MD5 Collision Parser

MD5 Collision Parser
by Joel R. Voss aka. Javantea
jvoss@altsci.com
jvoss@myuw.net
Nov 17, 2005

MD5 Collision Parser 0.1 Source [sig]
MD5 Collision Data Example [sig]
MD5 Collision Generation Homepage

DESCRIPTION

This program parses the output of an MD5 Collision Generation program. It creates two binaries with the same md5sum. Hopefully this will allow people to put MD5 into a deep grave with a dozen nails in the coffin.

METHOD

I went for quick and dirty. This python program is not secure. In fact, a person should not use this until after looking at both the source and the data. The program uses an eval() call on the data.

Read more »

Network Mapping 1

Network Mapping
by Joel R. Voss aka. Javantea
jvoss@altsci.com
jvoss@myuw.net
Nov 11-13, 2005

NetMap2 0.2.2 Source [sig]
NetMap1 0.2.1 Source [sig]

DESCRIPTION

Netmap1 Neg9 Talk
Netmap2 Neg9 Talk
Netmap2 Neg9 Project

The Network Mapping project (also known as Neg9 UW Network Project) plans to develop tools to report on the usage of public networks through active scanning of ports. The first two tools are known as netmap1. It uses Nmap to discover available hosts and discover open ports on the hosts. Netmap1 involves two tools that can be run as part of a script. parse_ping1.py and parse_port1.py are run by the script scan_full1.sh. The output of the script are a set of xml files and records in a MySQL database.

Read more »

Network Mapping 2

Network Mapping
by Joel R. Voss aka. Javantea
jvoss@altsci.com
jvoss@myuw.net
Nov 11-13, 2005

NetMap2 0.2.2 Source [sig]
NetMap1 0.2.1 Source [sig]

DESCRIPTION

Netmap1 Neg9 Talk
Netmap2 Neg9 Talk
Netmap2 Neg9 Project
BitTorrent Attack

The Network Mapping project (also known as Neg9 UW Network Project) plans to develop tools to report on the usage of public networks through active scanning of ports. The first two tools are known as netmap1. It uses Nmap to discover available hosts and discover open ports on the hosts. Netmap1 involves two tools that can be run as part of a script. parse_ping1.py and parse_port1.py are run by the script scan_full1.sh. The output of the script are a set of xml files and records in a MySQL database.

Read more »

Reverse Shellcode for Linux


June 22, 2006

The shellcode is 90 bytes, but would be 84 bytes if it used an ip address without nulls.

revsh1.s is the documented assembly.

To test the reverse shellcode, you absolutely require a listener. nc -l -p 43690; If the listener is not running, it will segfault because eax gets all messed up.

You can either run the standalone executable or run
s-proc -e linux_sc5.bin.

Read more »

« previous next »