exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 112 RSS Feed

Files from laurent gaffie

Email addresslaurent.gaffie at gmail.com
First Active2006-11-06
Last Active2017-02-02
Microsoft Windows 10 SMBv3 Tree Connect
Posted Feb 2, 2017
Authored by laurent gaffie

Microsoft Windows 10 SMBv3 tree connect proof of concept exploit.

tags | exploit, proof of concept
systems | windows
SHA-256 | 343da4ee047ee5f258a982c57d4135b6f38f56c8423e847bc62819ca100b5eaa
LSASS SMB NTLM Exchange Remote Memory Corruption
Posted Nov 14, 2016
Authored by laurent gaffie

A vulnerability in Windows Local Security Authority Subsystem Service (LSASS) was found on Windows OS versions ranging from Windows XP through to Windows 10. This vulnerability allows an attacker to remotely crash the LSASS.EXE process of an affected workstation with no user interaction. Successful remote exploitation of this issue will result in a reboot of the target machine. Local privilege escalation should also be considered likely. Microsoft acknowledged the vulnerability and has published an advisory (MS16-137) and a patch, resolving this issue.

tags | exploit, remote, local
systems | windows
advisories | CVE-2016-7237
SHA-256 | ede457e2a6d12a01273f1ee5e4c66f2c48cf2de28c09d56c3fd64944958fff14
Responder 2.1.3
Posted Nov 29, 2014
Authored by laurent gaffie | Site github.com

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

Changes: Several enhancements including analyze mode, inclusion of various rogue servers, and more.
tags | tool, web
systems | unix
SHA-256 | e556daa1f0a339ac90d98107c072ac75bc867a9e63f2f39b053bde5bf3acaa0b
Responder 2.0.8
Posted Jun 10, 2014
Authored by laurent gaffie | Site github.com

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.

Changes: Various additions and improvements.
tags | tool, web
systems | unix
SHA-256 | bd21c3071ebd2748be93ab69f92a2df8a758d1b418b5dfa81b16acb38bed7e83
PCredz 0.9
Posted Jun 9, 2014
Authored by laurent gaffie | Site github.com

This tool extracts credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface.

tags | tool, web, sniffer, imap
SHA-256 | 6a4ebb9233e9c4bc5f6625c3d1e68f90988774a7b8b02f8e394c0e6d53a1dded
Microsoft DHCP INFORM Configuration Overwrite
Posted May 30, 2014
Authored by laurent gaffie

A vulnerability in Windows DHCP was found on Windows OS versions ranging from Windows 2000 through to Windows server 2003. This vulnerability allows an attacker to remotely overwrite DNS, Gateway, IP Addresses, routing, WINS server, WPAD, and server configuration with no user interaction. Successful exploitation of this issue will result in a remote network configuration overwrite. Microsoft acknowledged the issue but has indicated no plans to publish a patch to resolve it.

tags | advisory, remote
systems | windows
SHA-256 | 68feec1acf88fdf52a32016c6e49e528f8ca6ec2c6263a77340e61f67e88e005
Microsoft SMB Server Zero Size Pool Allocation
Posted Aug 13, 2010
Authored by laurent gaffie | Site stratsec.net

A vulnerability in the Windows kernel can be triggered via SMB in Microsoft Windows versions ranging from Windows 2000 through to Windows 7. This vulnerability allows an attacker to trigger a kernel pool corruption by sending a specially crafted SMB_COM_TRANSACTION2 request. Successful exploitation of this issue may result in remote code execution with kernel privileges, while failed attempts will result in a denial of service condition.

tags | exploit, remote, denial of service, kernel, code execution
systems | windows
SHA-256 | f005868865614c597a3fad090b52b161a95821d28cae99a3a7a1521cce7eda00
MS10-054 Proof Of Concept
Posted Aug 12, 2010
Authored by laurent gaffie

Exploit for the Microsoft SMB Server Trans2 zero size pool alloc vulnerability as discussed in MS10-054.

tags | exploit
SHA-256 | 939654afe2288d6e948a7df3cc4ffbd715224ce006d2df8c3546ea053a424566
Netware SMB 1.0 Remote Stack Overflow
Posted Jun 18, 2010
Authored by laurent gaffie | Site stratsec.net

A vulnerability exists in the Netware CIFS.NLM driver which allows an attacker to trigger a kernel stack overflow by sending a specific 'Sessions Setup AndX' query. Successful exploitation of this issue will result in remote code execution with kernel privileges. Failed attempts may result in a remote denial of service. Netware SMB version 1.0 is vulnerable.

tags | exploit, remote, denial of service, overflow, kernel, code execution
SHA-256 | 86fccc6fafa7825b20615a1581e12b2c31b07679a3f3f3f334176b42bac87055
Samba Denial Of Service
Posted May 12, 2010
Authored by laurent gaffie | Site stratsec.net

Two vulnerabilities were discovered within in the Samba Smbd daemon which allow an attacker to trigger a null pointer dereference or an uninitialized variable read by sending a specific 'Sessions Setup AndX' query. Successful exploitation of these issues will result in a denial of service. Versions 3.4.7 and below and 3.5.1 and below are affected.

tags | exploit, denial of service, vulnerability
SHA-256 | 966a849f6f0bbe77647f785e18d732c6cf90fc1d9ef2d25203e0af89f41f2e05
Windows 7/2008R2 SMB Client Trans2 Stack Overflow
Posted Apr 19, 2010
Authored by laurent gaffie

Microsoft Windows 7/2008R2 SMB Client Trans2 stack overflow exploit that leverages the vulnerability discussed in MS10-020.

tags | exploit, overflow
systems | windows
SHA-256 | c3792c66700a76e600e4a641a3d11ba1c09fab08f19b94f78816408c90755b20
MS10-006 SMB Client-Side Bug Proof Of Concept
Posted Apr 17, 2010
Authored by laurent gaffie

MS10-006 SMB client-side bug proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 02653212f9c67f3771d0ec91567c4eb4fc34e537ee7ab9fc8b174bcb6189b5aa
Microsoft SMB Client Kernel Stack Overflow
Posted Apr 16, 2010
Authored by laurent gaffie, Renaud Feil | Site stratsec.net

A vulnerability exists in the SMB client of Microsoft Windows 7 and Windows Server 2008 R2. This vulnerability allows an attacker to trigger a kernel stack overflow by sending a specific "SMB_COM_TRANSACTION2" response. Attacking the SMB client can be achieved by convincing a user to connect to a malicious SMB server. Alternatively, the attacker could attempt man-in-the-middle attacks (such as ARP spoofing, NBNS packet spoofing, etc.) to redirect legitimate SMB connections to a malicious SMB server. Successful exploitation of this issue may result in remote code execution with kernel privileges.

tags | advisory, remote, overflow, kernel, spoof, code execution
systems | windows
advisories | CVE-2010-0270
SHA-256 | 4634330c6b9a740411368733ef3422e5a35456f847e190d753c1af27f8b65e09
Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference
Posted Feb 26, 2010
Authored by H D Moore, laurent gaffie, sf | Site metasploit.com

This Metasploit module exploits an out of bounds function table dereference in the SMB request validation code of the SRV2.SYS driver included with Windows Vista, Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2. Windows Vista without SP1 does not seem affected by this flaw.

tags | exploit
systems | windows
advisories | CVE-2009-3103
SHA-256 | de2b37c604aa41ff0e596df449f770135048223b2482bc370245289a93342173
Microsoft SMB Client Pool Overflow
Posted Feb 10, 2010
Authored by laurent gaffie, Renaud Feil | Site stratsec.net

A vulnerability exists in the Microsoft SMB client which allows an attacker to trigger a kernel pool memory corruption by sending a specific 'Negotiate Protocol' response.

tags | advisory, kernel, protocol
advisories | CVE-2010-0016, CVE-2010-0017
SHA-256 | dd4096a3adf7c94d29852abe073cbc999aa234b0784a145cc1d0c9ce5a2c7733
ICMPv4/IP Fuzzer Prototype
Posted Nov 23, 2009
Authored by laurent gaffie | Site g-laurent.blogspot.com

This is the ICMPv4/IP fuzzer prototype code.

tags | fuzzer
SHA-256 | 35272cf0bbd351d1c3768a01705b36f56401acf729c58cd4d80efa24fbe4308b
Windows 7 Remote Kernel Crash
Posted Nov 17, 2009
Authored by laurent gaffie

Proof of concept exploit that demonstrates a remote kernel crash vulnerability in Windows 7.

tags | exploit, remote, kernel, proof of concept
systems | windows
SHA-256 | 0c550ae47995e2697019b90be957f6aecb34773bd99b762df6389336df4d7c85
Snort 2.8.5 IPv6 Remote Denial Of Service
Posted Oct 23, 2009
Authored by laurent gaffie

Snort versions 2.8.5 and below suffer from an IPv6 related remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | fd81c9b1d14a60efa89b76dcfcfe0341d942a1d56a015464c5556527962cc83a
Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference
Posted Sep 29, 2009
Authored by laurent gaffie

This Metasploit module exploits an out of bounds function table dereference in the SMB request validation code of the SRV2.SYS driver included with Windows Vista, Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2. Windows Vista without SP1 does not seem affected by this flaw.

tags | exploit
systems | windows
advisories | CVE-2009-3103
SHA-256 | ea2b810d8a275178be0dfc2ccca862cb1f378b8ed6266f448f49b3fcfd6fdeb8
Microsoft Windows SMB Blue Screen Of Death
Posted Sep 10, 2009
Authored by laurent gaffie

Windows Vista/7 suffers from a denial of service vulnerability when passed a malformed SMB header for the NEGOTIATE PROTOCOL REQUEST. Proof of concept code included.

tags | exploit, denial of service, protocol, proof of concept
systems | windows
SHA-256 | 174af7761f8dbd62d9c3fd54dfd4021b7415ae5b556af67477ba21dc7862de4d
WordPress 2.8.3 Admin Reset Password
Posted Aug 11, 2009
Authored by laurent gaffie

WordPress versions 2.8.3 and below suffer from an arbitrary administrative password reset vulnerability.

tags | exploit, arbitrary, add administrator
SHA-256 | 2aebade190a8d67f8fd45987340b39948b70880e72d7a23065d3f58fea507c93
Soulseek 157 NS SEH Overwrite
Posted Jul 3, 2009
Authored by laurent gaffie

Soulseek versions 157 NS below 13e and all versions of 156 suffer from a remote peer search code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | f4dc93b0e17e9d360d0c68d40d4e75142ee147a08f18dd69e8e6d31951a951dc
Soulseek 157 NS Code Execution
Posted May 27, 2009
Authored by laurent gaffie

Soulseek versions 157 NS and 156 suffer from a remote distributed search code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | 0d11d3312310612caef722fa39eccf0bd1f7d3ea3dd0c509b80de2bbe1813d8f
VMware 2.5.1 Denial Of Service
Posted Jan 3, 2009
Authored by laurent gaffie

VMware versions 2.5.1 and below remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | a0c9a07060798d754c1b523f88241f1a438aff5e854d29b97a61acb5c09af178
Microsoft Windows Media Player .WAV Integer Overflow
Posted Dec 31, 2008
Authored by laurent gaffie

Microsoft Windows Media Player .WAV file remote integer overflow exploit.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 037f413b75594b96c7e16bd34a75b02b0cc4de146675b3f9a077e4a0dcce38a2
Page 1 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close