Email address | private |
---|---|
First Active | 2012-06-11 |
Last Active | 2014-06-06 |
Madness Pro versions 1.14 and below suffer from a remote SQL injection vulnerability.
f190c6d4cfaf0e7af5638e4a9fb5e73b
Madness Pro versions 1.14 and below suffer from a persistent cross site scripting vulnerability.
8e5a20a7ca70275146d362b152deb713
TORQUE Resource Manager versions 2.5.x through 2.5.13 suffer from a stack buffer overflow vulnerability.
470b1d1a56ee44f68d79e62d8c5debbf
Proof of concept exploit that extracts a database from a Herpes Net version 3.0 bot panel.
5a394a6c70ad562b92f0f1f3ee8401e3
This Metasploit module exploits a vulnerability found in the command and control panel used to control Dexter (Point of Sale malware). This is done by accessing the PHP page used by bots to report in (gateway.php) which does not sanitize input. Input is encrypted and encoded, but the key is supplied by the bot connecting. The 'page' parameter is used in this case. The command and control panel designates a location to upload files, and can be used as a reliable location to write a PHP shell. Authentication is not needed to exploit this vulnerability.
3d3503192a5fefe905fdb8be6fd7aab8
Proof of concept SQL injection exploit for the panel in Dexter CasinoLoader. It exploits the gateway for bots to connect in, which sanitizes none of its input. This version of the exploit just dumps database data, and can create a GEXF file to make a graph in Gephi.
27f6db88604434b092c8e19bef8326b7
Bitbot C2 Panel suffers from cross site scripting and remote SQL injection vulnerabilities in gate2.php.
0f4dc4726704e210ced0dadbe089357b
This Metasploit module exploits backdoors that can be sighted all over the leaked source code of the Carberp botnet C2 Web Panel.
5980f13b254ff37b493422740671301a
This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is enabled on the web server. This shell is widely used in automated RFI payloads.
14fe20dbc0bd59c275dc99df677548aa
This Metasploit module exploits unauthenticated versions of the "STUNSHELL" web shell. This Metasploit module works when safe mode is disabled on the web server. This shell is widely used in automated RFI payloads.
f26790bb1fd499aae352a4ad6c8754a0
This Metasploit module exploits a lack of authentication in the shell developed by v0pCr3w and is widely reused in automated RFI payloads. This Metasploit module takes advantage of the shell's various methods to execute commands.
67c771e91a9f65359e28a15940a7500f
This Metasploit module allows remote command execution on the PHP IRC bot Ra1NX by using the public call feature in private message to covertly bypass the authentication system.
4e926047266653b04e377ab7fa565454
Archin WordPress theme version 3.2 suffers from an unauthenticated configuration access vulnerability.
dda7a46e8d46019bada27cf8be3eeb72
This Metasploit module allows remote command execution on the PHP IRC bot pbot by abusing the usage of eval() in the implementation of the .php command. In order to work, the data to connect to the IRC server and channel where find pbot must be provided. The module has been successfully tested on the version of pbot analyzed by Jay Turla, and published on Infosec Institute, running over Ubuntu 10.04 and Windows XP SP3.
b4302c2d8b8f5eacb2c614d506570e68
This perl script attacks pBot by leveraging a hidden .eval command to delete and kill the bot.
c1cdb50ab422a8f2053d5be0a1f8b058
This paper describes an attack of the iterated use of hashing functions used as key stretching algorithms where the state of a hash can be transferred to the next hash function.
474d91d129e29f695036dc70ede0344a
This cracker was created to brute force master passwords for the Password Safe tool at http://passwordsafe.sourceforge.net/.
08dbe5a2e29c718634ef92fff27b3af9
Multiple Site5 WordPress themes suffer from an email spoofing vulnerability.
8ee788e01e90d38fc925f3f852e0a77c
Ballast Security felt the need to write this paper as almost countless services that we trust with our passwords are handling them irresponsibly. This is a good read for anyone who needs to store password hashes.
6df883bde172ed66055c7172fa4ff6ba
This whitepaper discusses the insecurity of poorly designed remote file inclusion payloads. This is part two.
db334ed835af32fbdea7852b6b5cba1e
This whitepaper discusses the insecurity of poorly designed remote file inclusion payloads. This is part one.
47573a79c58e0172417ac4842b970cb0