exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 254 RSS Feed

Files from H D Moore

Email addresshdm at metasploit.com
First Active1999-08-17
Last Active2024-09-01
Metasploit Framework 4.4
Posted Jul 17, 2012
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: 101 modules have been added. Meterpreter has been modernized. Various other improvements.
tags | tool, ruby
systems | unix
SHA-256 | ddcc7890a394d8154120a163c90b11119a0322b62d937ad1a3a14ef3fe6cf74e
RealVNC Authentication Bypass
Posted Aug 26, 2011
Authored by H D Moore, The Light Cosine | Site metasploit.com

This Metasploit module exploits an Authentication Bypass Vulnerability in RealVNC Server version 4.1.0 and 4.1.1. It sets up a proxy listener on LPORT and proxies to the target server The AUTOVNC option requires that vncviewer be installed on the attacking machine. This option should be disabled for Pro.

tags | exploit, bypass
advisories | CVE-2006-2369, OSVDB-25479
SHA-256 | e04dfdae1c144c55bf3ae60b0db55de39d6d8b5d1ffc4b3506d87fa3c3c8e7c6
Metasploit Framework 4.0.0
Posted Aug 2, 2011
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: Ships with 716 exploit modules, 361 auxiliary modules, and 68 post modules. 20 new exploits, 3 new auxiliary modules, and 14 new post modules have been added since the last release.
tags | tool, ruby
systems | unix
SHA-256 | 45c3c379ea82e46d8efef9cbbe0afa8ae8df98e50f2642afcea84a86c83c5a50
VSFTPD 2.3.4 Backdoor Command Execution
Posted Jul 4, 2011
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a malicious backdoor that was added to the VSFTPD download archive. This backdoor was present in the vsftpd-2.3.4.tar.gz archive sometime before July 3rd 2011.

tags | exploit
SHA-256 | f14b8ca68095714503ea3c35d79fdb14e91c1b1fd6b8214907ec5b6afd7dcf37
Accellion File Transfer Appliance MPIPE2 Command Execution
Posted Mar 14, 2011
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a chain of vulnerabilities in the Accellion File Transfer appliance. This appliance exposes a UDP service on port 8812 that acts as a gateway to the internal communication bus. This service uses Blowfish encryption for authentication, but the appliance ships with two easy to guess default authentication keys. This Metasploit module abuses the known default encryption keys to inject a message into the communication bus. In order to execute arbitrary commands on the remote appliance, a message is injected into the bus destined for the 'matchrep' service. This service exposes a function named 'insert_plugin_meta_info' which is vulnerable to an input validation flaw in a call to system(). This provides access to the 'soggycat' user account, which has sudo privileges to run the primary admin tool as root. These two flaws are fixed in update version FTA_8_0_562.

tags | exploit, remote, arbitrary, root, udp, vulnerability
SHA-256 | adc6990f1cf99e26413f21f398ece6121bbb6179c5ffc9a96eea0dee3107fd02
Metasploit Framework 3.6.0
Posted Mar 7, 2011
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: This release adds 15 new exploits for a total of 64 new modules since version 3.5.1. Includes Post Exploitation modules that provide local exploits and additional data gathering capabilities.
tags | tool, ruby
systems | unix
SHA-256 | a113cf9e1a499377807990e506acad83afee18845a148a02747087132fac39a7
Accellion File Transfer Appliance Multiple Vulnerabilities
Posted Feb 7, 2011
Authored by H D Moore, Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The Accellion File Transfer Appliance, prior to version FTA_8_0_562, suffers from a number of security flaws that can lead to a remote root compromise. These include issues like command injection, administrative tty check bypass, static passwords for privileged accounts, and more.

tags | exploit, remote, root
SHA-256 | 0a8e02333db7c5c6cf71307a3206cf3d0cad0322edd4b58872ca8c87a34994eb
Check Point Endpoint Security Server Information Disclosure
Posted Feb 7, 2011
Authored by H D Moore, Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The Check Point Endpoint Security Server and Integrity Server products inadvertently expose a number of private directories through the web interface. These directories include the SSL private keys, sensitive configuration files (often containing passwords), and application binaries.

tags | exploit, web
SHA-256 | 20ca3fdc39b73e2548b7489b74f418527c50c20cd49f5f2936862c36d8309547
Mitel Audio and Web Conferencing Command Injection
Posted Dec 23, 2010
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a command injection flaw within the Mitel Audio and Web Conferencing web interface.

tags | exploit, web
advisories | OSVDB-69934
SHA-256 | 97b5a763297d6d3f56801bb39882beb8c4ab7dea6f1f7ca50cbcc4df2cfd6580
Exim4 <= 4.69 string_format Function Heap Buffer Overflow
Posted Dec 11, 2010
Authored by H D Moore, jduck | Site metasploit.com

This Metasploit module exploits a heap buffer overflow within versions of Exim prior to version 4.69. By sending a specially crafted message, an attacker can corrupt the heap and execute arbitrary code with the privileges of the Exim daemon.

tags | exploit, overflow, arbitrary
advisories | CVE-2010-4344, CVE-2010-4345, OSVDB-69685
SHA-256 | 15971c9b06d4a9c47a89c4805a714e4e8f8fade760ff5ea9313cc6eeb5a8d923
Rapid7 Security Advisory 37
Posted Oct 15, 2010
Authored by H D Moore, Rapid7, Joshua D. Abraham, Will Vandevanter | Site rapid7.com

Rapid7 Security Advisory - The SAP BusinessObjects product contains a module (dswsbobje.war) which deploys Axis2 with an administrator account which is configured with a static password. As a result, anyone with access to the Axis2 port can gain full access to the machine via arbitrary remote code execution. This requires the attacker to upload a malicious web service and to restart the instance of Tomcat. This issue may apply to other products and vendors that embed the Axis2 component. The username is "admin" and the password is "axis2", this is also the default for standalone Axis2 installations.

tags | exploit, remote, web, arbitrary, code execution
advisories | CVE-2010-0219
SHA-256 | 226db62066f2c56c87818ee78e4d00164861cd9e8d34858c75dc772b294bbff8
Generic Web Application Unix Command Execution
Posted Oct 13, 2010
Authored by H D Moore | Site metasploit.com

This Metasploit module can be used to exploit any generic command execution vulnerability for CGI applications on Unix-like platforms. To use this module, specify the CMDURI path, replacing the command itself with XXcmdXX. This Metasploit module is currently limited to forms vulnerable through GET requests with query parameters.

tags | exploit, cgi
systems | unix
SHA-256 | 6c2b3fd36348c68b1b7315cd8846caabd0b02376ccf79d5cacc3caa7d16db23a
Microsoft IIS FTP Server NLST Response Overflow
Posted Oct 6, 2010
Authored by H D Moore, Kingcope | Site metasploit.com

This Metasploit module exploits a stack buffer overflow flaw in the Microsoft IIS FTP service. The flaw is triggered when a special NLST argument is passed while the session has changed into a long directory path. For this exploit to work, the FTP server must be configured to allow write access to the file system (either anonymously or in conjunction with a real account).

tags | exploit, overflow
advisories | CVE-2009-3023
SHA-256 | 03dd84b1fa133f23eef6c093613e5dc4647bab107afd312e34d65559564a1da3
Microsoft Print Spooler Service Impersonation Vulnerability
Posted Sep 21, 2010
Authored by H D Moore, jduck | Site metasploit.com

This Metasploit module exploits the RPC service impersonation vulnerability detailed in Microsoft Bulletin MS10-061. By making a specific DCE RPC request to the StartDocPrinter procedure, an attacker can impersonate the Printer Spooler service to create a file. The working directory at the time is %SystemRoot%\\\\system32. An attacker can specify any file name, including directory traversal or full paths. By sending WritePrinter requests, an attacker can fully control the content of the created file. In order to gain code execution, this module writes an EXE and then (ab)uses the impersonation vulnerability a second time to create a secondary RPC connection to the \\\\PIPE\\\\ATSVC named pipe. We then proceed to create a remote AT job using a blind NetrJobAdd RPC call.

tags | exploit, remote, code execution
advisories | CVE-2010-2729
SHA-256 | 04cbfe670279e81d3e5cc91c21f2c90426a352f556e914a6b712e856fe79bdf1
Rapid7 Security Advisory 36
Posted Aug 30, 2010
Authored by H D Moore, Rapid7, Will Vandevanter | Site rapid7.com

Rapid7 Security Advisory - FCKEditor contains a file renaming bug that allows remote code execution. Specifically, it is possible to upload ASP code via the ASP.NET connector in FCKEditor. The vulnerability requires that the remote server be running IIS. This vulnerability has been confirmed on FCKEditor 2.5.1 and 2.6.6.

tags | exploit, remote, code execution, asp
advisories | CVE-2009-4444
SHA-256 | d7ff7819bc5c1b9397d022f19065769fe00e58d1169b50c1ef3b83d03e7b2950
WebDAV Application DLL Hijacker
Posted Aug 24, 2010
Authored by H D Moore, jduck, jcran | Site metasploit.com

This Metasploit module presents a directory of file extensions that can lead to code execution when opened from the share. The default EXTENSIONS option must be configured to specify a vulnerable application type.

tags | exploit, code execution
SHA-256 | 005913ddf25b7acabbb0edd6681266dc995949db8aea2e77e72ddf197898b629
Microsoft Windows Shell LNK Code Execution
Posted Aug 5, 2010
Authored by H D Moore, jduck, B_H | Site metasploit.com

This Metasploit module exploits a vulnerability in the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This Metasploit module creates a WebDAV service that can be used to run an arbitrary payload when accessed as a UNC path.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2010-2568
SHA-256 | 9da276a24a186e88eecee809f9c847b33c7567cfb9d16ca26be2ac512e489408
Rapid7 Security Advisory 35
Posted Aug 3, 2010
Authored by H D Moore, Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The VxWorks authentication library suffers from a weak password hashing vulnerability.

tags | advisory
SHA-256 | 379e84021c2f004744e223233efe6130106bb86cc055a0b8c5acb03bbce54be9
Rapid7 Security Advisory 34
Posted Aug 3, 2010
Authored by H D Moore, Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The VxWorks WDB agent debug service suffers from multiple vulnerabilities.

tags | advisory, vulnerability
SHA-256 | fab6daf8569631c4a2596ae0cc4c47f64a1553291b74c6c1a6a4ee27c852fda4
Microsoft DNS RPC Service extractQuotedChar() Overflow (SMB)
Posted Jul 26, 2010
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the RPC interface of the Microsoft DNS service. The vulnerability is triggered when a long zone name parameter is supplied that contains escaped octal strings. This Metasploit module is capable of bypassing NX/DEP protection on Windows 2003 SP1/SP2. This Metasploit module exploits the RPC service using the \\\\DNSSERVER pipe available via SMB. This pipe requires a valid user account to access, so the SMBUSER and SMBPASS options must be specified.

tags | exploit, overflow
systems | windows
advisories | CVE-2007-1748
SHA-256 | e9b0527ebdd2cf04d5a8b77d31a915ef02a016adafac8d7e3310e2c2e5502c34
Microsoft DNS RPC Service extractQuotedChar() Overflow (TCP)
Posted Jul 26, 2010
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the RPC interface of the Microsoft DNS service. The vulnerability is triggered when a long zone name parameter is supplied that contains escaped octal strings. This Metasploit module is capable of bypassing NX/DEP protection on Windows 2003 SP1/SP2.

tags | exploit, overflow
systems | windows
advisories | CVE-2007-1748
SHA-256 | 9b7e6f209365505dfcd113a948db7bfb7bbb370bb024a1d2ca6fb2feabc1c1cf
Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow
Posted Jul 26, 2010
Authored by H D Moore | Site metasploit.com

This is an exploit for the chunked encoding buffer overflow described in MS03-051 and originally reported by Brett Moore. This particular modules works against versions of Windows 2000 between SP0 and SP3. Service Pack 4 fixes the issue.

tags | exploit, overflow
systems | windows
advisories | CVE-2003-0822
SHA-256 | db54b7c9894b5bd5fa70fd5fb0cfa3771711f595d035ff5f695b79fe36ab615c
Microsoft IIS ISAPI nsiislog.dll ISAPI POST Overflow
Posted Jul 26, 2010
Authored by H D Moore | Site metasploit.com

This exploits a buffer overflow found in the nsiislog.dll ISAPI filter that comes with Windows Media Server. This Metasploit module will also work against the 'patched' MS03-019 version. This vulnerability was addressed by MS03-022.

tags | exploit, overflow
systems | windows
advisories | CVE-2003-0349
SHA-256 | c72f76f8a8253daffa9c80e5fc0eabf4bd5c86b37e4f1d22740423ea314f5177
Microsoft Windows Shell LNK Code Execution
Posted Jul 21, 2010
Authored by H D Moore, jduck | Site metasploit.com

This Metasploit module exploits a vulnerability in the handling of Windows Shortcut files (.LNK) that contain an icon resource pointing to a malicious DLL. This Metasploit module creates a WebDAV service that can be used to run an arbitrary payload when accessed as a UNC path.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2010-2568
SHA-256 | 02b7a4d416053d7ead37976f6d7d16df09d4d947e59b569a8c904c94108c01af
Metasploit Framework 3.4.1
Posted Jul 13, 2010
Authored by H D Moore | Site metasploit.com

The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. Metasploit is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes components written in C and assembler.

Changes: This release has 16 new exploits, 22 new auxiliary modules and 11 new Meterpreter scripts for your pwning enjoyment.
tags | tool, ruby
systems | unix
SHA-256 | 91b37bb46a31498479681c1fc1b8d0762cdbe4f71c3e41d245de0bb57eb4f2f7
Page 3 of 11
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close