exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from George Hedfors

Email addressgeorge.hedfors at gmail.com
First Active2005-09-22
Last Active2011-05-01
Action Message Format (AMF) Shell 0.23
Posted May 1, 2011
Authored by George Hedfors | Site george.hedfors.com

Action Message Format (AMF) Shell is testing tool that demonstrates weaknesses in PHPAMF, especially where the default service 'DiscoveryService' has been left behind.

tags | tool, shell
systems | linux, unix
SHA-256 | 150be94024e1cfc90965e585dc08ff6eebd351f0b15fba769e5a4ba8ba6f0925
Cybercom Sweden AB Security Advisory CSESA-2010-8
Posted Nov 26, 2010
Authored by George Hedfors | Site newsroom.cybercom.com

Cisco Clientless SSL VPN (Secure Desktop) can be misconfigured when disabling the portal toolbar. The Portal toolbar is independent from filtering the actual browser requests. This means that all URL's and plugins are by default allowed even if the administrator only chooses to publish a few bookmarks to key systems where users should have access. This may lead to the possibility of giving unintended access to other systems behind the ASA.

tags | advisory
systems | cisco
SHA-256 | 4eb5734d29ebe15392aa7223640755c5c16effc9c7c936299c63698ecdfb737e
nwldapbf.txt
Posted Jun 24, 2008
Authored by George Hedfors | Site pinion.se

LDAP user enumerator and brute forcer for Novell Netware.

tags | cracker
SHA-256 | 7645ed276ced0f883e7e581ee878097725c1d06305d95d200b235c29d40c9e34
PTL_advisory_050825.txt
Posted Sep 22, 2005
Authored by George Hedfors | Site pinion.se

HP LaserJet printers have an extensive administrative user interface that is provided over SNMP. Pinion has discovered that HP LaserJet printers store information regarding recently printed documents. Information such as document name, title, number of pages, document size, user who has printed the document and the machine name where the print job was initiated can all be extracted via SNMP. Exploit provided. HP LaserJet 2430 is verified vulnerable.

tags | exploit
SHA-256 | 05d0039b4bbc9f489d2f36b9ee57d0cc22a0fc181e945e9ae6fc339bb43387e0
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close