Dines
Dines is the definitive answer to DNS testing. It allows the creation of any DNS packet with the possibility to fuzz some fields. Used in shell scripts allows also the creation of fake DNS servers that...
View ArticleDisclosure: Remote Code Execution Vuln in Disqus
We recently found a security vulnerability in the Disqus Comment System plugin for WordPress. It could, under very specific conditions, allow an attacker to perform arbitrary remote code execution...
View ArticleInteractive exploit kit redirection technique
The usual pattern we see when dealing with exploit kits starts with a legitimate website that gets compromised and used to automatically redirect its visitors to the actual malicious content....
View ArticleWordpress 3.9.1 - CSRF vulnerabilities
# EXPLOIT TITLE:Wordpress 3.9.1-CSRF vulnerability# DATE:21st June,2014# Author:Avinash Kumar Thapa#URL: localhost/wordpress/#PATCH/FIX:Not fixed...
View ArticleD-link DSL-2760U-E1 - Persistent XSS
#!/bin/bash# Written and discovered by Yuval tisf Nativ# The page 'dhcpinfo.html' will list all machines connected to the network with hostname,# IP, MAC and IP expiration. It is possible to store an...
View ArticleWordpress Theme Manbiz2 Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:Put the path of the file in the file's field of the exploit ,then click "Download" button then you get...
View ArticleWordpress Theme Awake Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:Put the path of the file in the file's field of the exploit ,then click "Download" button then you get...
View ArticleWordpress Theme Dejavu Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:Put the path of the file in the file's field of the exploit ,then click "Download" button then you get...
View ArticleWordpress Theme Construct Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:Put the path of the file in the file's field of the exploit ,then click "Download" button then you get...
View ArticleWordpress Theme Method Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:Put the path of the file in the file's field of the exploit ,then click "Download" button then you get...
View ArticleWordpress Theme Echelon Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:Put the path of the file in the file's field of the exploit ,then click "Download" button then you get...
View ArticleWordpress Theme Modular Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:Put the path of the file in the file's field of the exploit ,then click "Download" button then you get...
View ArticleWordpress Theme Infocus Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:The exploit extension is .htmlPut the path of the file in the file's field of the exploit ,then click...
View ArticleWordpress Theme Elegance Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:Put the path of the file in the file's field of the exploit ,then click "Download" button then you get...
View ArticleWordpress Theme Myriad Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:The exploit extension is .htmlPut the path of the file in the file's field of the exploit ,then click...
View ArticleWordpress Theme Fusion Arbitrary File Download Vulnerability
Description:This exploit allows attacker to download any writable file from the serverUsage info:Put the path of the file in the file's field of the exploit ,then click "Download" button then you get...
View ArticleInertial Sensor Side Channel: Guessing Your Unlock Code
Few years back I started thinking about how much information could be extracted from a phone’s inertial sensors to guess some sensitive information such as PIN / UnLock Codes / other passwords. One of...
View ArticleBotnetKernel (MS:Win32/Phdet.S) an evolution of BlackEnergy
I didn't find any advert for what seems to be an evolution of the Ddos bot/botnet BlackEnergy : Microsoft:Backdoor:Win32/Phdet.S : BotnetKernel Bot.more...
View ArticleMetasploit: D-Link hedwig.cgi Buffer Overflow in Cookie Header
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Exploit::Remote Rank =...
View ArticleMetasploit: D-Link authentication.cgi Buffer Overflow
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Exploit::Remote Rank =...
View Article