exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files from FB1H2S

First Active2010-01-09
Last Active2012-10-09
PHP 5.3.4 com_event_sink 0-Day
Posted Oct 9, 2012
Authored by FB1H2S

PHP version 5.3.4 on windows com_event_sink zero day exploit.

tags | exploit, php
systems | windows
SHA-256 | 7c10651bbfba8d827368b8a19219613171b3dd6f2fc6885a3ddec4ea94d635e5
How I DOS'ed My Bank
Posted Sep 18, 2012
Authored by FB1H2S

This is a brief whitepaper that discusses DTMF input processing and easy denial of service attack via phone lines against banking systems.

tags | paper, denial of service
SHA-256 | 69dbef581e13a4637e1b0aa3251b231aa329ac074cbf3ea2f4870506046ed98f
MS11-046 Proof Of Concept
Posted Apr 18, 2012
Authored by FB1H2S

This is a proof of concept exploit for the vulnerability documented in MS11-046 for the Microsoft Windows Ancillary Function Driver (AFD).

tags | exploit, proof of concept
systems | windows
SHA-256 | db03166f4056e42fe514f3a64ffbe8b1395886a9e9f58f55dbe8e7302af75e70
Web Backdoors - Attack, Evasion And Detection
Posted Dec 6, 2011
Authored by FB1H2S

Whitepaper called Web Backdoors - Attack, Evasion and Detection. This paper provides insight on common web back doors and how simple manipulations could make them undetectable by AV and other security suits. It explains a few techniques that could be used to render undetectable and unnoticed backdoors inside web applications.

tags | paper, web
SHA-256 | b1a5cd53ac0ba93fa6ae8a95e647a33652ee817065946819d8fc813efa6fdce6
vBulletin 4.1.3 SQL Injection
Posted Jul 21, 2011
Authored by FB1H2S

vBulletin versions 4.0.x through 4.1.3 suffer from a remote SQL injection vulnerability in messagegroupid.

tags | exploit, remote, sql injection
SHA-256 | f6247497c278e39673c5ca386d68ebbd647569a0f0b7ec7d68b6e4a6963a2b5c
Ebay Persistent Cross Site Scripting
Posted Jul 13, 2011
Authored by FB1H2S

Ebay in India suffered from multiple persistent cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 709722d5fee1b863f22ade779f02c3c3c899332423de1609729e54de8e1fccc0
Microsoft Windows shmedia.dll Division By Zero
Posted Apr 4, 2011
Authored by FB1H2S

shmedia.dll in Microsoft Windows suffers from a division by zero issue that will trigger a denial of service condition. Proof of concept .avi included.

tags | exploit, denial of service, proof of concept
systems | windows
SHA-256 | cdd293bf17d5d0ac5da1c329734f232ac9627ff6a861396bdb8bfdc5b8130196
A Penetration Testers Guide To Finger Print Authentication
Posted Mar 2, 2011
Authored by FB1H2S

Whitepaper called A Penetration Testers Guide to Finger Print Authentication.

tags | paper
SHA-256 | 765d685444a69e09bb8e61d892694da54f50077d71ab630c5afd17ab4266c5c0
Antivirus / Firewall Evasion Techniques: Evolution Of Download Deploy Shellcode
Posted Jan 31, 2011
Authored by FB1H2S

Whitepaper called Antivirus / Firewall Evasion Techniques : Evolution of Download Deploy Shellcode.

tags | paper, shellcode
SHA-256 | dbb6ec4dcc2c9fc40144c8ec59fdeb2ca61452a22cb209fdf2e7903079ab80b1
Effectiveness Of Antivirus In Detecting Web Application Backdoors
Posted Jan 31, 2011
Authored by FB1H2S

Whitepaper called Effectiveness of Antivirus in Detecting Web Application Backdoors.

tags | paper, web
SHA-256 | 56b496efac0e7ee46bf1f739d096e2a7faddcbb9a3266a3471e63693230b5988
Security Token Prediction In Google Scholar Alerts
Posted Jan 24, 2011
Authored by FB1H2S

Whitepaper that discusses a security token prediction vulnerability in Google Scholar alerts.

tags | exploit
SHA-256 | 3cf72288cc52a5fdca22cae1d62858b7565ad40233aa1294bce10a40253fff48
Bypassing A Cisco IOS Firewall
Posted Dec 26, 2010
Authored by FB1H2S

Whitepaper called Bypassing A Cisco IOS Firewall.

tags | paper
systems | cisco
SHA-256 | 3f77609e2014ac8480e94a23a6d9d5d055c348c80951b8a37a5c86fc6f5c30cd
Apache 2.2 Local Denial Of Service
Posted Oct 27, 2010
Authored by FB1H2S

Apache 2.2 suffers from a local denial of service issue on Windows.

tags | exploit, denial of service, local
systems | windows
SHA-256 | a2ae731ec092009c52e197c594544de0d92bdc247403bbef73391ab3d382af0e
dBpowerAMP Audio Player Buffer Overflow
Posted Sep 1, 2010
Authored by FB1H2S, 41.w4r10r

dBpowerAMP Audio Player local buffer overflow exploit (EDI overwrite method used).

tags | exploit, overflow, local
advisories | CVE-2008-0661
SHA-256 | b12353ad095517fa0af0fc25a33dc1565f78f2a751f623553b119e82e88733c3
Cracking Salted Hashes
Posted Aug 24, 2010
Authored by FB1H2S

Whitepaper called Cracking Salted Hashes. The Do's and Don'ts of "Salt Cryptography".

tags | paper
SHA-256 | 2994290c21b4a94ba28fba881b3dd0dc6662a6442242e2f9b7f809a064ad0377
ZKSoftware Biometric Attendance Management Disclosure
Posted Mar 22, 2010
Authored by FB1H2S

ZKSoftware Biometric Attendance Management Hardware appears to dump user related information when improper authentication occurs over UDP port 4370.

tags | exploit, udp
SHA-256 | 44c78ee04a4610584c09283be6af36caf6d2c2411a90fa07784efbe98445c04c
CSICE Cross Site Request Forgery / Cross Site Scripting
Posted Mar 16, 2010
Authored by FB1H2S

CSICE suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 740d08e10637bef23e3391f65b45c2fd3f40f91b785b063effed7c1665fab755
CastRipper 2.9.6.0 .wvx File Local Buffer Overflow
Posted Feb 16, 2010
Authored by FB1H2S

CastRipper version 2.9.6.0 local buffer overflow exploit that creates a malicious .wvx file.

tags | exploit, overflow, local
SHA-256 | d5cea035509606ee18de1bb920ace4a6956ea1665d1ebf55f7a6e84fbb53c6c1
Httpdx 1.5 Directory Traversal
Posted Feb 15, 2010
Authored by FB1H2S

Httpdx version 1.5 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | f7f8255e2a5178282a6b3948576560ca649483e471c96c5e8c86debd4d932652
Serverchk.py SQL Injection Scanner
Posted Feb 10, 2010
Authored by FB1H2S | Site whitec0de.com

Serverchk.py is a python script written to scan web applications for SQL injection vulnerabilities.

tags | tool, web, scanner, vulnerability, sql injection, python
systems | unix
SHA-256 | d0ddb6281fd5a4886511316dd456027446ae9f16291895b5c960f2844b37c776
Building Your Own Shellcode
Posted Feb 10, 2010
Authored by FB1H2S

Whitepaper called Building Your Own Shell-codes.

tags | paper, shell, shellcode
SHA-256 | 86ef527d9aa10343480e09786cd1e4d1938ad0c3b246d7d5f2f5973fcf16289d
Linux /bin/cat /etc/passwd Shellcode
Posted Feb 9, 2010
Authored by FB1H2S

43 bytes small /bin/cat /etc/passwd Linux x/86 shellcode.

tags | shellcode
systems | linux
SHA-256 | de7500ae0726581b49c0f823c1ea34c0093776ca11b5329ed06e55f9179a1bf9
EFS Easy Chat Server Buffer Overflow
Posted Jan 22, 2010
Authored by FB1H2S | Site metasploit.com

This Metasploit module exploits a vulnerability in Easy chat server by passing an arbitrary evil buffer along with the username password. Successful attack could run arbitrary code on a victim's machine.

tags | exploit, overflow, arbitrary
SHA-256 | dfe25c0c2f33944c8516c3c48dc671a20c63a0a1203641bd813ed22147c948d1
Surge-FTP Cross Site Scripting
Posted Jan 11, 2010
Authored by FB1H2S

Surge-FTP suffers from an administrative web interface cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 3647c9dbf6a9fe304ceceda29eece4259647eb66d41dcee1ea92100a3f07a88d
Soritong v1.0 Universal BOF-SEH (META)
Posted Jan 11, 2010
Authored by FB1H2S | Site metasploit.com

This Metasploit module exploits a stack overflow in Soritong v1.0. By creating a specially crafted skin ui file making it possible to execute arbitrary code. Just replace the skin file with the new one.

tags | exploit, overflow, arbitrary
SHA-256 | 4b32d44688159c58903748c1b0be928e6be3bce8ab982fc9b243fbbcf25048e7
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close