what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Dillon Beresford

First Active2010-05-07
Last Active2024-09-01
WANGKONGBAO CNS-1000 And 1100 UTM Directory Traversal
Posted Sep 1, 2024
Authored by Dillon Beresford | Site metasploit.com

This Metasploit module exploits the WANGKONGBAO CNS-1000 and 1100 UTM appliances aka Network Security Platform. This directory traversal vulnerability is interesting because the apache server is running as root, this means we can grab anything we want! For instance, the /etc/shadow and /etc/passwd files for the special kfc:$1$SlSyHd1a$PFZomnVnzaaj3Ei2v1ByC0:15488:0:99999:7::: user.

tags | exploit, root
advisories | CVE-2012-4031
SHA-256 | d703130a4e19f352d116626dfd12e1128953a5fa7ea158f7b83874ecbdf7a357
Siemens Simatic S7-1200 CPU START/STOP Module
Posted Jul 16, 2012
Authored by Dillon Beresford | Site metasploit.com

The Siemens Simatic S7-1200 S7 CPU start and stop functions over ISO-TSAP this modules allows an attacker to perform administrative commands without authentication. This Metasploit module allows a remote user to change the state of the PLC between STOP and START, allowing an attacker to end process control by the PLC.

tags | exploit, remote
SHA-256 | 209515171372e815da32934ab41fdd5f1c336d22022bec1c97308a5b5097d4c3
Siemens Simatic S7-300/400 CPU START/STOP Module
Posted Jul 16, 2012
Authored by Dillon Beresford | Site metasploit.com

The Siemens Simatic S7-300/400 S7 CPU start and stop functions over ISO-TSAP this modules allows an attacker to perform administrative commands without authentication. This Metasploit module allows a remote user to change the state of the PLC between STOP and START, allowing an attacker to end process control by the PLC.

tags | exploit, remote
SHA-256 | e012c156c46c53f51452c321377eed31d2bcff3d14db2c6ffe938003af648fc7
Siemens Simatic S7-300 PLC Remote Memory Viewer
Posted Jul 14, 2012
Authored by Dillon Beresford | Site metasploit.com

This Metasploit module attempts to authenticate using a hard-coded backdoor password in the Simatic S7-300 PLC and dumps the device memory using system commands.

tags | exploit
SHA-256 | d6907293e454a396426319c60a1d46ca00f48f5825d6033b2984938b778a4ca1
WANGKONGBAO CNS-1000 / CNS-1100 Directory Traversal
Posted Jul 2, 2012
Authored by Dillon Beresford

WANGKONGBAO CNS-1000 and CNS-1100 suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | d08faedbde9b8dbd524b59e4193f087991c4d236239f0b21829cb29d78dfe7f3
NJStar Communicator 3.00 MiniSMTP Server Remote Exploit
Posted Nov 2, 2011
Authored by Dillon Beresford | Site metasploit.com

This Metasploit module exploits a stack buffer overflow vulnerability in NJStar Communicator Version 3.00 MiniSMTP server. The MiniSMTP application can be seen in multiple NJStar products, and will continue to run in the background even if the software is already shutdown. According to the vendor's testimonials, NJStar software is also used by well known companies such as Siemens, NEC, Google, Yahoo, eBay; government agencies such as the FBI, Department of Justice (HK); as well as a long list of universities such as Yale, Harvard, University of Tokyo, etc.

tags | exploit, overflow
SHA-256 | 44083d9c71272bc52555d936d0b249f9a4093505dbbca952c03e4cf194db20b3
KingView 6.53 SCADA HMI Heap Overflow
Posted Jan 10, 2011
Authored by Dillon Beresford

KingView version 6.53 SCADA HMI heap overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 756238865e761c8e5c2055ba2ba802745cf3ac23518d9635de69403c333d7b1a
Motorola SB5101 Hax0rware Event Reset Remote Overflow
Posted Jun 9, 2010
Authored by Dillon Beresford

Motorola SB5101 Hax0rware event reset remote overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 532fb9884b7cc9cda3a400d902285594780f8388a8a9e422be8e5b934d9f7dfb
Motorola SB5101 Hax0rware Rajko HTTPd Remote Proof Of Concept
Posted Jun 9, 2010
Authored by Dillon Beresford

Motorola SB5101 Hax0rware Rajko HTTPd remote proof of concept denial of service exploit.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | f11e4c8e042ceb2366c5e971c759cb7848d1150fcf836c96cb932f831a22d2e8
AVCON 4.6.8.7 Buffer Overflow
Posted May 7, 2010
Authored by Dillon Beresford

AVCON version 4.6.8.7 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 1a8a480461d0d3c2498b083537be67c68a7297cd1eb60d87123ba8dc696ca7e6
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close