exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Gleb Gritsai

First Active2011-07-26
Last Active2019-12-13
Siemens Security Advisory - SPPA-T3000 Code Execution
Posted Dec 13, 2019
Authored by Gleb Gritsai, Vyacheslav Moskvin, Can Demirel, Ivan B, Radu Motspan, Sergey Andreev, Eugenie Potseluevskaya | Site siemens.com

Siemens Security Advisory - SPPA-T3000 Application Server and MS3000 Migration Server are affected by multiple vulnerabilities. Some of the vulnerabilities can allow an attacker to execute arbitrary code on the server. Exploitation of the vulnerabilities described in this advisory requires access to either Application- or Automation Highway. 54 CVEs are covered in this advisory.

tags | advisory, arbitrary, vulnerability
advisories | CVE-2018-4832, CVE-2019-18283, CVE-2019-18284, CVE-2019-18285, CVE-2019-18286, CVE-2019-18287, CVE-2019-18288, CVE-2019-18289, CVE-2019-18290, CVE-2019-18291, CVE-2019-18292, CVE-2019-18293, CVE-2019-18294, CVE-2019-18295, CVE-2019-18296, CVE-2019-18297, CVE-2019-18298, CVE-2019-18299, CVE-2019-18300, CVE-2019-18301, CVE-2019-18302, CVE-2019-18303, CVE-2019-18304, CVE-2019-18305, CVE-2019-18306, CVE-2019-18307
SHA-256 | 0636a7784a6b6049e309f7c4196c3d2515df2918a53684de123fa3ec60d8329a
WinCC Under X-Rays
Posted Jan 21, 2013
Authored by Sergey Gordeychik, Gleb Gritsai, Denis Baranov | Site ptsecurity.com

These are slides from a presentation call WinCC Under X-Rays.

tags | paper
SHA-256 | 48affd9265f6129d8e1b9288f64659adda11ce5640c00598776b5fa4cc425985
Simatic WinCC Information Harvester
Posted Jan 21, 2013
Authored by Gleb Gritsai, Vyacheslav Egoshin, Dmitry Nagibin | Site metasploit.com

This Metasploit module receives sensitive information from the WinCC database.

tags | exploit
SHA-256 | 627da9137aaf5c71b77b876b03bb54d07c3d0135bcd88283a54933c5111a7071
ICS / SCADA / PLC Google / Shodanhq Cheat Sheet
Posted Jan 21, 2013
Authored by Yuri Goltsev, Gleb Gritsai, Alexander Timorin, Roman Ilin | Site ptsecurity.com

This document illustrates multiple ways to identify multiple SCADA systems.

tags | paper
SHA-256 | 4a6fa6642d990c8dd6fd4923a4888e0ece61a8ec460784de6393c1c946926834
Dlink DPH 150SE/E/F1 Access Bypass Issues
Posted Jul 26, 2011
Authored by Yuri Goltsev, Gleb Gritsai, Alexander Zaitsev | Site ptsecurity.com

The Dlink DPH 150SE/E/F1 IP phone suffers from denial of service and various unauthenticated access and modification vulnerabilities.

tags | advisory, denial of service, vulnerability
SHA-256 | 26fccaa5ce6123c970ad586f47c5d8a6c4dd0e9765aa221bc691efade5b1b759
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close