This Metasploit module creates and enables a custom UDF (user defined function) on the target host via the SELECT ... into DUMPFILE method of binary injection. On default Microsoft Windows installations of MySQL versions 5.5.9 and below, directory write permissions not enforced, and the MySQL service runs as LocalSystem. NOTE: This Metasploit module will leave a payload executable on the target system when the attack is finished, as well as the UDF DLL, and will define or redefine sys_eval() and sys_exec() functions.
e271ecc64a4930d48b45420b13646e62bddc742c830913aff948fcd6de464829
This Metasploit module takes advantage of a Same-Origin Policy (SOP) bypass vulnerability in the Samsung Internet Browser, a popular mobile browser shipping with Samsung Android devices. By default, it initiates a redirect to a child tab, and rewrites the innerHTML to gather credentials via a fake pop-up.
453452b6c39fc4137d17372c00e57358247a6b6b2880964c69ec6f1e59572af4
This Metasploit module exploits the fact that Ceragon ships a public/private key pair on FibeAir IP-10 devices that allows passwordless authentication to any other IP-10 device. Since the key is easily retrievable, an attacker can use it to gain unauthorized remote access as the "mateidu" user.
3ffda87a127eecead37db406771d24d73a3f8fb62c5608cc9113f96992bf3bc3
Ceragon FibeAir IP-10 suffers from an SSH private key exposure vulnerability.
768dfecfdbbc1cece9dc248bd3f46e0b6f857da272a00ca6029519bf8127e833
The InfoSec Southwest 2015 Call For Papers has been announced. The conference will be held April 11th through April 12th, 2015 in Austin, Texas.
5f14ffe6e76678c0e63364b8dddcbf079f37ac0b1175373472a9f801fa2f74c6
The InfoSec Southwest 2014 Call For Papers has been announced. The conference will be held April 4th through April 6th, 2014 in Austin, Texas.
339a930fc5b597160bf708c5dda8c237525d45a61ee405ab1c0dbb30e4ec22a5
The InfoSec Southwest 2013 Call For Papers has been announced. The conference will be held April 19th through April 21st, 2013 in Austin, Texas.
51ec6c86768fa02faf2fab8106b35205cc39eec539f4ba9056a46a2481c3fcc3
Remote OS fingerprinting tool written in Perl that analyzes the retransmission timeout lengths of a TCP handshake to detect remote operating systems.
dc7fea5649186770394de79bc8fc28fa6fed9514e07f2a48476faa5d4e2dd950