Hack Tools/Exploits

Packetstorm Last 10 Files

  1. Bleed Out Heartbleed Command Line Tool 1.0.1.46 - Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.
  2. Apple Security Advisory 2014-04-22-3 - Apple Security Advisory 2014-04-22-3 - Apple TV 6.1.1 is now available and addresses vulnerabilities related to credential compromise, ASLR bypass, code execution, and more.
  3. Apple Security Advisory 2014-04-22-2 - Apple Security Advisory 2014-04-22-2 - iOS 7.1.1 is now available and addresses vulnerabilities in IOKit Kernel, CFNetwork HTTPProtocol, Secure Transport, and WebKit.
  4. Apple Security Advisory 2014-04-22-1 - Apple Security Advisory 2014-04-22-1 - Security Update 2014-002 is now available and addresses vulnerabilities in CFNetwork HTTPProtocol, CoreServicesUIAgent, FontParser, Heimdal Kerberos, ImageIO, Intel Graphics Driver, IOKit Kernel, the kernel, power management, Ruby, and more.
  5. iDevAffiliate 5.x SQL Injection - iDevAffiliate versions 5.x and below suffer from a remote SQL injection vulnerability.
  6. Symantec Messaging Gateway 10.5.1 Cross Site Scripting - Symantec Messaging Gateway version 10.5.1 suffers from a reflective cross site scripting vulnerability.
  7. HP Security Bulletin HPSBMU03018 - HP Security Bulletin HPSBMU03018 - A potential security vulnerability has been identified with HP Software Asset manager running OpenSSL. The Heartbleed vulnerability was detected in specific OpenSSL versions. OpenSSL is a 3rd party product that is embedded with some of HP Software products. This bulletin objective is to notify HP Software customers about products affected by the Heartbleed vulnerability. Note: The Heartbleed vulnerability (CVE-2014-0160) is a vulnerability found in the OpenSSL product cryptographic software library product. This weakness potentially allows disclosure of information protected, under normal conditions, by the SSL/TLS protocol. The impacted products appear in the list below are vulnerable due to embedding OpenSSL standard release software. Revision 1 of this advisory.
  8. HP Security Bulletin HPSBMU03017 - HP Security Bulletin HPSBMU03017 - A potential security vulnerability has been identified with HP Software Connect-IT running OpenSSL. The Heartbleed vulnerability was detected in specific OpenSSL versions. OpenSSL is a 3rd party product that is embedded with some of HP Software products. This bulletin objective is to notify HP Software customers about products affected by the Heartbleed vulnerability. Note: The Heartbleed vulnerability (CVE-2014-0160) is a vulnerability found in the OpenSSL product cryptographic software library product. This weakness potentially allows disclosure of information protected, under normal conditions, by the SSL/TLS protocol. The impacted products appear in the list below are vulnerable due to embedding OpenSSL standard release software. Revision 1 of this advisory.
  9. HP Security Bulletin HPSBMU03019 - HP Security Bulletin HPSBMU03019 - A potential security vulnerability has been identified with HP Software UCMDB Browser and Configuration Manager running OpenSSL. The Heartbleed vulnerability was detected in specific OpenSSL versions. OpenSSL is a 3rd party product that is embedded with some of HP Software products. This bulletin objective is to notify HP Software customers about products affected by the Heartbleed vulnerability. Note: The Heartbleed vulnerability (CVE-2014-0160) is a vulnerability found in the OpenSSL product cryptographic software library product. This weakness potentially allows disclosure of information protected, under normal conditions, by the SSL/TLS protocol. The impacted products appear in the list below are vulnerable due to embedding OpenSSL standard release software. Revision 1 of this advisory.
  10. Ubuntu Security Notice USN-2169-1 - Ubuntu Security Notice 2169-1 - Benjamin Bach discovered that Django incorrectly handled dotted Python paths when using the reverse() function. An attacker could use this issue to cause Django to import arbitrary modules from the Python path, resulting in possible code execution. Paul McMillan discovered that Django incorrectly cached certain pages that contained CSRF cookies. An attacker could possibly use this flaw to obtain a valid cookie and perform attacks which bypass the CSRF restrictions. Various other issues were also addressed.

Packetstorm Tools

  1. OpenStego Free Steganography Solution 0.6.1 - OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images). Both source and jar releases are in this tarball.
  2. AIEngine 0.6 - AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.
  3. Nmap Port Scanner 6.45 - Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.
  4. Fwknop Port Knocking Utility 2.6.1 - fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.
  5. OpenDNSSEC 1.4.5 - OpenDNSSEC is software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security.
  6. Tor-ramdisk i686 UClibc-based Linux Distribution x86 20140409 - Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.
  7. Lynis Auditing Tool 1.5.0 - Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  8. Zed Attack Proxy 2.3.0 Windows Installer - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Windows installer.
  9. Zed Attack Proxy 2.3.0 Linux Release - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Linux release.
  10. Zed Attack Proxy 2.3.0 Mac OS X Release - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X release.

Packetstorm Exploits

  1. Bleed Out Heartbleed Command Line Tool 1.0.1.46 - Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved.
  2. iDevAffiliate 5.x SQL Injection - iDevAffiliate versions 5.x and below suffer from a remote SQL injection vulnerability.
  3. Symantec Messaging Gateway 10.5.1 Cross Site Scripting - Symantec Messaging Gateway version 10.5.1 suffers from a reflective cross site scripting vulnerability.
  4. Sixnet Sixview 2.4.1 Directory Traversal - Sixnet Sixview version 2.4.1 suffers from a directory traversal vulnerability.
  5. No-CMS 0.6.6 Rev 1 Account Hijack / Remote Command Execution - No-CMS version 0.6.6 revision 1 administrative account hijacking and remote command execution exploit that leverages a static encryption key.
  6. Parallels Plesk Panel 12.x Key Disclosure - Parallels Plesk Panel version 12.x for Linux discloses /etc/psa/private/secret_key as an MD5 hash allowing for offline attacks to crack it.
  7. Comtrend CT 5361T Cross Site Request Forgery / Cross Site Scripting - Comtrend CT 5361T suffers from cross site request forgery and cross site scripting vulnerabilities.
  8. MODx Blind SQL Injection - MODx versions prior to 2.2.14 suffer from multiple remote blind SQL injection vulnerabilities.
  9. kitForm 0.43 SQL Injection - kitForm versions 0.43 and below from phpManufaktur suffers from a remote SQL injection vulnerability.
  10. Media Player Classic 1.3.1752.0 / 1.3.1249.0 Memory Corruption - Media Player Classic versions 1.3.1752.0 and 1.3.1249.0 suffer from a memory corruption vulnerability.

Securiteam Exploits

  1. CPanel WHM Forced CPAddons Upgrade Remote Password Disclosure Vulnerability - cPanel WHM forced cPAddons upgrade remote suffers from password disclosure vulnerability.
  2. Cybozu Garoon Keitai Feature Crafted Request User ID Manipulation Authentication Bypass Vulnerability - Cybozu garoon keitai feature crafted request user ID manipulation suffers from authentication bypass vulnerability.
  3. FFmpeg / Libav Libavcodec/mjpegdec.c Ff_mjpeg_decode_sof Function Uninitialized Memory Issue Vulnerability - FFmpeg / libav libavcodec/mjpegdec.c Ff_mjpeg_decode_sof function suffers from uninitialized memory Issue vulnerability.
  4. HP Application Information Optimizer Archive Query Server Remote Code Execution Vulnerability - HP application information optimizer archive query server remote code suffers from execution vulnerability.
  5. IBM Multiple Products Multiple Reflected XSS Vulnerability - IBM Multiple products multiple reflected suffers from cross site scripting vulnerability