lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3F3BDF2E.2070201@violating.us>
Date: Thu, 14 Aug 2003 16:12:46 -0300
From: setuid <s3tuid@...lating.us>
To: bugtraq@...urityfocus.com, focus-linux@...urityfocus.com
Subject: [ paper + project release ] kless - connecting to void and getting
 out alive


hello list,

  For the last couple of months i've been researching some peculiarites 
of the
transport layer protocol which deflowered into a project of mine.
  The name is kless, and its goal is to be able to communicate using 
transport
layer protocols (tcp/udp) without opening any ports ( at least on the 
 server-
side ) and still be able to talk transparently to a client. Even if this 
topic
and probly the same technique are already known and a few tools already 
exists
i've written a paper which explains the whole concept and further more 
extends
it.
  The project also explains a way for you to kill udp sockets, even if 
you do-
nt have anything todo with the connection and a few other tricks. The 
text wi-
ll culminate into the coding of a remote portless shell  and some other 
 tools
for explaning purpose..

  Hope you guys enjoy it, comments/flames/feedbacks are expected...
  [kless paper + proof of concept code + few other tools ]
  http://setuid.violating.us/releases/kless.tar.gz



setuid at violating dot us | s3tuid at violating dot us




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ