what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files

hunt-1.5bin.tgz
Posted May 30, 2000
Authored by Pavel Krauz | Site cri.cz

Hunt (linux binary distribution) is a program for intruding into a tcp connection, watching it and resetting it. It can handle all connections it sees. Features: Connection Management - setting what connections you are interested in, detecting an ongoing connection (not only SYN started), Normal active hijacking with the detection of the ACK storm, ARP spoofed/Normal hijacking with the detection of successful ARP spoof, synchronization of the true client with the server after hijacking (so that the connection don't have to be reset), resetting connection, watching connection; Daemons - reset daemon for automatic connection resetting, arp spoof/relayer daemon for arp spoofing of hosts with the ability to relay all packets from spoofed hosts, MAC discovery daemon for collecting MAC addresses, sniff daemon for logging TCP traffic with the ability to search for a particular string; Packet Engine - extensible packet engine for watching TCP, UDP, ICMP and ARP traffic, collecting TCP connections with sequence numbers and the ACK storm detection; Switched Environment - hosts on switched ports can be spoofed, sniffed and hijacked too; much, much more. Requires Linux 2.2, GlibC 2.1 with LinuxThreads, Ethernet.

Changes: Bug fix release - computation of packet checksum has been fixed, packet relaying for routers has been corrected, unprintable characters are printed in <hex> and printing of terminal control characters can be turned off.
tags | tool, udp, spoof, sniffer, tcp
systems | linux
SHA-256 | ac19041b44e008c04d61ff7f5b5814d6dca222360f7b72d642db09ae5b89b9b3
hunt-1.5.tgz
Posted May 30, 2000
Authored by Pavel Krauz | Site cri.cz

Hunt is a program for intruding into a tcp connection, watching it and resetting it. It can handle all connections it sees. Features: Connection Management - setting what connections you are interested in, detecting an ongoing connection (not only SYN started), Normal active hijacking with the detection of the ACK storm, ARP spoofed/Normal hijacking with the detection of successful ARP spoof, synchronization of the true client with the server after hijacking (so that the connection don't have to be reset), resetting connection, watching connection; Daemons - reset daemon for automatic connection resetting, arp spoof/relayer daemon for arp spoofing of hosts with the ability to relay all packets from spoofed hosts, MAC discovery daemon for collecting MAC addresses, sniff daemon for logging TCP traffic with the ability to search for a particular string; Packet Engine - extensible packet engine for watching TCP, UDP, ICMP and ARP traffic, collecting TCP connections with sequence numbers and the ACK storm detection; Switched Environment - hosts on switched ports can be spoofed, sniffed and hijacked too; much, much more. Requires Linux 2.2, GlibC 2.1 with LinuxThreads, Ethernet.

Changes: Bug fix release - computation of packet checksum has been fixed, packet relaying for routers has been corrected, unprintable characters are printed in here.
tags | tool, udp, spoof, sniffer, tcp
systems | linux
SHA-256 | a8a1978f3bd05ca3f01c168c13c9a09b1e1e9038c14fdfe43694c07fe3a0e328
hunt-1.4.tgz
Posted Oct 13, 1999
Authored by Pavel Krauz

Hunt is a program for intruding into a connection, watching it and resetting it. (source code package). It has several features, which I didn't find in any product like Juggernaut or T-sight that inspired me in my development. Note that hunt is operating on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. The hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Changes from 1.3: eth tap relay - transproxy support without my eth mac spoofing, support for spoofing range of IP addresses, relaying packets in arp-relayer that are sent from/to routers, support for arp-spoof of hosts that are currently down, tpserv/tpserv.c transproxy testing program tpsetup/transproxy script for setting transproxy support mode.

tags | tool, local, spoof, sniffer
SHA-256 | 67bf57a29fe9cba3fbf27789e5ca66a5b59eb00eccb4775058cd8013fdd2288c
hunt-1.4bin.tgz
Posted Oct 13, 1999
Authored by Pavel Krauz

Hunt is a program for intruding into a connection, watching it and resetting it. (linux binary distribution). It has several features, which I didn't find in any product like Juggernaut or T-sight that inspired me in my development. Note that hunt is operating on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. The hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Changes from 1.3: eth tap relay - transproxy support without my eth mac spoofing, support for spoofing range of IP addresses, relaying packets in arp-relayer that are sent from/to routers, support for arp-spoof of hosts that are currently down, tpserv/tpserv.c transproxy testing program tpsetup/transproxy script for setting transproxy support mode.

tags | tool, local, spoof, sniffer
systems | linux
SHA-256 | 4fbc536818885a42c005c10ae3f0bf335a07d693ae2b5626b127ad46db0f40b4
hunt-1.0.tgz
Posted Aug 17, 1999
Authored by Pavel Krauz

Hunt is a tool for exploiting well known weaknesses in TCP/IP protocol. Use primarily to hijack connections, but has many other features.

tags | tool, sniffer, tcp, protocol
SHA-256 | f0639701ad97ed9bc418c30c6796f9cd132a26e09e58c6508f479719d5d1648e
hunt-1.1.tgz
Posted Aug 17, 1999
Authored by Pavel Krauz

Hunt is a program for intruding into a connection, watching it and resetting it. Hunt operates on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. Hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Connection hijacking is aimed primarily at the telnet or rlogin traffic but it can be used for another traffic too. Features: connection management (watching, spoofing, detecting, hijacking, resetting), daemons (resetting, arp spoof/relayer daemon, MAC discovery daemon for collecting MAC addresses, sniff daemon for logging TCP traffic), host resolving, packet engine (TCP, UDP, ICMP and ARP traffic; collecting TCP connections with sequence numbers and the ACK storm detection), switched environment (hosts on switched ports can be spoofed, sniffed and hijacked too). This latest release includes lots of debugging and fixes in order to get the hunt running against hosts on switched ports, timejobs, dropping IP fragments, verbose status bar, options, new connection indicator, various fixes.

tags | tool, local, udp, spoof, sniffer, tcp
SHA-256 | f4bd1e6775c5e3092cb7aaca4b8780ea6344a3940ef2d815b9f344aaf86a1d25
hunt-1.2.tgz
Posted Aug 17, 1999
Authored by Pavel Krauz

Hunt is a program for intruding into a connection, watching it and resetting it. Hunt operates on Ethernet and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. Hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Connection hijacking is aimed primarily at the telnet or rlogin traffic but it can be used for another traffic too. Features: connection management (watching, spoofing, detecting, hijacking, resetting), daemons (resetting, arp spoof/relayer daemon, MAC discovery daemon for collecting MAC addresses, sniff daemon for logging TCP traffic), host resolving, packet engine (TCP, UDP, ICMP and ARP traffic; collecting TCP connections with sequence numbers and the ACK storm detection), switched environment (hosts on switched ports can be spoofed, sniffed and hijacked too). This latest release includes lots of debugging and fixes in order to get the hunt running against hosts on switched ports, timejobs, dropping IP fragments, verbose status bar, options, new connection indicator, various fixes.

tags | tool, local, udp, spoof, sniffer, tcp
SHA-256 | 29721370d82003b9dbb5f153b2584c29b6724d215b8889cbed13da229dbc96ba
hunt-1.3.tgz
Posted Aug 17, 1999
Authored by Pavel Krauz

Hunt is a program for intruding into a connection, watching it and resetting it. Hunt operates on Ethernets and is best used for connections which can be watched through it. However, it is possible to do something even for hosts on another segments or hosts that are on switched ports. Hunt doesn't distinguish between local network connections and connections going to/from Internet. It can handle all connections it sees. Connection hijacking is aimed primarily at the telnet or rlogin traffic but it can be used for other traffic too. Features: Connection Management - setting what connections you are interested in, detecting an ongoing connection (not only SYN started), Normal active hijacking with the detection of the ACK storm, ARP spoofed/Normal hijacking with the detection of successful ARP spoof, synchronization of the true client with the server after hijacking (so that the connection don't have to be reset), resetting connection, watching connection; Daemons - reset daemon for automatic connection resetting, arp spoof/relayer daemon for arp spoofing of hosts with the ability to relay all packets from spoofed hosts, MAC discovery daemon for collecting MAC addresses, sniff daemon for logging TCP traffic with the ability to search for a particular string; Host Resolving - deferred host resolving through dedicated DNS helper servers; Packet Engine - extensible packet engine for watching TCP, UDP, ICMP and ARP traffic, collecting TCP connections with sequence numbers and the ACK storm detection; Switched Environment - hosts on switched ports can be spoofed, sniffed and hijacked too; much, much more. Just get it now! New Features and Changes in this release: Sendmsg and ENOBUFS in net.c, Locking bug in ARP relayer causing ARP relayer to lookup fixed, Locking bug (as was shown in ARP relayer) in sniffer fixed, Line mode in hijacking - useful when hijacking connections other than telnet or rlogin, synchhijack fixed for read/write==0. Requires glibc 2.0.7 or more recent, and linuxthreads.

tags | tool, local, udp, spoof, sniffer, tcp
SHA-256 | 0c6a3f42ed41ca7bfa09835cbd98f5799b072ad1cecd19451d6fb94e627fcc3b
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Fancy Bear Uses Nuke Threat Lure To Exploit 1-Click Bug
Posted Jun 23, 2022

tags | headline, hacker, malware, russia, flaw
CISA Warns Over Software Flaws In Industrial Control Systems
Posted Jun 23, 2022

tags | headline, government, usa, flaw, scada
Questions Over Cyber Command Support, Operations Raised In Defense Authorization Bill
Posted Jun 23, 2022

tags | headline, government, usa, cyberwar, military
NSA, CISA Say: Don't Block PowerShell, Here's What To Do Instead
Posted Jun 23, 2022

tags | headline, government, microsoft, usa, flaw
Yodel Becomes Latest Victim Of A Cyber Incident
Posted Jun 22, 2022

tags | headline, britain
Elusive ToddyCat APT Targets Microsoft Exchange Servers
Posted Jun 22, 2022

tags | headline, hacker, malware, microsoft, email
Mega Says It Can't Decrypt Your Files. New POC Exploit Shows Different
Posted Jun 22, 2022

tags | headline, hacker, privacy, flaw, pirate, cryptography, new zealand
Apple's iOS 16 Will Give You An Alternative To Irritating CAPTCHAs
Posted Jun 22, 2022

tags | headline, phone, password, apple
1.5 Million Customers Impacted By Flagstar Bank Data Breach
Posted Jun 21, 2022

tags | headline, hacker, privacy, bank, data loss, flaw
Hidden Anti-Cryptography Provisions In Internet Anti-Trust Bills
Posted Jun 21, 2022

tags | headline, government, privacy, usa, phone, cryptography
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close