exploit the possibilities
Showing 1 - 14 of 14 RSS Feed

Files from Jesus Oquendo

Email addresssil at infiltrated.net
First Active2006-07-26
Last Active2014-06-13
Yealink VoIP Phones XSS / CRLF Injection
Posted Jun 13, 2014
Authored by Jesus Oquendo

Yealink VoIP Phones suffer from CRLF injection and cross site scripting vulnerabilities. This affects firmware version 28.72.0.2 and hardware version 28.2.0.128.0.0.0.

tags | exploit, vulnerability, xss
advisories | CVE-2014-3427, CVE-2014-3428
MD5 | 09141b7f8a49b112dd8051a6052056c2
Ops View Pre 4.4.1 Blind SQL Injection
Posted Oct 29, 2013
Authored by Jesus Oquendo

Ops View version pre 4.4.41 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2013-5694
MD5 | cf326a65b9d6c1390e5e954c0543a072
Ops View Pre 4.4.1 Cross Site Scripting
Posted Oct 28, 2013
Authored by Jesus Oquendo

Ops View version pre 4.4.41 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
advisories | CVE-2013-5695
MD5 | e06b5f0bc8804df2abab5a8887e63a04
Adtran Netvanta 7100 Bypass / XSS / Injection
Posted Sep 19, 2013
Authored by Jesus Oquendo

Adtran Netvanta 7100 with firmware prior to R10.5.3.HA suffers from bypass, injection, and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss, bypass
advisories | CVE-2013-5210
MD5 | 31e242a5c99e137173cffaa45dc55a68
Ransack Post Exploitation Tool
Posted May 3, 2012
Authored by Jesus Oquendo

Ransack is a post exploitation shellscript for penetration testers. Its purpose is to grab any information deemed relevant on a system, post root compromise. This information may include config files, ssh keys, ssl keys, or any other information deemed valuable.

tags | tool, root, forensics
MD5 | 0962e2345c1f5dbab439c0b85f04748f
Phorensix VoIP Forensics Tool For Asterisk 1
Posted Jan 11, 2011
Authored by Jesus Oquendo

Phorensix is a post-login VoIP forensics tool created for Asterisk (tested on Asterisk 1.4.5 to be exact). Phorensix takes a look at a rogue host connecting to a vulnerable account. Who is connecting, where are they coming from, what are they doing to my PBX, what are they doing ON MY PBX.

tags | tool, forensics
MD5 | c5e2ddc4a07de0e44f07d16113d2e5ce
ie7-dos.txt
Posted Apr 19, 2007
Authored by Jesus Oquendo | Site infiltrated.net

Microsoft Internet Explorer version 7.0.5730.11 is susceptible to a denial of service condition via a malicious script tag.

tags | exploit, denial of service
MD5 | debe65364765dcd26c13cb64e6144921
sharpener.txt
Posted Nov 21, 2006
Authored by Jesus Oquendo | Site infiltrated.net

Sharpener is an ssh brute force blocking tool for Linux and the BSD's (Open/Net/Free). It runs in cron and parses out the brute force attempts to your server and automatically blocks those hosts from connecting. The script will also send an email of the attackers address to an account.

systems | linux, unix, bsd
MD5 | 14a3549a3f18dbb5349ee5323a4044db
modsecips.html
Posted Nov 13, 2006
Authored by Jesus Oquendo | Site infiltrated.net

Securing LAMP - A whitepaper that discusses a methodology to configure, test, and run a Secure LAMP environment.

tags | paper
MD5 | bcacccdeb14c1322732a9766c791d51a
asterisk-bugtraq.asc
Posted Nov 3, 2006
Authored by Jesus Oquendo | Site infiltrated.net

A vulnerability exists in the SIP channel driver (channels/chan_sip.c) in all versions of Asterisk prior to 1.2.13. Local and remote attackers are able to cause a denial of service (resource consumption) via unspecified vectors that result in the creation of "a real pvt structure" that uses more resources than necessary.

tags | advisory, remote, denial of service, local
advisories | CVE-2006-5445
MD5 | e5c5eb45d2ab59585538ccce2b60b60b
asteroidv1.tar.gz
Posted Nov 3, 2006
Authored by Jesus Oquendo | Site infiltrated.net

Asteroid is a SIP Denial of Service testing tool. It consists of over 36,000 unique SIP packets and can be quickly modified to create others. Packets are grouped into their respective types (INVITES, BYE, CANCEL, etc.) and can be sent individually or called from a shell script and sent in clusters. Asteroid has effectively crashed all versions of Asterisk up until 1.2.13 and greater which were patched against the sequence which caused the crash.

tags | denial of service, shell
MD5 | b32c56ab4004d2a75eeee109d9e8d824
asterisk-1.2.13.txt
Posted Oct 30, 2006
Authored by Jesus Oquendo | Site infiltrated.net

Asterisk Open Source PBX versions prior to 1.2.13 are vulnerable to local and remote denial of service attacks via a sequence of malformed packets.

tags | advisory, remote, denial of service, local
MD5 | a014b9cf99e6da2aba8214779169fd77
plague.txt
Posted Oct 27, 2006
Authored by Jesus Oquendo | Site infiltrated.net

Plague is an odd proof of concept backdoor tool based on the premise of using existing system files and commands to keep and maintain a backdoor on Linux systems. Uses awk and sed to make malicious commands seem innocuous.

tags | tool, rootkit, proof of concept
systems | linux, unix
MD5 | 273ee6e39c7e483761c86c572392c9a3
Achilles.c
Posted Jul 26, 2006
Authored by Jesus Oquendo

Modified version of the Achilles Windows Attack Tool that Microsoft claims does not demonstrate a denial of service vulnerability.

tags | exploit, denial of service
systems | windows
MD5 | 09be96124ac6f49ce252534b1ec8b74f
Page 1 of 1
Back1Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close