Email address | john at autosectools.com |
---|---|
Website | www.autosectools.com |
First Active | 2010-04-27 |
Last Active | 2012-04-17 |
This Metasploit module exploits a vulnerability found on V-CMS's inline image upload feature. The problem is due to the inline_image_upload.php file not checking the file type before saving it on the web server. This allows any malicious user to upload a script (such as PHP) without authentication, and then execute it with a GET request. The issue is fixed in 1.1 by checking the extension name. By default, 1.1 only allows jpg, jpeg, png, gif, bmp, but it is still possible to upload a PHP file as one of those extension names, which may still be leveraged in an attack.
5db10ec6f958334e9330d4c85475a69cd8b4c04de7b7b2ad6e87bd5f504d7f81
PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.
3c0e45c995b45ccd06e3e1921ce42b2dc006e7c50ef41f09e35465397971feca
PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.
9518133a3f1021b40158214497372d472d196b47de6a8109d45d82f46f801c50
PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.
ceb5c22d39fc6f90b7e680e8c9287c121c4d955d426bab53fde7a92a6c51c13f
A reflected cross site scripting vulnerability in V-CMS version 1.0 can be exploited to execute arbitrary JavaScript.
c6bd8d414c203e4d7061c79f3542c1b5b217553d5e43319d293458513d863d05
A SQL injection vulnerability in V-CMS version 1.0 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.
df2dee289d5c87f204cf0fee719b33c99baed4a25e2a6f9f88c897389068853f
An arbitrary upload vulnerability in V-CMS version 1.0 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.
9b9778fc86835a6bdf9f0531d06a9035e7c2a698cfe50ecd0e20362d22be8cd2
A directory traversal vulnerability in Herberlin Bremsserver version 3.0 can be exploited to read files outside of the web root.
950c47363f210cdb881bcfb068ccaf7f685f850f0d610b4a2d6acc3361bd64ca
Whitepaper called Process Hollowing. Process hollowing is yet another tool in the kit of those who seek to hide the presence of a process. The idea is rather straight forward: a bootstrap application creates a seemingly innocent process in a suspended state. The legitimate image is then unmapped and replaced with the image that is to be hidden. If the preferred image base of the new image does not match that of the old image, the new image must be rebased. Once the new image is loaded in memory the EAX register of the suspended thread is set to the entry point. The process is then resumed and the entry point of the new image is executed.
7f7a85ecfeef6b9feb94c08d5e3cb1f087e2f5240b64d76d49bde14d9a26bc7b
FuzzTalk is an XML driven fuzz testing framework that emphasizes easy extensibility and reusability. While most fuzzing frameworks require in depth programming knowledge, FuzzTalk can test a wide range of network protocols with the help of XML templates. Includes scripts for fuzzing HTTP, FTP, and SMTP servers.
6d7aeec133b9386bd209b8716b27fc1d4d48ef3178ef969a9eb75f2172ef6eed
Whitepaper call Anti-Debugging with Exceptions. Several techniques for detecting exception swallowing debuggers have been documented. The concept is simple: by design, debuggers handle certain kinds of exceptions. If such an exception is wrapped in a try block, the exception handle is only executed if a debugger is not attached. Hence it can be inferred that a debugger is attached whenever the exception block is not executed.
3dc0d938444d4ea8c28a360c244944d839f70154ae1c34e649472052b970a2ef
PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.
add28806781ecf08f8b6dd125cf3fe1ef7b0857f91e72062ae1768273680e1fe
Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions. However, most methods rely on suspicious API functions and leave several easy to identify artifacts. This paper explores different ways IAT hooking can be employed while circumventing common detection mechanisms.
7fc4f73e8ce5a00253ddb8deff3d09da7612ebbcf819c8a3ae17075fced2702e
167 bytes small all Windows null-free MessageBoxA shellcode. Tested on 2000, XP, XP x64, Vista, 7, 8 M3 x64.
437fa45db69d2822c191ab5303e89feba74d2a148268c980c7da10a151e0f896
112 bytes small all Windows null-free CreateProcessA calc.exe shellcode.
dfff5aba1ff807d6c0bb374cc445b05cbf2421d449374ee9d01434ca10a7a8e0
HTTP Bog is a slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses. Requires .NET 3.5. Written in C#.
21b49d0423d9dfda5e5ab125414ed0306b679f58a4bc84e2b5e2625ab7253788
This is a directory traversal scanner written in C# that audits HTTP servers and web applications. Complete source included.
c6e52c1e2da6ad919fd343f4344bc7ff0add71acb44fbfb524bfd4042c533bbc
A directory traversal vulnerability in Tele Data Contact Management Server can be exploited to read files outside of the web root.
1be46bf8d70514e8501795687aea6acf007a515827d9ff4a5421815fb6998163
A directory traversal vulnerability in Simple web-server version 1.2 can be exploited to read files outside of the web root.
63fb45045d2f2f3690e8e0ba41a9d136bae12b88aa1997f3d7d4b5b700bc1571
A reflected cross site scripting vulnerability in Nakid CMS version 1.0.2 can be exploited to execute arbitrary JavaScript.
62cd6ea41bb8a4bce46b604ae2797ae53ab6bc8cec88a777b99a3892b007766b
A local file inclusion vulnerability in Angora Guestbook version 1.5 can be exploited to include arbitrary files.
c2b1b1a09c426d65d7e299068e5008f7176f6ac92fba87dddddbb0421a2c7f8c
This is an HTTP console to remote administer Windows hosts with a browser-based, AJAX-enabled, command-line interface. Server requires .NET 3.5. Written in C# and JavaScript.
7dec994beced4f331b24fde32be7a2e3088ff3ecf40ecae45cd2ec54a69a686b
A SQL injection vulnerability in Clipbucket version 2.4 RC2 645 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.
6f0d10f78695697be08aaad71f69ebf5932985db42e1fc464f2a06ce15f1d538
A local file inclusion vulnerability in eGroupware version 1.8.001.20110421 can be exploited to include arbitrary files.
07ccc0d9a68de349319a1eceb37a6094b2810ad1e924bc4870669646a7b55753
An open redirect in eGroupware version 1.8.001.20110421 can be exploited to redirect users to an arbitrary URL.
b4a29e3964e1d7bd72995d10043cf6c74cf999a044fb3fe26884221a0473da93