This is a Metasploit module for enumerating public Azure services by validating legitimate subdomains through various DNS record queries. This cloud reconnaissance module rapidly identifies API services, storage accounts, key vaults, databases, and more!
ccd5eff55c0f2d978fd9aeb246beff5116650ca8cf92390516addb006dcf5583
Siemens SIMATIC S7-1200 CPU start/stop command cross site request forgery exploit. This older issue elaborates on t4rkd3vilz's CVE-2015-5698 by issuing a POST command to a specified web server path.
bec31b24b62a934362f2aebf30a3c1bbbc8f1ca87a9670d278c3773413280b4c
In 2015, HD Moore, the creator of Metasploit, published an article disclosing over 5,800 gas station Automated Tank Gauges (ATGs) which were publicly accessible. Besides monitoring for leakage, these systems are also instrumental in gauging fluid levels, tank temperature, and can alert operators when tank volumes are too high or have reached a critical low. ATGs are utilized by nearly every fueling station in the United States and tens of thousands of systems internationally. They are most commonly manufactured by Veeder-Root, a supplier of fuel dispensers, payment systems, and forecourt merchandising. For remote monitoring of these fuel systems, operators will commonly configure the ATG serial interface to an internet-facing TCP port (generally set to TCP 10001). This script reads the Get In-Tank Inventory Report from TCP/10001 as a proof of concept to demonstrate the arbitrary access.
1222ef3166eddf3e2b1283c72bc5f78616ec813de663f9a776c261eacba66ccf
APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers and TALON TC BACnet Automation Controllers. With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. All versions prior to 3.5 are affected.
9cdea8ef198269714420f4181480f5f779bae0a4ceba444e0d250e3b4071220a
Siemens S7-1200 versions 4.5 and below have an unauthenticated CPU start/stop command vulnerability.
88f2803fc2e5b53b6f08e265637da1495e7da749c19ccbe44164c5f1225850e9
Siemens S7 Layer 2 suffers from a denial of service vulnerability.
4256c23482f639e6a29cd1d513defa05599f5fe8035792c455db66f5eed15105