exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Val Smith

Email addressvalsmith at metasploit.com
First Active2006-03-22
Last Active2011-02-18
Forgotten World - Corporate Business Application Systems
Posted Feb 18, 2011
Authored by Val Smith, Sh2kerr

Whitepaper called Forgotten World - Corporate Business Application Systems. This paper will describe some basic and advanced threats and attacks on Enterprise Business Applications – the core of many companies. Both the paper and Blackhat DC presentation are included in this archive.

tags | paper
systems | linux
SHA-256 | 2e70cc9c883bdf948194b3801a4b9fe5f07f8e73912c291bd5c5b643e993e4a6
phpBB viewtopic.php Arbitrary Code Execution
Posted Dec 31, 2009
Authored by H D Moore, Val Smith, Patrick Webster | Site metasploit.com

This Metasploit module exploits two arbitrary PHP code execution flaws in the phpBB forum system. The problem is that the 'highlight' parameter in the 'viewtopic.php' script is not verified properly and will allow an attacker to inject arbitrary code via preg_replace().

tags | exploit, arbitrary, php, code execution
advisories | CVE-2005-2086, CVE-2004-1315
SHA-256 | 3a2382adc10594ee42ff1bd0b49855a630ee0af65a53e90bd2f33b29bcbe9542
Sasser Worm avserve FTP PORT Buffer Overflow
Posted Nov 26, 2009
Authored by patrick, Val Smith, chamuco | Site metasploit.com

This Metasploit module exploits the FTP server component of the Sasser worm. By sending an overly long PORT command the stack can be overwritten.

tags | exploit, worm
SHA-256 | 5d5c22dfbd84d41c7c21a45e5676f648dbcc83cd3302d47b1a95c27ace3b87f0
phpBB viewtopic.php Arbitrary Code Execution
Posted Oct 30, 2009
Authored by Val Smith

This Metasploit module exploits two arbitrary PHP code execution flaws in the phpBB forum system. The problem is that the 'highlight' parameter in the 'viewtopic.php' script is not verified properly and will allow an attacker to inject arbitrary code via preg_replace().

tags | exploit, arbitrary, php, code execution
advisories | CVE-2005-2086, CVE-2004-1315
SHA-256 | 1bd480a3c38c3cf0cbb3b509893353c357ec5b1bf7fc0df522daa1890d05161f
Further Down The VM Spiral
Posted Jan 4, 2009
Authored by Val Smith, chamuco | Site offensivecomputing.net

Presentation called Further Down the VM Spiral.

tags | paper
SHA-256 | c375df19723aa50405c3578260589605b47dac194a812c3bcb3360c7a43ef6bf
Inside The Malicious World Of Blog Comment Spam
Posted Jan 4, 2009
Authored by Val Smith, Colin Ames | Site offensivecomputing.net

Whitepaper called Inside the Malicious World of Blog Comment Spam.

tags | paper
SHA-256 | dccb3a2c0c1cdd5b6a2aefb021cd01be7b0b1a7fcca5840483c345b10b991d3b
Hacking Malware - Offense Is The New Defense
Posted Jan 4, 2009
Authored by Val Smith, chamuco

Presentation called Hacking Malware - Offense is the new Defense.

tags | paper
SHA-256 | 49a69eea4ecdcbb9fd14a6e4078bbd75a781159d16030e70283919300e0d4dd9
vm.pdf
Posted Mar 22, 2006
Authored by Val Smith | Site offensivecomputing.net

Detecting the Presence of Virtual Machines Using the Local Data Table - This paper describes a method for determining the presence of virtual machine emulation in a non-privileged operating environment. This attack is useful for triggering anti-virtualization attacks and evading analysis.

tags | paper, local
SHA-256 | 48ac374b43d646206bf8a59b9cc0aed6ac19a76791acaea176314b493393c68e
Page 1 of 1
Back1Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    18 Files
  • 22
    Feb 22nd
    15 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    10 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    37 Files
  • 27
    Feb 27th
    34 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close