Hack Tools/Exploits

Packetstorm Last 10 Files

  1. TOR Virtual Network Tunneling Tool 0.2.4.25 - Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  2. Red Hat Security Advisory 2014-1677-01 - Red Hat Security Advisory 2014-1677-01 - Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file.
  3. Red Hat Security Advisory 2014-1676-01 - Red Hat Security Advisory 2014-1676-01 - Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file.
  4. FileBug 1.5.1 Directory Traversal - FileBug version 1.5.1 suffers from a directory traversal vulnerability.
  5. Files Document And PDF 2.0.2 Command Execution / Local File Inclusion - Files Document and PDF version 2.0.2 suffers from a local file inclusion and multiple command execution vulnerabilities.
  6. WordPress Database Manager 2.7.1 Command Injection / Credential Leak - WordPress Database Manager plugin version 2.7.1 suffers from remote command injection and credential leakage vulnerabilities.
  7. Incredible PBX 11 2.0.6.5.0 Remote Command Execution - Incredible PBX 11 version 2.0.6.5.0 suffers from a remote command execution vulnerability.
  8. HP Security Bulletin HPSBUX03150 SSRT101681 - HP Security Bulletin HPSBUX03150 SSRT101681 - Potential security vulnerabilities have been identified with the HP-UX Apache Web Server Suite, Tomcat Servlet Engine, and PHP. These could be exploited remotely to create a Denial of Service (DoS) and other vulnerabilities. Revision 1 of this advisory.
  9. Mandriva Linux Security Advisory 2014-199 - Mandriva Linux Security Advisory 2014-199 - Updated perl and perl-Data-Dumper packages fixes security The Dumper method in Data::Dumper before 2.154, allows context-dependent attackers to cause a denial of service (stack consumption and crash) via an Array-Reference with many nested Array-References, which triggers a large number of recursive calls to the DD_dump function. The Data::Dumper module bundled with perl and the perl-Data-Dumper packages has been updated to fix this issue.
  10. Mandriva Linux Security Advisory 2014-198 - Mandriva Linux Security Advisory 2014-198 - MediaWiki before 1.23.4 is vulnerable to cross-site scripting due to JavaScript injection via CSS in uploaded SVG files. MediaWiki before 1.23.5 is vulnerable to cross-site scripting due to JavaScript injection via user-specificed CSS in certain special pages.

Packetstorm Tools

  1. TOR Virtual Network Tunneling Tool 0.2.4.25 - Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
  2. AIEngine 0.10 - AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.
  3. WordPress Brute Forcer - This is a python script that performs brute forcing against WordPress installs using a wordlist.
  4. OpenSSL Toolkit 1.0.1j - OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.
  5. Lynis Auditing Tool 1.6.3 - Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.
  6. Mobius Forensic Toolkit 0.5.21 - Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.
  7. OpenSSH 6.7p1 - This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.
  8. Mandos Encrypted File System Unattended Reboot Utility 1.6.9 - The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.
  9. oclHashcat For NVidia 1.31 - oclHashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. NVidia version.
  10. oclHashcat For AMD 1.31 - oclHashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. AMD version.

Packetstorm Exploits

  1. FileBug 1.5.1 Directory Traversal - FileBug version 1.5.1 suffers from a directory traversal vulnerability.
  2. Files Document And PDF 2.0.2 Command Execution / Local File Inclusion - Files Document and PDF version 2.0.2 suffers from a local file inclusion and multiple command execution vulnerabilities.
  3. WordPress Database Manager 2.7.1 Command Injection / Credential Leak - WordPress Database Manager plugin version 2.7.1 suffers from remote command injection and credential leakage vulnerabilities.
  4. Incredible PBX 11 2.0.6.5.0 Remote Command Execution - Incredible PBX 11 version 2.0.6.5.0 suffers from a remote command execution vulnerability.
  5. Numara / BMC Track-It! FileStorageService Arbitrary File Upload - This Metasploit module exploits an arbitrary file upload vulnerability in Numara / BMC Track-It! v8 to v11.X. The application exposes the FileStorageService .NET remoting service on port 9010 (9004 for version 8) which accepts unauthenticated uploads. This can be abused by a malicious user to upload a ASP or ASPX file to the web root leading to arbitrary code execution as NETWORK SERVICE or SYSTEM. This Metasploit module has been tested successfully on versions 11.3.0.355, 10.0.51.135, 10.0.50.107, 10.0.0.143, 9.0.30.248 and 8.0.2.51.
  6. Joomla Akeeba Kickstart Unserialize Remote Code Execution - This Metasploit module exploits a vulnerability found in Joomla! through 2.5.25, 3.2.5 and earlier 3.x versions and 3.3.0 through 3.3.4 versions. The vulnerability affects the Akeeba component, which is responsible for Joomla! updates. Nevertheless it is worth to note that this vulnerability is only exploitable during the update of the Joomla! CMS.
  7. HP Data Protector EXEC_INTEGUTIL Remote Code Execution - This exploit abuses a vulnerability in the HP Data Protector. The vulnerability exists in the Backup client service, which listens by default on TCP/5555. The EXEC_INTEGUTIL request allows to execute arbitrary commands from a restricted directory. Since it includes a perl executable, it's possible to use an EXEC_INTEGUTIL packet to execute arbitrary code. On linux targets, the perl binary isn't on the restricted directory, but an EXEC_BAR packet can be used to access the perl binary, even in the last version of HP Data Protector for linux. This Metasploit module has been tested successfully on HP Data Protector 9 over Windows 2008 R2 64 bits and CentOS 6 64 bits.
  8. Windows OLE Package Manager SandWorm Exploit - Proof of concept exploit builder for the OLE flaw in packager.dll.
  9. LiteCart 1.1.2.1 Cross Site Scripting - LiteCart version 1.1.2.1 suffers from cross site scripting vulnerabilities.
  10. Huawei Mobile Partner DLL Hijacking - Huawei Mobile Partner suffers from a DLL hijacking vulnerability.

Securiteam Exploits

  1. IBM WebSphere Service Registry And Repository Cross-Site Scripting Vulnerability - Cross-site scripting (XSS) vulnerability in the Web UI in IBM WebSphere Service Registry and Repository (WSRR) 6.2, 6.3 before 6.3.0.6, 7.0 before 7.0.0.6, 7.5 before 7.5.0.5, and 8.0 before 8.0.0.3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
  2. Microsoft Debug Interface Access SDK 'msdia.dll' Memory Corruption Vulnerability - Microsoft Debug Interface Access SDK is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the current process. Failed attacks will cause denial-of-service conditions.
  3. Oracle Supply Chain Products Suite 9.3.3.0 Information Disclosure Vulnerability - Unspecified vulnerability in the Oracle Agile PLM Framework component in Oracle Supply Chain Products Suite 9.3.3.0 allows remote authenticated users to affect confidentiality via unknown vectors related to Security.
  4. Python Commandline Symlink Attack Vulnerability - Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
  5. Apache CloudStack Authentication Bypass Vulnerability - Apache CloudStack is prone to a security-bypass vulnerability. Successful exploits will allow attackers to bypass certain security restrictions, which may aid in further attacks.