GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. "Work" means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.
9acd2bae2cdc1e6c4e6aa4b3625a9dae5bfdbdf34f7c32ec92b31082395b9801
This Metasploit module exploits CVE-2019-1458, an arbitrary pointer dereference vulnerability within win32k which occurs due to an uninitialized variable, which allows user mode attackers to write a limited amount of controlled data to an attacker controlled address in kernel memory. By utilizing this vulnerability to execute controlled writes to kernel memory, an attacker can gain arbitrary code execution as the SYSTEM user. This module has been tested against Windows 7 x64 SP1. Offsets within the exploit code may need to be adjusted to work with other versions of Windows. The exploit can only be triggered once against the target and can cause the target machine to reboot when the session is terminated.
965825e462e62b73a8b4edd4aeb9b9d17c52ab810644e44a21ae2613d7a92025
Simple Grocery Store Sales and Inventory System 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
1022810defe26088fc1cd8ab914cc8e7fe834c4c51b41de36d12177c0d99e814
Zoo Management System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
495a629907ba170d12ae910e2d1db67531d42423f6acaf7e304d0c977c3ba9b1