
Asterisk IAX2 Fuzzer
Posted Jun 15, 2009
Authored by Blake Cornell

Asterisk UDP IAX protocol fuzzing utility.

tags | udp, protocol, fuzzer
SHA-256 | 38cb2e5ced48810f3028ffd78c79418cf6e9221460e97e695f38258c47928e40
Zero Day Initiative Advisory 09-024
Posted Jun 3, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-024 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Safenet Softremote IKE VPN service. Authentication is not required to exploit this vulnerability. The specific flaw exists in the ireIke.exe service listening on UDP port 62514. The process does not adequately handle long requests resulting in a stack overflow. Exploitation can result in complete system compromise under the SYSTEM credentials.

tags | advisory, remote, overflow, arbitrary, udp
SHA-256 | c10784bcd8400bdec93f62053829dce5cebd0bb2f52f7f999f9db8b67f923f7e
IPT_PKD Iptables Port Knocking Detection
Posted May 24, 2009
Authored by eric

ipt_pkd is an iptables extension implementing port knock detection. This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.

Changes: This version adds support for libxtables, iptables 1.4.3.2, and Linux kernel 2.6.29. A port config option was added on the Python knock, so you don't have to have a bunch of UDP ports open on a firewall to pass a knock through to an internal client.
tags | tool, kernel, udp, firewall
systems | linux
SHA-256 | 5b042c182c7f4d1abb4ba5c65f008a56a8d223b186c847385863772e6c37ed45
iDEFENSE Security Advisory 2009-04-28.1
Posted Apr 28, 2009
Authored by iDefense Labs, Stephen Fewer | Site idefense.com

iDefense Security Advisory 04.28.09 - Remote exploitation of a stack based buffer overflow vulnerability in TIBCO Software Inc.'s SmartSockets RTserver could allow an attacker to execute arbitrary code with the privileges of the affected service. The vulnerability occurs when parsing requests on the UDP interface of the RTserver. iDefense has confirmed the existence of this vulnerability in the RTserver version 4.0.10.1. Previous versions may also be affected. The SmartSockets framework is resold to various 3rd party vendors, and in this case iDefense used the version provided with Computer Associates Enterprise Communicator.

tags | advisory, remote, overflow, arbitrary, udp
advisories | CVE-2009-1291
SHA-256 | 6d008d52e91cfd5a4ca4ff613e0e700fd8d4e1656b66671f3a7aa9fae61e7a63
Cisco Security Advisory 20090325-udp
Posted Mar 26, 2009
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Several features within Cisco IOS Software are affected by a crafted UDP packet vulnerability. If any of the affected features are enabled, a successful attack will result in a blocked input queue on the inbound interface. Only crafted UDP packets destined for the device could result in the interface being blocked, transit traffic will not block the interface.

tags | advisory, udp
systems | cisco
advisories | CVE-2009-0631
SHA-256 | d7c7801e5593cc1d56d45fb532604c74459fabf8eb1ec761e05e4ee6458e597c
HTC Touch vCard Over IP Denial Of Service
Posted Feb 27, 2009
Site mseclab.com

Proof of concept denial of service exploit for the HTC Touch vCard over IP that sends vCards to port UDP/9204.

tags | exploit, denial of service, udp, proof of concept
SHA-256 | c765fa0e718759e83c56f58ce3ea7a9a7b76a3590eecefea18f32a537ef6cbe7
udp.pl
Posted Feb 20, 2009
Authored by Odix

Udp.pl is a simple UDP flooder written in perl.

tags | denial of service, udp, perl
SHA-256 | a2843c6ee7336f1f9449d88e17b2df96a48cbdf5ad4472388d52ed69c8b4c70a
IPT_PKD Iptables Port Knocking Detection
Posted Feb 11, 2009
Authored by eric

ipt_pkd is an iptables extension implementing port knock detection. This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.

Changes: Added support for 2.6.28 kernels and iptables 1.4.2.
tags | tool, kernel, udp, firewall
systems | linux
SHA-256 | ea5c3a7c800ddbed969cfe09def7978c1a25636fc0fad6b61f85b59a01bcd487
Wintercore Advisory WM01-0109
Posted Jan 21, 2009
Authored by Ruben Santamarta | Site wintercore.com

Wintercore Advisory - PXEService.exe is prone to a remote buffer overflow due to improper bounds checking when handling PXE requests. A remote unauthenticated malicious attacker can take advantage of this flaw to execute arbitrary code by sending a specially crafted UDP packet. SystemcastWizard Lite versions 2.0 and below are affected.

tags | advisory, remote, overflow, arbitrary, udp
SHA-256 | 1e4e1fc447fa7a1d81f5dee9dc92ca06a9dc682581918bf7809c0defad38df4b
Syslserver 1.058 Denial Of Service
Posted Jan 16, 2009
Authored by princeofnigeria

Syslserver version 1.058 suffers from a denial of service vulnerability due to a mishandling of malformed UDP packets.

tags | advisory, denial of service, udp
SHA-256 | a6efafa996d39f89733fa58ff0381e0d9c1c6f8bc51e86bdf497ccdd62e2ae30
JASniff Packet Sniffer
Posted Dec 22, 2008
Authored by Jerome Athias

JASniff is a small handy graphical Windows TCP/UDP/ICMP packet sniffer. This tool will be embedded in the MSF-XB exploits development platform soon.Full source and a binary is included.

tags | tool, udp, sniffer, tcp
systems | windows
SHA-256 | 6b72a88cfe89a5313587d5fba7cc23c2b8067328f13b9efe6198926a12e185e5
linuxcb-shellcode.txt
Posted Nov 24, 2008
Authored by XenoMuta | Site xenomuta.tuxfamily.org

151 bytes of Linux/x86 connect-back shellcode that uses UDP port 54321 and executes tcpdump.

tags | x86, udp, shellcode
systems | linux
SHA-256 | 43697f2423432246a3de3022253c59fbb3331f2b592eabd562c28e4a731f5a8e
pkd-1.2.tgz
Posted Oct 30, 2008
Authored by eric

ipt_pkd is an iptables extension implementing port knock detection. This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.

Changes: See changelog.
tags | tool, kernel, udp, firewall
systems | linux
SHA-256 | a000be1cd760a5ca3ce687c4ee20fd925de3e78ddb59ea3742761a9d6d15f26b
Nmap Scanning Utility 4.76
Posted Sep 24, 2008
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Various updates to Zenmap. New external script category. Improved rpcinfo.nse. Fixed an assertion failure where raw TCP timing ping probes were wrongly used during a TCP connect scan.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 0e960e0553eb76470c8517a0038092a3969db65cbe23c03fd6daef1acdcc9658
Cisco Security Advisory 20080924-ipc
Posted Sep 24, 2008
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco 10000, uBR10012 and uBR7200 series devices use a User Datagram Protocol (UDP) based Inter-Process Communication (IPC) channel that is externally reachable. An attacker could exploit this vulnerability to cause a denial of service (DoS) condition on affected devices. No other platforms are affected. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.

tags | advisory, denial of service, udp, protocol
systems | cisco
advisories | CVE-2008-3805
SHA-256 | ea463164a5d2c0b0aaae0fd30a1013803446e2acd3ae1356a22e758958ba84a0
Nmap Scanning Utility 4.75
Posted Sep 8, 2008
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: Zenmap - Added a new Scan Topology system. Another exciting new Zenmap feature is Scan Aggregation. Expanded nmap-services to include information on how frequently each port number is found open. Nmap fast scan (-F) now scans the top 100 ports by default in either protocol. Nmap now scans the most common 1,000 ports by default in either protocol (UDP scan is still optional). Various other updates and enhancements.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | fb3236321dffd5dff763c8bf52ae11219c01dc147de62df8ed76693d4af872c5
Gentoo Linux Security Advisory 200809-2
Posted Sep 4, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200809-02 - Dan Kaminsky of IOActive reported that dnsmasq does not randomize UDP source ports when forwarding DNS queries to a recursing DNS server. Carlos Carvalho reported that dnsmasq in the 2.43 version does not properly handle clients sending inform or renewal queries for unknown DHCP leases, leading to a crash. Versions below 2.45 are affected.

tags | advisory, udp
systems | linux, gentoo
advisories | CVE-2008-3350, CVE-2008-1447
SHA-256 | ed1cca55454b5ba4e246627c0056fd8174c4cdebcacddb3a6fa5eae0bc89d4c0
draft-ietf-tsvwg-port-randomization-02.txt
Posted Sep 3, 2008
Authored by Fernando Gont, Michael Vittrup Larsen | Site ietf.org

This document describes a simple and efficient method for random selection of a client port number, such that the possibility of an attacker guessing the exact value is reduced. While this is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead. The mechanisms described in this document are a local modification that may be incrementally deployed, and that does not violate the specifications of any of the transport protocols that may benefit from it, such as TCP, UDP, SCTP, DCCP, and RTP.

Changes: This new revision of the document addresses the feedback we got from Amit Klein, Matthias Bethke, and Alfred Hoenes.
tags | paper, local, udp, tcp, protocol
SHA-256 | 61b14f84224795032551d1a5e2ebfe45a4f86868563581fff491e9408e636381
Gentoo Linux Security Advisory 200804-22
Posted Aug 22, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory [UPDATE] GLSA 200804-22:03 - Amit Klein of Trusteer reported that insufficient randomness is used to calculate the TRXID values and the UDP source port numbers (CVE-2008-1637). Thomas Biege of SUSE pointed out that a prior fix to resolve this issue was incomplete, as it did not always enable the stronger random number generator for source port selection (CVE-2008-3217). Versions less than 3.1.6 are affected.

tags | advisory, udp
systems | linux, suse, gentoo
advisories | CVE-2008-1637, CVE-2008-3217
SHA-256 | 7d5cac259201a9e986b7929ca9688bd105efdfe46b13c0ddf4e960f3611835ac
Nmap Scanning Utility 4.68
Posted Aug 13, 2008
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Changes: A large amount of improvements and fixes.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 4c1026da1386c4ce859ab1fda53311292e7a9c6a576ec328e7ae9b683edbc5af
Debian Linux Security Advisory 1619-1
Posted Jul 28, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1619-1 - Multiple weaknesses have been identified in PyDNS, a DNS client implementation for the Python language. Dan Kaminsky identified a practical vector of DNS response spoofing and cache poisoning, exploiting the limited entropy in a DNS transaction ID and lack of UDP source port randomization in many DNS implementations. Scott Kitterman noted that python-dns is vulnerable to this predictability, as it randomizes neither its transaction ID nor its source port. Taken together, this lack of entropy leaves applications using python-dns to perform DNS queries highly susceptible to response forgery.

tags | advisory, udp, spoof, python
systems | linux, debian
advisories | CVE-2008-1447
SHA-256 | ebe12a113c6df6c042ef47a1dba8bec4c568a74767c16910863035f96e4a9dbf
Debian Linux Security Advisory 1617-1
Posted Jul 25, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1617-1 - In DSA-1603-1, Debian released an update to the BIND 9 domain name server, which introduced UDP source port randomization to mitigate the threat of DNS cache poisoning attacks (identified by the Common Vulnerabilities and Exposures project as CVE-2008-1447). The fix, while correct, was incompatible with the version of SELinux Reference Policy shipped with Debian Etch, which did not permit a process running in the named_t domain to bind sockets to UDP ports other than the standard 'domain' port (53). The incompatibility affects both the 'targeted' and 'strict' policy packages supplied by this version of refpolicy. This update to the refpolicy packages grants the ability to bind to arbitrary UDP ports to named_t processes. When installed, the updated packages will attempt to update the bind policy module on systems where it had been previously loaded and where the previous version of refpolicy was 0.0.20061018-5 or below.

tags | advisory, arbitrary, udp, vulnerability
systems | linux, debian
advisories | CVE-2008-1447
SHA-256 | d9ed425b97874f61eb0207b3d26987e6036bffbbbbbedda8e4db2913f6def931
pkd-1.1.tgz
Posted Jul 24, 2008
Authored by eric

ipt_pkd is an iptables extension implementing port knock detection. This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.

Changes: Removed source port from hash.
tags | tool, kernel, udp, firewall
systems | linux
SHA-256 | 0f0c06e263787d03042d6443165bafefd95087367bf0f3981ba44546668d2060
Page 13 of 37
Back1112131415Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    13 Files
  • 31
    Aug 31st
    467 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close