exploit the possibilities
Showing 1 - 24 of 24 RSS Feed

Files from Jay Turla

Email addressshipcodez at gmail.com
First Active2012-08-08
Last Active2016-08-22
Phoenix Exploit Kit Remote Code Execution
Posted Aug 22, 2016
Authored by Jay Turla, CrashBandicot | Site metasploit.com

This Metasploit module exploits a remote code execution in the web panel of Phoenix Exploit Kit via the geoip.php. The Phoenix Exploit Kit is a popular commercial crimeware tool that probes the browser of the visitor for the presence of outdated and insecure versions of browser plugins like Java, and Adobe Flash and Reader which then silently installs malware.

tags | exploit, java, remote, web, php, code execution
MD5 | 958fdcf003730f2db11a1ef103946c61
PCMAN FTP Server 2.0.7 Buffer Overflow
Posted Apr 4, 2016
Authored by Jay Turla, Chris Higgins | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in the PUT command of the PCMAN FTP server version 2.0.7. This requires authentication but by default anonymous credentials are enabled.

tags | exploit, overflow
advisories | OSVDB-94624
MD5 | 143f2f70be5c584f22620615e047909a
PHP Utility Belt Remote Code Execution
Posted Mar 11, 2016
Authored by Jay Turla, WICS | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in PHP Utility Belt, which is a set of tools for PHP developers and should not be installed in a production environment, since this application runs arbitrary PHP code as an intended functionality.

tags | exploit, remote, arbitrary, php, code execution
MD5 | d69780ace51d1d01c4f1ce68e30bc957
Legend Perl IRC Bot Remote Code Execution
Posted Dec 11, 2015
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits a remote command execution on the Legend Perl IRC Bot . This bot has been used as a payload in the Shellshock spam last October 2014. This particular bot has functionalities like NMAP scanning, TCP, HTTP, SQL, and UDP flooding, the ability to remove system logs, and ability to gain root, and VNC scanning. Kevin Stevens, a Senior Threat Researcher at Damballa has uploaded this script to VirusTotal with a md5 of 11a9f1589472efa719827079c3d13f76.

tags | exploit, remote, web, root, udp, perl, tcp
MD5 | 1d45434e3435a7b498a03833cf1d9027
Xdh / LinuxNet Perlbot / fBot IRC Bot Remote Code Execution
Posted Dec 11, 2015
Authored by Jay Turla, Matt Thayer, Conor Patrick | Site metasploit.com

This Metasploit module allows remote command execution on an IRC Bot developed by xdh. This perl bot was caught by Conor Patrick with his shellshock honeypot server and is categorized by Markus Zanke as an fBot (Fire & Forget - DDoS Bot). Matt Thayer also found this script which has a description of LinuxNet perlbot. The bot answers only based on the servername and nickname in the IRC message which is configured on the perl script thus you need to be an operator on the IRC network to spoof it and in order to exploit this bot or have at least the same ip to the config.

tags | exploit, remote, perl, spoof
MD5 | 76760e94b9460abe182c2c2992e2e8fb
phpFileManager 0.9.8 Remote Code Execution
Posted Dec 8, 2015
Authored by Jay Turla, hyp3rlinx | Site hyp3rlinx.altervista.org

This Metasploit module exploits a remote code execution vulnerability in phpFileManager 0.9.8 which is a filesystem management tool on a single file.

tags | exploit, remote, code execution
MD5 | fb8ce639c13abf9025e14404d222a6e0
BisonWare BisonFTP Server 3.5 Buffer Overflow
Posted Nov 25, 2015
Authored by localh0t, Jay Turla, veerendragg | Site metasploit.com

BisonWare BisonFTP Server version 3.5 is prone to an overflow condition. This Metasploit module exploits a buffer overflow vulnerability in said application.

tags | exploit, overflow
advisories | CVE-1999-1510
MD5 | 5d283dedb9d3ab0d09f44d249431f062
Th3 MMA mma.php Backdoor Arbitrary File Upload
Posted Oct 27, 2015
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits Th3 MMA mma.php Backdoor which allows an arbitrary file upload that leads to arbitrary code execution. This backdoor also echoes the Linux kernel version or operating system version because of the php_uname() function.

tags | exploit, arbitrary, kernel, php, code execution, file upload
systems | linux
MD5 | 26766b958880f49852cf7d50e27b5f16
Zemra Botnet CnC Web Panel Remote Code Execution
Posted Oct 2, 2015
Authored by Angel Injection, Jay Turla, Darren Martyn | Site metasploit.com

This Metasploit module exploits the CnC web panel of Zemra Botnet which contains a backdoor inside its leaked source code. Zemra is a crimeware bot that can be used to conduct DDoS attacks and is detected by Symantec as Backdoor.Zemra.

tags | exploit, web
MD5 | 2c059af704cb84792d8481c724a0935f
Simple Backdoor Shell Remote Code Execution
Posted Oct 2, 2015
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits unauthenticated simple web backdoor shells by leveraging the common backdoor shell's CMD parameter to execute commands. The SecLists project of Daniel Miessler and Jason Haddix has a lot of samples for these kind of backdoor shells which is categorized under Payloads.

tags | exploit, web, shell
MD5 | 8e8c3251abad650a5886af13f520367e
PCMan FTP Server 2.0.7 Directory Traversal
Posted Sep 29, 2015
Authored by Jay Turla

PCMan FTP Server version 2.0.7 suffers from a directory traversal vulnerability.

tags | exploit
MD5 | 83f0216fbc7de361db8ed444168409ee
BisonWare BisonFTP 3.5 Directory Traversal
Posted Sep 28, 2015
Authored by Jay Turla

BisonWare BisonFTP version 3.5 suffers from a directory traversal vulnerability.

tags | exploit
MD5 | eceff934180525af8de9af76168dbd0f
w3tw0rk / Pitbul IRC Bot Remote Code Execution
Posted Sep 23, 2015
Authored by Jay Turla | Site metasploit.com

This Metasploit module allows remote command execution on the w3tw0rk / Pitbul IRC Bot.

tags | exploit, remote
MD5 | a348890e184faa2b20c7c612229a3932
PCMan FTP Server 2.0.7 PUT Buffer Overflow
Posted Aug 4, 2015
Authored by Jay Turla

PCMan FTP Server version 2.0.7 PUT command buffer overflow exploit that spawns a bindshell on tcp/9988.

tags | exploit, overflow, tcp
MD5 | c56f73dc203b96a6de5c8107dc3986fb
RealTimes (Realplayer) 18.0.1.6 Privilege Escalation
Posted Jun 16, 2015
Authored by Jay Turla

RealTimes (Realplayer) versions 18.0.1.6 and below suffer from a desktop service trusted path privilege escalation vulnerability.

tags | exploit
MD5 | f4881db448f54a24da0e5fa73528d42c
DreamBox DM500s Cross Site Scripting
Posted Jun 9, 2015
Authored by Jay Turla

DreamBox DM500s suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | ab7af936cf9c85b2dd8ff70382086fe7
Legend Perl IRC Bot Remote Code Execution
Posted Apr 27, 2015
Authored by Jay Turla

Simple proof of concept tool to leverage remote code execution on the Legend perl IRC bot.

tags | exploit, remote, perl, code execution, proof of concept
MD5 | 3b15b371ee3f1b458ce633d12ca2c3cb
Pitbull / w3tw0rk Perl IRC Bot Remote Code Execution
Posted Apr 6, 2015
Authored by Jay Turla

Proof of concept exploit for the Pitbull and w3tw0rk IRC bots that takes over the owner of a bot which then allows for remote code execution.

tags | exploit, remote, code execution, proof of concept
MD5 | 63664fa95d7d516d4bc20773c093f40a
Backup File Finder For Recon-NG
Posted Oct 27, 2013
Authored by Jay Turla, LaNMaSteR53

Backup File Finder is a discovery module for Recon-NG that checks hosts for exposed backup files. The default configuration searches for wp-config.php files which contain WordPress database configuration information.

tags | tool, scanner, php
systems | unix
MD5 | 38b412de7d4e29fef50a8ee45262c104
Interesting File Finder For Recon-NG
Posted Oct 26, 2013
Authored by Jay Turla, LaNMaSteR53, thrapt

Interesting File Finder is a discovery module for Recon-NG framework which checks hosts for interesting files in predictable locations.

tags | tool, scanner
systems | unix
MD5 | 618c9122fc7801c20ea61c4bf2b5a058
Webwiz Rich Text Editor Finder For Recon-NG
Posted Oct 25, 2013
Authored by Jay Turla

This is a Webwiz Rich Text Editor file upload page discovery module for Recon-NG.

tags | tool, scanner, file upload
systems | unix
MD5 | dac49c1b4ac84359081f6f5eb899f26d
GenericRestaurantMenu For Recon-NG
Posted Oct 25, 2013
Authored by Jay Turla

GenericRestaurantMenu is a discovery module for Recon-NG that looks for Menu Categories Editor page vulnerabilities including SQL injection.

tags | tool, scanner, vulnerability, sql injection
systems | unix
MD5 | 31d50d8813678c17469124ff2bdda6ff
Dot Net Nuke File Upload Checker For Recon-NG
Posted Oct 25, 2013
Authored by Jay Turla

This is a vulnerability checking script for Recon-NG that looks for hosts with a Dot Net Nuke fcklinkgallery page that allows for a remote shell upload.

tags | tool, remote, shell, scanner
systems | unix
MD5 | d4084ebd6054089bb1d15220e98fc945
PHP IRC Bot pbot eval() Remote Code Execution
Posted Aug 8, 2012
Authored by Evilcry, juan vazquez, bwall, Jay Turla | Site metasploit.com

This Metasploit module allows remote command execution on the PHP IRC bot pbot by abusing the usage of eval() in the implementation of the .php command. In order to work, the data to connect to the IRC server and channel where find pbot must be provided. The module has been successfully tested on the version of pbot analyzed by Jay Turla, and published on Infosec Institute, running over Ubuntu 10.04 and Windows XP SP3.

tags | exploit, remote, php
systems | linux, windows, xp, ubuntu
MD5 | b4302c2d8b8f5eacb2c614d506570e68
Page 1 of 1
Back1Next

File Archive:

August 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    10 Files
  • 2
    Aug 2nd
    8 Files
  • 3
    Aug 3rd
    2 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    79 Files
  • 7
    Aug 7th
    16 Files
  • 8
    Aug 8th
    11 Files
  • 9
    Aug 9th
    10 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    6 Files
  • 12
    Aug 12th
    26 Files
  • 13
    Aug 13th
    15 Files
  • 14
    Aug 14th
    19 Files
  • 15
    Aug 15th
    52 Files
  • 16
    Aug 16th
    11 Files
  • 17
    Aug 17th
    1 Files
  • 18
    Aug 18th
    2 Files
  • 19
    Aug 19th
    18 Files
  • 20
    Aug 20th
    19 Files
  • 21
    Aug 21st
    17 Files
  • 22
    Aug 22nd
    9 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close