what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 54 RSS Feed

Files Date: 2008-04-21 to 2008-04-22

xoopsrecipe-sql.txt
Posted Apr 21, 2008
Authored by S@BUN | Site hackturkiye.com

The XOOPS Recipe module version 2.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 197b2804308d8e205922298f88970c52f176b671c457649161e780bd0d2e8857
phpfusion-sql.py.txt
Posted Apr 21, 2008
Authored by The:Paradox | Site inj3ct-it.org

PHP-Fusion version 6.00.307 remote blind SQL injection exploit that makes use of submit.php.

tags | exploit, remote, php, sql injection
SHA-256 | 6134178aeb7b56660fa59a9fcbec796d8152026eafa4b0fac5f93fb4731b5cdc
amg-sql.txt
Posted Apr 21, 2008
Authored by Player

AllMyGuests versions 0.4.1 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7f33072849bd400424508e6b772b460dc26f9811383d88b31a978eb4d6a2e999
gwh-csrf.txt
Posted Apr 21, 2008
Authored by Alexander Konovalenko

It appears that Google Web History is susceptible to an attack along the lines of cross site request forgery.

tags | advisory, web, csrf
SHA-256 | 3e67c37c3a52b3e819ec8ff21beb4bbc682276f0a0c6164aa7e742f06f4a31df
SUSE-SA-2008-023.txt
Posted Apr 21, 2008
Site suse.com

SUSE Security Announcement - A large amount of vulnerabilities related to OpenOffice have been patched on SuSE.

tags | advisory, vulnerability
systems | linux, suse
advisories | CVE-2008-0320, CVE-2007-5747, CVE-2007-5746, CVE-2007-5745, CVE-2007-4771, CVE-2007-4770
SHA-256 | 844f9feac6e7fecf046f967e47d04ca672e92a3da3619753c28a416cc530a21c
motsurf-csrf.txt
Posted Apr 21, 2008
Authored by Michael Brooks

The Motorola Surfboard cable modem suffers from cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
SHA-256 | b98c308fb47b4f3a9bf954a422d5ba85c189c273d9b9eac792e5a7f6e88acea2
simplecustomer-sql.txt
Posted Apr 21, 2008
Authored by t0pp8uzz

Simple Customer version 1.2 suffers from a SQL injection vulnerability in contact.php.

tags | exploit, php, sql injection
SHA-256 | 576c21f88e3a069e914133bf420c9c3e8596d5b403842d43ab836f9cabe8df84
phshoutbox-cookie.txt
Posted Apr 21, 2008
Authored by t0pp8uzz

PhShoutBox versions 1.5 and below suffer from an insecure handling of cookies vulnerability.

tags | exploit
SHA-256 | 54418c43af425a34ca60fca59cd326647c6b2eddc14661e8616ef2cd43c57278
openinvoice-passwd.txt
Posted Apr 21, 2008
Authored by t0pp8uzz

OpenInvoice version 0.9 arbitrary change user password exploit.

tags | exploit, arbitrary
SHA-256 | 3d2533ea10938129e8713db59be46d317b9733024bcf480f854c9fadea6e7a09
2532gigs-download.txt
Posted Apr 21, 2008
Authored by t0pp8uzz

2532|Gigs versions 1.2.2 and below suffer from an arbitrary database download vulnerability.

tags | exploit, arbitrary
SHA-256 | 9ee5ebba483b75345b0e35fb9111178d9cdf2f4addfe6686ccb1a0dc748e19e2
subedit-poc.txt
Posted Apr 21, 2008
Authored by grzdyl

Python code that creates a file that is able to trigger a buffer overflow vulnerability in SubEdit Player build 4066.

tags | exploit, overflow, python
SHA-256 | 70130ae0fb590abfb628ee4677f5f956bf3be5b9fc0461b15dbbebbd2b4e6079
D2T1_-_Daniel_Ingevaldson_-_Virtualization_!=_Security_.zip
Posted Apr 21, 2008
Authored by Daniel S. Ingevaldson | Site conference.hitb.org

Virtualization != Security - Virtualization has emerged as the most disruptive datacenter technology of the last decade. Mr. Ingevaldson from IBM Internet Security Systems will discuss the emergence of virtualization as well as the many ways that it changes traditional security architecture as well as the ways it does not. Virtualization will influence the security business much like it is reshaping IT. Mr. Ingevaldson will review the brief history of security in virtualization as well as comment on the next-generation security technologies for the virtualized datacenter.

SHA-256 | 8d383025969032a36e2bacadfeef635abcd689a53e6eb810a3d394a5f1eb85cb
D1T2_-_Marc_Weber_Tobias_-_How_We_Cracked_Their_Codes_-_A_Case_Study_in__Compromising_the_Most_Popular_High_Security_Lock_in_America.zip
Posted Apr 21, 2008
Authored by Marc Weber Tobias | Site conference.hitb.org

How We Cracked Their Codes - A Case Study in Compromising the Most Popular High Security Lock in America.

SHA-256 | b8b5de86321c9109e1ebf43a06b3ac64aa1305152ab68be0c84a7022f61eb241
D1T1_-_Jim_Geovedi_-_Hijacking_VSAT_Connections.zip
Posted Apr 21, 2008
Authored by Jim Geovedi | Site conference.hitb.org

Presentation discussing the hijacking of VSAT connections.

SHA-256 | 6dfeb2819f6eea9512236553e50c0bf610cc640a2964f073804f8b09f78b57b8
D2T1_-_Adrian_Pastor_-_Cracking_Into_Embeded_Devices_and_Beyond.zip
Posted Apr 21, 2008
Authored by PAgVac | Site conference.hitb.org

Cracking into Embedded Devices and Beyond - The presentation covers cracking into embedded devices by exploiting vulnerabilities present on default software running on the target device.

tags | vulnerability
SHA-256 | b17e69cf657c3562c5c8244483120184a84061a080f2c346f2373b88d8170d3e
D1T2_-_Skyper_-_Cracking_the_GSM_A5-1_Encryption_in_Seconds.zip
Posted Apr 21, 2008
Authored by Skyper | Site conference.hitb.org

Cracking the GSM A5/1 Encryption in Seconds - Presentation explaining the security, technology and protocols of a GSM network. Further discusses building a GSM scanner for 900 USD. The second part of the talk reveals a practical solution to crack the GSM encryption A5/1.

tags | protocol
SHA-256 | fb2ff4fbbd8c3a9085eba1671fef94bd320cb3f478b3c80f491d30ff8ed76c9c
D1T2_-_Alessio_Penasilico_-_VoIP_INsecurities_-_Italians_Do_It_Better.zip
Posted Apr 21, 2008
Authored by Alessio L.R. Pennasilico | Site conference.hitb.org

VoIP (in)Security: Italians Do It Better - This presentation will explain in detail how a small group of annoyed Italian VoIP hackers used the Chaos Computer Club phone network during the 2007 Hacker camp for fun and profit.

SHA-256 | 518efe57180ba0d7c5e64792e43454b24d3d1634ef0768699047b17df11fd79b
D1T1_-_Michael_Thumann_-_Hacking_Second_Life.zip
Posted Apr 21, 2008
Authored by Michael Thumann | Site conference.hitb.org

Hacking Second Life - A presentation that covers the basic architecture of SecondLife and points out the possible attack vectors against SecondLife itself, but will also demonstrate hacks from the inside of SecondLife against real-life systems in the internet.

SHA-256 | fd3518c421efc61d62c97afa9fafe5bb277b1577ffc98e5668bc5b92b66370d2
D1T1_-_Ero_Carrera_-_Malware_Behavior_Tools_Scripting_and_Adavanced_Analysis.zip
Posted Apr 21, 2008
Authored by Ero Carrera | Site conference.hitb.org

Malware: Behavior, Tools, Scripting and Advanced Analysis - Presentation discussing a new tool taht is an extension to Bochs, a popular open-source CPU emulator. This extension will provide with advanced debugging and scripting functionality enabling the easy creation of a wide range of tools. The scripting interface of this tool provides a full Python environment to control the whole CPU, memory, devices, etc. Among the examples that will be presented, time allowing, will be generic unpacking techniques, monitoring of malware behavior or low-level system access to kernel/administrative objects. The tool was created to assist the process of automated malware analysis but its flexibility make it a good candidate to also assist in vulnerability discovery.

tags | kernel, python
SHA-256 | f9882e5282c5f3eaead310c40b32cb0f3c225d921e4c88aafa3ba6fca595e3dd
D1T1_-_Shreeraj_Shah_-_Securing_Next_Generation_Applications_-_Scan_Detect_and_Mitigate.zip
Posted Apr 21, 2008
Authored by Shreeraj Shah | Site conference.hitb.org

Securing Next Generation Applications - Scan, Detect, and Mitigate.

SHA-256 | d19c2013f9c13ff698a8b10c146857e5fd1996461317ffb2e89134213d493121
DAY_2_-_KEYNOTE_-_Jeremiah_Grossman.zip
Posted Apr 21, 2008
Authored by Jeremiah Grossman | Site conference.hitb.org

Hacks Happen - Conservative estimates put the total annual IT security spending in the US at $50 billion and e-crime losses at $100 billion. We are losing two dollars for every dollar spent. Those numbers are said to be worse on a global scale. Newly passed laws, industry regulation, and press coverage have certainly raised the profile of the problem, but where have these actions really gotten us?

SHA-256 | 732c1f50ff097c1e696ca7bc02cfc76b46a8058c253e98d918cd850d46a2557c
D2T2_-_Rodrigo_Rubira_Branco_-_Hacking_The_Cell_Architecture.zip
Posted Apr 21, 2008
Authored by Rodrigo Rubira Branco | Site conference.hitb.org

Hacking The Cell Architecture - This presentation intends to cover security aspects related to a new architecture, widely deployed and used called Cell. The architecture itself will be deeply explained, focusing on the security concerns that appear in this kind of asymmetric multi-core systems. While Cell architecture is used in the new playstation 3 it is also used in big blade machines.

SHA-256 | 6652d0e5155144577fa230a1ebfc66f7778e0db6b263a9c2ec8f132977fb67e3
D2T2_-_Raoul_Chiesa_and_Alessio_Pennasillico_-_Penetration_Testing_SCADA.zip
Posted Apr 21, 2008
Authored by Raoul Chiesa, Alessio Pennasillico | Site conference.hitb.org

Penetration Testing SCADA and National Critical Infrastructure - Real-Life Experiences and Case Studies.

SHA-256 | f21a1ea9e81567a87aac33d06cdf7676173295bfa37f9ad68da8d0795dbbd4d0
D2T2_-_Domingo_Montanaro_-_In-depth_Anti-Forensics_-_Challenges_of_Steganography_and_Discovering_Hidden_Data.zip
Posted Apr 21, 2008
Authored by Domingo Montanaro | Site conference.hitb.org

In-depth Anti-Forensics - Challenges of Steganography and Discovering Hidden Data.

SHA-256 | ce75ad6f552cae5156d9a3755ba145b80dbe81052871c602631d458c9ab13895
D2T2_-_Alexander_Kornbrust_-_Practical_Oracle_Forensics.zip
Posted Apr 21, 2008
Authored by Alexander Kornbrust | Site conference.hitb.org

Practical Oracle Forensics - Oracle forensics is a new discipline without special tools/scripts. Most presentations about Oracle forensics are still very basic. The typical approach in these presentations is to show what tools/(log)files are available to do forensics. In the real world with huge databases (many GB, sometimes TB) it is normally not helpful. This presentation is using a different approach. Based on the different type of attackers (leaving employee, nosy DBA/employee, external hacker etc.) we have different traces in Oracle and we show in different scenarios how to find evidence. We provide a free toolset to do a (basic) forensic analysis without having deep Oracle knowledge.

SHA-256 | 20612b361c886e97ff98ce3ea92f2c60e6d189c077a2b13341e46c3521bd8f78
Page 2 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close