exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files from Dan Farmer

First Active1999-08-17
Last Active2024-09-01
Supermicro Onboard IPMI Port 49152 Sensitive File Exposure
Posted Sep 1, 2024
Authored by H D Moore, Dan Farmer, John Matherly, Zach Wikholm | Site metasploit.com

This Metasploit module abuses a file exposure vulnerability accessible through the web interface on port 49152 of Supermicro Onboard IPMI controllers. The vulnerability allows an attacker to obtain detailed device information and download data files containing the clear-text usernames and passwords for the controller. In May of 2014, at least 30,000 unique IPs were exposed to the internet with this vulnerability.

tags | exploit, web
SHA-256 | 1ca6be3bd1442f15e9c436c21eb3f55a0d2466eb4cc5defa624000e1a17d568b
IPMI 2.0 RAKP Remote SHA1 Password Hash Retrieval
Posted Sep 1, 2024
Authored by H D Moore, Dan Farmer | Site metasploit.com

This Metasploit module identifies IPMI 2.0-compatible systems and attempts to retrieve the HMAC-SHA1 password hashes of default usernames. The hashes can be stored in a file using the OUTPUT_FILE option and then cracked using hmac_sha1_crack.rb in the tools subdirectory as well hashcat (cpu) 0.46 or newer using type 7300.

tags | exploit
advisories | CVE-2013-4786
SHA-256 | 8500cf1712e679811989409a7d9e020413fe28dd6b3f573d4069a4bbbf87d3d6
IPMI 2.0 Cipher Zero Authentication Bypass Scanner
Posted Sep 1, 2024
Authored by H D Moore, Dan Farmer | Site metasploit.com

This Metasploit module identifies IPMI 2.0-compatible systems that are vulnerable to an authentication bypass vulnerability through the use of cipher zero.

tags | exploit, bypass
advisories | CVE-2013-4782
SHA-256 | 26e9ad81107fc09e95e82be07f34c04f0ca67ba5b75765817108fcc2774346df
tct-1.15.tar.gz
Posted Nov 19, 2004
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, Solaris, and SunOS. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

Changes: Big bug fixes, and really cool new features. Everyone needs to download and use this, right now. Do not delay.
tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | 4c8e343453332bd1fdf0627f9b888e2a4f597e70b367f124cc7f2562558213a1
tct-1.09.tar.gz
Posted Dec 18, 2001
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, Solaris, and SunOS. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

Changes: Added large file support for linux. Fixed a bad off by one bug in unrm. New grave-robber -I option for better control of icat/pcat. Fixed lots of bugs. Updated documentation.
tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | 40c43f9dd527192a2d17123c639020ca7431eb4a2af3dc31432c14373fcc0856
tct-1.05.tar.gz
Posted Jan 26, 2001
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, Solaris, and SunOS. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

Changes: Fixes for the grave robber, added more switches, SunOS support added, and lots more misc fixes!
tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | e4438d2f382400b4536a7defbae70fd2a6c1e333051c013b1c5bebb0630a46cd
tct-1.0.tar.gz
Posted Aug 1, 2000
Authored by Dan Farmer, Wietse Venema | Site porcupine.org

TCT is a collection of tools which are geared towards gathering and analyzing forensic data UNIX system after a break-in. TCT features the grave-robber tool which captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the keyfind tool that recovers cryptographic keys from a running process or from files. TCT is tested on Linux, BSD, and Solaris. For more information see the handouts from Dan Farmer and Wietse Venema's computer forensics analysis class.

tags | tool
systems | linux, unix, solaris, bsd
SHA-256 | fce955a06d118664ebcbb0d9360ef897a8c0150f57b63742153a2faa4d4d662b
cops_dan_farmer.txt
Posted Aug 17, 1999
Authored by Dan Farmer

Cops and Robbers.

systems | unix
SHA-256 | caf47149c569124818a58fd9ed0e26c78ca1419aa2e179bf6d545d84ed239215
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close