Exploit the possiblities
Showing 1 - 21 of 21 RSS Feed

Files from David Coomber

First Active2006-01-03
Last Active2017-11-17
Cisco Umbrella Virtual Appliance 2.1.0 Hardcoded Credentials
Posted Nov 17, 2017
Authored by David Coomber | Site info-sec.ca

Cisco Umbrella virtual appliance versions 2.1.0 and below contain undocumented hardcoded credentials which could allow an attacker to access the hypervisor console and provide persistent and unrestricted access to the virtual appliance.

tags | advisory
systems | cisco
advisories | CVE-2017-12350
MD5 | 993e3f76b4724491d5f16794bc2fb968
Cisco Umbrella Virtual Appliance 2.0.3 Undocumented Support Tunnel
Posted Oct 24, 2017
Authored by David Coomber

Cisco Umbrella Virtual Appliance versions 2.0.3 and below contain an undocumented, auto-initiated reverse SSH tunnel which allows the Cisco Umbrella support team to have persistent and unrestricted access to the virtual appliance.

tags | advisory
systems | cisco
advisories | CVE-2017-6679
MD5 | b176f5aecc3e42a73c69376a8d0395b6
Apple Support iOS Application 1.1.1 Unencrypted Third Party Analytics
Posted Oct 24, 2017
Authored by David Coomber

Apple Support iOS application versions 1.1.1 and below send potentially sensitive information such as mobile carrier, install date and time, number of app launches, device model, iOS version and screen resolution, unencrypted to a third party site (Adobe Marketing Cloud).

tags | advisory
systems | apple, ios
advisories | CVE-2017-7147
MD5 | 228b93dcbffcf65f58e7495bb25a4bb0
Apple Music Android Application Man-In-The-Middle
Posted Apr 6, 2017
Authored by David Coomber

The Apple Music Android application (version 1.2.1 and below) does not validate the SSL certificate received when connecting to the mobile application login and payment servers.

tags | advisory
systems | apple
advisories | CVE-2017-2387
MD5 | 77f6d3bf2a4d79ba1870023309aa385e
Trend Micro Enterprise Mobile Security Android Application Man-In-The-Middle
Posted Mar 30, 2017
Authored by David Coomber

The Trend Micro Enterprise Mobile Security android application suffers from a man-in-the-middle SSL certificate vulnerability.

tags | advisory
advisories | CVE-2016-9319
MD5 | f80c525a43a419b297b0ae9bdde3471e
ShoreTel Mobility Client iOS 9.1.2.101 SSL Man-In-The-Middle
Posted Jan 4, 2017
Authored by David Coomber

ShoreTel Mobility Client iOS application versions 9.1.2.101 and below do not validate the SSL certificate they receive when connecting to the mobile application login server.

tags | advisory
systems | cisco, ios
advisories | CVE-2016-6562
MD5 | 504528fda2cb031d91ae4db08bcb18ed
Kaspersky Safe Browser Man-In-The-Middle
Posted Jul 29, 2016
Authored by David Coomber

Kaspersky Safe Browser suffers from a man-in-the-middle vulnerability.

tags | advisory
advisories | CVE-2016-6231
MD5 | c560a316f015bf550738b9123c203979
Acer Portal Android Application 3.9.3.2006 Man-In-The-Middle
Posted Jul 5, 2016
Authored by David Coomber

The Acer Portal Android application version 3.9.3.2006 and below, installed by the manufacturer on all Acer branded Android devices, does not validate the SSL certificate it receives when connecting to the mobile application login server.

tags | advisory
advisories | CVE-2016-5648
MD5 | 18577e2af30c987e1bffc397498a8603
Trend Micro Mobile Security Man-In-The-Middle
Posted May 11, 2016
Authored by David Coomber

Trend Micro Mobile Security iOS application versions 3.1.1034 and below fail to validate the SSL certificate it receives when connecting to the mobile application login server.

tags | advisory
systems | ios
advisories | CVE-2016-3664
MD5 | 85cb234c73866b26c22a4774c83e692f
Panda SM Manager 2.0.10 Certificate Validation Fail
Posted Mar 3, 2016
Authored by David Coomber

Panda SM Manager versions 2.0.10 and below fail to verify the SSL certificate they receive when connecting to a secure site.

tags | advisory
MD5 | 99ed3f6629989317abc7b5beee211062
Dell SecureWorks iOS Certificate Validation Failure
Posted Feb 5, 2016
Authored by David Coomber

The Dell SecureWorks iOS application versions 2.0.6 and below do not validate the SSL certificate they receive when connecting to a secure site.

tags | advisory
systems | ios
MD5 | f9550c78cbd4a67f586f2d75e66cbf17
Webroot SecureAnywhere Business 1.10.316 SSL Validation
Posted Sep 6, 2015
Authored by David Coomber

Webroot SecureAnywhere Business versions 1.10.316 and below fail to validate SSL certificates.

tags | advisory
MD5 | f319bb12019f6735cf86b777290b0acf
Avira Mobile Security Insecure Transit
Posted Sep 5, 2015
Authored by David Coomber

Avira Mobile Security versions 1.5.7 and below send credentials in the clear over HTTP.

tags | advisory, web
MD5 | 28b249bfae5717a39234c7aa0713e666
Thycotic Password Manager Secret Server MITM
Posted May 27, 2015
Authored by David Coomber

Thycotic Password Manager Secret Server suffers from a man-in-the-middle SSL certificate verification vulnerability.

tags | advisory
MD5 | 8421786188aa04c0acac4124918c54e4
McAfee Advanced Threat Defense Sandbox Fingerprinting / Bypass
Posted Jan 17, 2015
Authored by David Coomber

McAfee Advanced Threat Defense suffers from sandbox fingerprinting and bypass vulnerabilities.

tags | advisory, vulnerability, bypass
MD5 | be66556d5a8ac3ba991664ec0c3ad05b
p0f 3.07b Windows Port
Posted May 23, 2014
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Version 3 is a complete rewrite of the original codebase, incorporating a significant number of improvements to network-level fingerprinting, and introducing the ability to reason about application-level payloads (e.g., HTTP).

Changes: This is a Windows port of the latest release created by David Coomber.
tags | tool, web, scanner, tcp
systems | unix
MD5 | 63cf11bbdd003c67a41388faef8dfc49
p0f 3.03b Windows Port
Posted Jan 25, 2012
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Version 3 is a complete rewrite of the original codebase, incorporating a significant number of improvements to network-level fingerprinting, and introducing the ability to reason about application-level payloads (e.g., HTTP).

Changes: This is a Windows port of the latest release created by David Coomber.
tags | tool, web, scanner, tcp
systems | windows
MD5 | aea524324828790b24a90be3bb7a0d93
p0f-2.0.8-db-20080806.tar.gz
Posted Aug 8, 2008
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

Changes: Added better handling of MySQL error codes.
tags | tool, remote, local, scanner
systems | windows, unix
MD5 | b85bbe604ddd7cb813e7d132655ccc72
p0f-2.0.8-db-20070919.tar.gz
Posted Sep 20, 2007
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

Changes: Insufficient OS description escapes fixed. Other fixes.
tags | tool, remote, local, scanner
systems | windows, unix
MD5 | fb66dfbdde92a2e8f81bb057a16205b5
p0f-2.0.8-win32.zip
Posted Jun 19, 2007
Authored by Michal Zalewski, David Coomber | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to the remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Note that this version is the win32 compiled version. Original code by Michal Zalewski, compiling by David Coomber.

tags | tool, remote, local, scanner
systems | windows, unix
MD5 | dacece154deb4a4c4a28b21176ba3308
macgen.tgz
Posted Jan 3, 2006
Authored by David Coomber, Doug Hoyte | Site info-sec.ca

macgen is a small utility designed to produce a random MAC address.

tags | tool
systems | unix
MD5 | 8e7a902a99439ed7c53a0de25e50a5ae
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close