what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 296 RSS Feed

Registry Files

Microsoft Windows NtLoadKeyEx User Hive Attachment Point Privilege Elevation
Posted Sep 23, 2016
Authored by Google Security Research, forshaw

The NtLoadKeyEx system call allows an unprivileged user to load registry hives outside of the \Registry\A hidden attachment point which can be used to elevate privileges.

tags | exploit, registry
advisories | CVE-2016-3371
SHA-256 | 8d30ef721f9061806e06019063b62bba9b734dca044a593c1486cd66752e5a4c
PoShFoTo - PowerShell Forensics Toolkit
Posted May 30, 2016
Authored by Mark Osborne

PoShFoTo is the PowerShell Forensics Toolkit, which contains a dozen PowerShell tools that allow you to do basic incident response and malware forensics. It includes Hex Dumper, Registry timeline generator, File timeline generator, and PE-block analyzer.

tags | tool, registry, forensics
SHA-256 | 2516e4a082ce0e53db6d6ba8ddfba777505de06d31bfefcccdabcff2c0057a2b
iOS / OS X Iokit Registry Iterator Double Free
Posted Jan 27, 2016
Authored by Google Security Research, Ian Beer

iOS / OS X suffer from a kernel double free due to lack of locking in Iokit registry iterator manipulation.

tags | exploit, kernel, registry
systems | cisco, linux, apple, osx, ios
advisories | CVE-2015-7084
SHA-256 | 8165a567612f28c0b556478f27c6f67dcb0caeb69b674c8e9e622681a9e157de
Avira Registry Cleaner DLL Hijacking
Posted Dec 18, 2015
Authored by Stefan Kanthak

Avira Registry Cleaner suffers from a local DLL hijacking vulnerability.

tags | exploit, local, registry
systems | windows
SHA-256 | 25dbcc7db394b17559de2ca3d0756be3cb74f12b5d2bde975cdaeb1e15c10f9d
Kaspersky Endpoint Security For Windows 8.1.0.1042 / 10.2.1.23 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that the admin password for protecting different functions of the Kaspersky Endpoint Security software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry
systems | windows
SHA-256 | 8a7c74b5cbb75ec15cb0f9a3938c69c29a10c97069f7ba7e4871500310fbc21c
Kaspersky Anti-Virus 15.0.1.415 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that the administrator password for protecting different functions of the Kaspersky Anti-Virus software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry, virus
systems | windows
SHA-256 | ea3ba68c2445280d74bd945ec27706a66dc51e94a333bf175519fd2093dc8a5e
Kaspersky Internet Security 15.0.2.361 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that the administrator password for protecting different functions of the Kaspersky Internet Security software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry
systems | windows
SHA-256 | 1de91bfb49d3f0e7cd83b46395378df631ea2882433f6e879dd0b109e920970e
Kaspersky Total Security 15.0.1.415 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that the administrator password for protecting different functions of the Kaspersky Total Security software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry
systems | windows
SHA-256 | bb0133dfea19da32e1adc63779e910d52d60547b085a50a1b291be2d89764758
Kaspersky Small Office Security 13.0.4.233 Unsalted Hash
Posted Oct 1, 2015
Authored by Matthias Deeg, Sven Freund | Site syss.de

The SySS GmbH found out that the administrator password for protecting different functions of the Kaspersky Small Office Security software, like managing backups or stopping protection services, is stored as raw, unsalted MD5 hash value in the Windows registry.

tags | exploit, registry
systems | windows
SHA-256 | f9313aec301a7c3586f846924c4e87db8f5ea73a5ca80b220b990f5e9dca66c1
Windows Registry Only Persistence
Posted Sep 4, 2015
Authored by Donny Maasland | Site metasploit.com

This Metasploit module will install a payload that is executed during boot. It will be executed either at user logon or system startup via the registry value in "CurrentVersion\Run" (depending on privilege and selected method). The payload will be installed completely in registry.

tags | exploit, registry
SHA-256 | 41b0703a3928a8e079eb9c171583927b24819f1a2a9c5312653c3ebbad79ef30
Red Hat Security Advisory 2015-1378-01
Posted Jul 22, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-1378-01 - Hivex is a library that can read and write Hive files, undocumented binary files that Windows uses to store the Windows Registry on disk. It was found that hivex attempted to read, and possibly write, beyond its allocated buffer when reading a hive file with a very small size or with a truncated or improperly formatted content. An attacker able to supply a specially crafted hive file to an application using the hivex library could possibly use this flaw to execute arbitrary code with the privileges of the user running that application.

tags | advisory, arbitrary, registry
systems | linux, redhat, windows
advisories | CVE-2014-9273
SHA-256 | 9552a6c10dede58389b8ba49d93ef7d423a3f82b55153cec2c5d658997e970c4
Red Hat Security Advisory 2015-0776-01
Posted Apr 2, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0776-01 - Docker is a service providing container management on Linux. It was found that the fix for the CVE-2014-5277 issue was incomplete: the docker client could under certain circumstances erroneously fall back to HTTP when an HTTPS connection to a registry failed. This could allow a man-in-the-middle attacker to obtain authentication and image data from traffic sent from a client to the registry.

tags | advisory, web, registry
systems | linux, redhat
advisories | CVE-2015-1843
SHA-256 | b89975366ee6328c10cdb0972ba6d35579d720825039dd0de3a5990c71892d7a
Red Hat Security Advisory 2015-0301-02
Posted Mar 5, 2015
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2015-0301-02 - Hive files are undocumented binary files that Windows uses to store the Windows Registry on disk. Hivex is a library that can read and write to these files. It was found that hivex attempted to read beyond its allocated buffer when reading a hive file with a very small size or with a truncated or improperly formatted content. An attacker able to supply a specially crafted hive file to an application using the hivex library could possibly use this flaw to execute arbitrary code with the privileges of the user running that application.

tags | advisory, arbitrary, registry
systems | linux, redhat, windows
advisories | CVE-2014-9273
SHA-256 | d157985ac9e363a8bd82e75b100d91389201d883c15abd52ef4ed5c3ae2130ab
EMC Replication Manager / AppSync Path Enumeration
Posted Dec 31, 2014
Site emc.com

EMC Replication Manager and EMC AppSync may contain unquoted entries in the Windows registry service path that could potentially be exploited by an attacker to execute malicious programs. EMC Replication Manager versions prior to 5.5.2 and EMC AppSync versions prior to 2.1.0 are affected.

tags | advisory, registry
systems | windows
advisories | CVE-2014-4634
SHA-256 | 085263f786a21f962439f7e0b2485d5c2b8b4c228b270b346a074cd80a39f6bd
MS13-097 Registry Symlink IE Sandbox Escape
Posted Jun 27, 2014
Authored by juan vazquez, James Forshaw | Site metasploit.com

This Metasploit module exploits a vulnerability in Internet Explorer Sandbox which allows to escape the Enhanced Protected Mode and execute code with Medium Integrity. The vulnerability exists in the IESetProtectedModeRegKeyOnly function from the ieframe.dll component, which can be abused to force medium integrity IE to user influenced keys. By using registry symlinks it's possible force IE to add a policy entry in the registry and finally bypass Enhanced Protected Mode.

tags | exploit, registry
advisories | CVE-2013-5045
SHA-256 | c9f9dc448204fe8efbcb3d05352d9e8dff208d0ff120536098d4e6f8b8305895
CyberLink Power2Go Essential 9.0.1002.0 Overflow
Posted May 20, 2014
Authored by Mike Czumak

CyberLink Power2Go Essential version 9.0.1002.0 suffers from a registry SEH/unicode buffer overflow vulnerability.

tags | exploit, overflow, registry
SHA-256 | c4ad3ea0e0cf296b67878e6a6773f715ce52a1c11772efc0549219c883df125a
Red Hat Security Advisory 2013-1525-01
Posted Nov 18, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-1525-01 - The openstack-glance packages provide a service that acts as a registry for virtual machine images. A flaw was found in the Glance download_image policy enforcement for cached system images. When an image was previously cached by an authorized download, any authenticated user able to determine the image by its UUID could download that image, bypassing the download_image policy. Only setups making use of the download_image policy were affected.

tags | advisory, registry
systems | linux, redhat
advisories | CVE-2013-4428
SHA-256 | e0eb3f673d25b971dfa5e7bcb73d6d651ce3b1ffe95cdbb2b5cf1de8b7715300
Red Hat Security Advisory 2013-0707-01
Posted Apr 5, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0707-01 - These packages provide a service that acts as a registry for virtual machine images. An information leak flaw was found in the way Glance handled certain image requests. If caching were enabled, an authenticated user could use this flaw to obtain Glance's OpenStack Swift or Amazon Simple Storage Service credentials.

tags | advisory, registry
systems | linux, redhat
advisories | CVE-2013-1840
SHA-256 | 2b698bc3e63409f41d1caff8f398b1d32d1e55bb16d419834831e807857a9d21
Red Hat Security Advisory 2013-0209-01
Posted Jan 31, 2013
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2013-0209-01 - These packages provide a service that acts as a registry for virtual machine images. It was found that when the OpenStack Glance front-end communicated with an OpenStack Swift endpoint, the operator credentials could be logged in plain text when certain errors occurred during new image creation. An authenticated user could use this flaw to gain administrative access to an OpenStack Swift endpoint. This issue was discovered by Dan Prince of Red Hat.

tags | advisory, registry
systems | linux, redhat
advisories | CVE-2013-0212
SHA-256 | ba4d3ac81d1773f1bd03e0efea6e41920e0db7f02055379d11726b0c89f6dae9
Windows AlwaysInstallElevated MSI
Posted Nov 29, 2012
Authored by Parvez Anwar, Ben Campbell | Site metasploit.com

This Metasploit module checks the AlwaysInstallElevated registry keys which dictate if .MSI files should be installed with elevated privileges (NT AUTHORITY\SYSTEM). The default MSI file is data/exploits/exec_payload.msi with the WiX source file under external/source/exploits/exec_payload_msi/exec_payload.wxs. This MSI simply executes payload.exe within the same folder. The MSI may not execute successfully successive times, but may be able to get around this by regenerating the MSI. MSI can be rebuilt from the source using the WIX tool with the following commands: candle exec_payload.wxs light exec_payload.wixobj.

tags | exploit, registry
SHA-256 | c7e98f972baf436cdfffebb9e430a37c5fe6f420bfd185f513efaf7d19a631e2
Zoner Photo Studio 15 Build 3 Registry Value Parsing
Posted Nov 12, 2012
Authored by Julien Ahrens

Zoner Photo Studio version 15 build 3 (Zps.exe) registry value parsing local buffer overflow exploit.

tags | exploit, overflow, local, registry
SHA-256 | c53242a37889f34cff9f519a6c111241471f745688fa36be001c3be8eb171446
RadioGraPhy Forensic Tool
Posted Apr 16, 2012
Site security-projects.com

Radiography is a forensic tool which grabs as much information as possible from a Windows system. It checks registry keys related to start up processes, registry keys with Internet Explorer settings, host file contents, taskScheduler tasks, loaded system drivers, uses WinUnhide to catch hidden processes, and does much more.

tags | tool, registry, forensics
systems | windows
SHA-256 | be7394b4ce9a474ce4d3c0d3ddd25f7e3f4940ae86f346304bfb881bc6e41ad4
PHP Gift Registry 1.5.5 SQL Injection
Posted Feb 24, 2012
Authored by G13

PHP Gift Registry version 1.5.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, registry, sql injection
advisories | CVE-2012-2236
SHA-256 | 4ac4aa8616e0e3980f8f8d7134ddd0f3313c957f363637fe93a4bd2f1459d278
Red Hat Security Advisory 2011-1380-01
Posted Oct 19, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1380-01 - These packages provide the OpenJDK 6 Java Runtime Environment and the OpenJDK 6 Software Development Kit. A flaw was found in the Java RMI registry implementation. A remote RMI client could use this flaw to execute arbitrary code on the RMI server running the registry. A flaw was found in the Java RMI registry implementation. A remote RMI client could use this flaw to execute code on the RMI server with unrestricted privileges.

tags | advisory, java, remote, arbitrary, registry
systems | linux, redhat
advisories | CVE-2011-3389, CVE-2011-3521, CVE-2011-3544, CVE-2011-3547, CVE-2011-3548, CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3558, CVE-2011-3560
SHA-256 | 8221a223c89ce2ea73be4fe52f25f9521f2857546e752765f878046db40237e1
Registry Decoder Digital Forensics Tool
Posted Sep 8, 2011
Authored by Mohit Kumar | Site thehackernews.com

Digital forensics deals with the analysis of artifacts on all types of digital devices. One of the most prevalent analysis techniques performed is that of the registry hives contained in Microsoft Windows operating systems. Registry Decoder was developed with the purpose of providing a single tool for the acquisition, analysis, and reporting of registry contents.

tags | registry
systems | windows
SHA-256 | 0bf122d130ac2701097efb0279ea1770e47de47890bfe248c6efa066170e445e
Page 5 of 12
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close