what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed


The Powerful Resource Of PHP Stream Wrappers
Posted Nov 15, 2018
Authored by Netsparker

In this article, the author explores ways to bypass protection methods using the PHP Stream Wrappers, which are responsible for handling protocol related tasks like downloading data from a web or ftp server and exposing it in a way in that it can be handled with PHP's stream related functions.

tags | paper, web, php, protocol
MD5 | a947e8c1cb30f07e7cee7d234092661e

Related Files

Rikki Don't Lose That Bluetooth Device
Posted Jul 11, 2018
Authored by Matthias Deeg, Gerhard Klostermeier

In this article, the authors want to present an example of exploiting a trust relationship between two technical devices that can put the confidentiality of sensitive data or the integrity of a computer system at risk. This trust relationship they exploit exists between two Bluetooth devices: On the one side a computer system you want to remain secure and you don't want to be compromised, for example your laptop, or your smartphone, and on the other side a Bluetooth device you usually do not consider worth protecting with special diligence as it simply is an output device of a specific kind and does not persistently store any of your valuable data locally, for example headphones.

tags | paper
MD5 | ca29bc7edd73c43f926cb262ce678f74
Using dnscat2 For Encrypted Command/Control Over DNS
Posted Jan 15, 2018
Authored by James Fell

The process of setting up and using dnscat2 is documented in this article. The tool consists of a Ruby server and a small C client, and can be used to quickly establish an encrypted covert channel between two computers over the Internet using DNS traffic. Once set up, the tool is evaluated by exfiltrating data out of a network that has a pfSense firewall at the perimeter blocking direct outbound DNS requests from client machines, and also running the Snort IDS. It is is seen that a reverse shell is successfully sent out of the network and no IDS alerts are generated.

tags | paper, shell, ruby
MD5 | 546258ea9351502c0d3aaad5bf6cfb05
Microsoft WPAD Technology Weaknesses
Posted May 30, 2009
Authored by Alexander Anisimov | Site ptsecurity.com

WPAD (Web Proxy Auto Discovery) is a method used by web clients to automatically locate a browser configuration file used to connect through a proxy. Successful attacks on WPAD guarantees attackers full access on user data sent to the Internet which could allow theft of critical data like passwords or credit card numbers. WPAD potential danger depends on two factors: default configuration and weak awareness among users. In this article they discuss WPAD architecture and its many functioning principles in home and corporate networks, real examples of attacks and give recommendations for ordinary users and system administrators that allow reducing attack consequences.

tags | paper, web
MD5 | 8be9b35749a0834dbc991b16cdb24935
Posted Jan 11, 2006
Site ddanchev.blogspot.com

What are the driving forces behind the rise of malware? Who is behind it, and what tactics do they use? How are vendors responding, and what should organizations, researchers, and end users keep in mind for the upcoming future? These and many other questions will be discussed in this article, combining security experience, business logic, a little bit of psychology, market trends, and personal chats with knowledgeable folks from the industry.

tags | paper
MD5 | 3452a22642ccd435f41d3b4b964fec30
Posted Dec 30, 2004
Authored by Stefano Di Paola

PHP shmop shared memory module has a leak that can lead to Safe Mode bypass. PHP versions 5.0.2 and below and 4.3.9 and below are susceptible.

tags | advisory, php
MD5 | 99a70050f72c34784b76a9665223213f
Posted Dec 30, 2004
Authored by Daniel Fabian

PHP version 4.3.9 is vulnerable to meta character attacks. The bug could enable an attacker to read arbitrary files from the filesystem of a webserver that hosts PHP scripts. In addition PHP versions 4.3.6 until 4.3.9 as well as PHP versions 5.0.0 until 5.0.2 contain a bug that enables an attacker to manipulate the file name of uploaded files to perform directory traversal.

tags | advisory, arbitrary, php
MD5 | 74b268a99f4a6aaefbb8d9e621614730
Posted Dec 30, 2004
Authored by Gurjanov Ilia

phpBB versions 1.4.4 and below are susceptible to cross site scripting flaws.

tags | advisory, xss
MD5 | 3f0d001f50fdb2ed5a79123823f70239
Posted Dec 30, 2004
Authored by James Bercegay | Site gulftech.org

phpGroupWare version is susceptible to full path disclosure, cross site scripting, and SQL injection attacks. Exploitation provided.

tags | exploit, xss, sql injection
MD5 | 8889f85e8f28423e6ef44a2548455b0c
Posted Dec 30, 2004
Authored by Nicolas Gregoire | Site exaprobe.com

phpMyAdmin versions prior to 2.6.1-rc1 suffer from command execution and file disclosure vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2004-1147, CVE-2004-1148
MD5 | d276543b1c17e03eb47b583955c9ef8f
Posted Dec 20, 2004
Authored by slythers

phpBB 2.x with PHP here.

tags | exploit, php
MD5 | 56830aa54ca1057db8801240d287900e
Posted Dec 12, 2004
Authored by Matt Benenati

A flaw in phpBB 2.x allows a malicious user the ability to alter how posts are aligned due to mishandling of quotes in posts.

tags | exploit
MD5 | 631b10282d8639800a9bd49df6ef8292
Posted Dec 11, 2004
Authored by ruggine

Simple remote exploit for the SQL injection vulnerability discovered in PHPNews.

tags | exploit, remote, sql injection
MD5 | 3542945d30741fed34e9faa2fc32c92a
Posted Dec 11, 2004
Authored by Zeelock

phpBB versions below 2.0.11 suffer from addition SQL injection and directory traversal flaws.

tags | exploit, sql injection
MD5 | 3db6cdf08707e750aade88f2b48d5986
Posted Dec 11, 2004
Authored by Cyrille Barthelemy | Site cyrille-barthelemy.com

phpCMS versions 1.2.1 and below suffer from information disclosure and cross site scripting flaws.

tags | advisory, xss, info disclosure
MD5 | b97ca5a9092ccc5324912daad7467f92
Posted Dec 11, 2004
Authored by Gyan Chawdhary

Exploit that makes use of the PHP memory limit vulnerability discovered in July of 2004.

tags | exploit, php
advisories | CVE-2004-0594
MD5 | 7aadceaf9298a2f92f0e123e7baaf4af
Posted Dec 11, 2004
Authored by Stefan Lochbihler

PHP KIT versions 1.6.03 through 1.6.1 suffer from SQL injection and cross site scripting vulnerabilities. Demonstration exploitation included.

tags | exploit, php, vulnerability, xss, sql injection
MD5 | a6c57e9918b15f57703753c4b8f197dd
Posted Nov 20, 2004
Authored by Pokleyzz, How Dark | Site howdark.com

Remote command execution exploit for phpBB 2.0.10 that makes use of a flaw in the viewtopic.php code.

tags | exploit, remote, php
MD5 | f921925d25c8aefc535037fe9d34cefd
Posted Nov 20, 2004
Authored by Jerome Athias

Vulnerabilities that allow an attacker to inject malicious PHP code exist in the phpBB2 forum using the Cash_Mod module.

tags | advisory, php, vulnerability
MD5 | 0d061f49d0ad856b5b649edc26072364
Posted Nov 13, 2004
Authored by How Dark | Site howdark.com

PHPBB version 2.0.x - 2.0.10 is susceptible to a SQL injection attack.

tags | advisory, sql injection
MD5 | f013594cd91af3533eeaa247087560e9
Posted Nov 13, 2004
Authored by How Dark | Site howdark.com

PHP Bug Traq 0.9.1 is susceptible to SQL injection attacks.

tags | exploit, php, sql injection
MD5 | ac683be3267fd8d8a84233ffd5009310
Posted Nov 12, 2004
Authored by Maestro

phpWebSite 0.9.3-4 is susceptible to an HTTP response splitting vulnerability.

tags | exploit, web
MD5 | f84a1df64f88dc3f3e8f541a2fca2859
Posted Oct 28, 2004
Authored by FraMe | Site kernelpanik.org

PHP4 cURL functions bypass open_basedir protection allowing users to navigate through the filesystem.

tags | advisory
MD5 | 426f895856b6e38fa2c921ed2bfb7aaf
Posted Oct 13, 2004
Site security.lss.hr

Further research into PHP Links shows that it is susceptible to a PHP inclusion flaw along with some SQL injection attacks.

tags | exploit, php, sql injection
MD5 | 5fbdc1927eda766638c56d56304c4870
Posted Oct 1, 2004
Authored by Stefano Di Paola | Site wisec.it

PHP proof of concept exploit that makes use of an arbitrary file upload flaw in PHP versions below 4.3.9 and 5.0.2.

tags | exploit, arbitrary, php, proof of concept, file upload
MD5 | 82bbf54363bb3c8d4fb0c1e2add5924a
Posted Sep 17, 2004
Authored by Stefano Di Paola

PHP versions above 4.1.2 and below or equal to 5.0.1 suffer from an exposure of arbitrary memory due to bad array parsing in php_variables.c.

tags | advisory, arbitrary, php
MD5 | cbe8b992f622c696f3423793c80d3622
Page 1 of 4

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    1 Files
  • 20
    Sep 20th
    1 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    21 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By