exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 261 RSS Feed

Files Date: 2024-09-01

Cerberus FTP Server SFTP Username Enumeration
Posted Sep 1, 2024
Authored by Steve Embling, Matt Byrne | Site metasploit.com

This Metasploit module uses a dictionary to brute force valid usernames from Cerberus FTP server via SFTP. This issue affects all versions of the software older than 6.0.9.0 or 7.0.0.2 and is caused by a discrepancy in the way the SSH service handles failed logins for valid and invalid users. This issue was discovered by Steve Embling.

tags | exploit
SHA-256 | b093750085a1d17aa0852d4c39e66fa6eea1d5d4bbffc846638158df23d8b820
Libssh Authentication Bypass Scanner
Posted Sep 1, 2024
Authored by Peter Winter-Smith, wvu | Site metasploit.com

This Metasploit module exploits an authentication bypass in libssh server code where a USERAUTH_SUCCESS message is sent in place of the expected USERAUTH_REQUEST message. libssh versions 0.6.0 through 0.7.5 and 0.8.0 through 0.8.3 are vulnerable. Note that this modules success depends on whether the server code can trigger the correct (shell/exec) callbacks despite only the state machines authenticated state being set. Therefore, you may or may not get a shell if the server requires additional code paths to be followed.

tags | exploit, shell
advisories | CVE-2018-10933
SHA-256 | cde91faaf9388b718ce891cfb99941d6d0d6c0ea49e71e81ac203c8bf86be937
Juniper SSH Backdoor Scanner
Posted Sep 1, 2024
Authored by H D Moore, h00die | Site metasploit.com

This Metasploit module scans for the Juniper SSH backdoor (also valid on Telnet). Any username is required, and the password is <<< %s(un=%s) = %u.

tags | exploit
systems | juniper
advisories | CVE-2015-7755
SHA-256 | 9063c59689446fe07bb9610922c2bca3f2bd26ac97f441441018bc99fbe63a81
Apache Karaf Default Credentials Command Execution
Posted Sep 1, 2024
Authored by Nicholas Starke | Site metasploit.com

This Metasploit module exploits a default misconfiguration flaw on Apache Karaf versions 2.x-4.x. The karaf user has a known default password, which can be used to login to the SSH service, and execute operating system commands from remote.

tags | exploit, remote
SHA-256 | 93b9fb220a19ac22dc6c94500a58d43ee94d2a078a4193befda584fd4f7ae958
Eaton Xpert Meter SSH Private Key Exposure Scanner
Posted Sep 1, 2024
Authored by BrianWGray | Site metasploit.com

Eaton Power Xpert Meters running firmware below version 12.x.x.x or below version 13.3.x.x ship with a public/private key pair that facilitate remote administrative access to the devices. Tested on: Firmware 12.1.9.1 and 13.3.2.10.

tags | exploit, remote
advisories | CVE-2018-16158
SHA-256 | 026496f02bac41cd602a9a3b1890d26e2941429e48004e3ab1f36c13bdc74157
SSH Username Enumeration
Posted Sep 1, 2024
Authored by Michal Sajdak, wvu, Qualys, Dariusz Tytko, kenkeiras | Site metasploit.com

This Metasploit module uses a malformed packet or timing attack to enumerate users on an OpenSSH server. The default action sends a malformed (corrupted) SSH_MSG_USERAUTH_REQUEST packet using public key authentication (must be enabled) to enumerate users. On some versions of OpenSSH under some configurations, OpenSSH will return a "permission denied" error for an invalid user faster than for a valid user, creating an opportunity for a timing attack to enumerate users. Testing note: invalid users were logged, while valid users were not. YMMV.

tags | exploit
advisories | CVE-2003-0190, CVE-2006-5229, CVE-2016-6210, CVE-2018-15473
SHA-256 | 1ffbd9886232ee7c1bbcfa4f8a71da9745e371936b0cb186036866d08b29bde5
Fortinet SSH Backdoor Scanner
Posted Sep 1, 2024
Authored by wvu, operator8203 | Site metasploit.com

This Metasploit module scans for the Fortinet SSH backdoor.

tags | exploit
advisories | CVE-2016-1909
SHA-256 | 29ba52cc385c46ba1a14c7c07c3609f6bc5abc288cf151e9e78dc8cd16d6f6ac
MySQL Authentication Bypass Password Dump
Posted Sep 1, 2024
Authored by jcran, The Light Cosine | Site metasploit.com

This Metasploit module exploits a password bypass vulnerability in MySQL in order to extract the usernames and encrypted password hashes from a MySQL server. These hashes are stored as loot for later cracking. Impacts MySQL versions: - 5.1.x before 5.1.63 - 5.5.x before 5.5.24 - 5.6.x before 5.6.6 And MariaDB versions: - 5.1.x before 5.1.62 - 5.2.x before 5.2.12 - 5.3.x before 5.3.6 - 5.5.x before 5.5.23.

tags | exploit, bypass
advisories | CVE-2012-2122
SHA-256 | e4032569995bd5ac99233c3cc5b3dcf8b3228b921415fd0e18c7acd6d8b4667e
DNS Amplification Scanner
Posted Sep 1, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module can be used to discover DNS servers which expose recursive name lookups which can be used in an amplification attack against a third party.

tags | exploit
advisories | CVE-2006-0987, CVE-2006-0988
SHA-256 | 17285bd944013475bf3599fa51a46a69e0a163f4332206b55107e864ee5d81c7
Novell ZENworks Configuration Management Preboot Service Remote File Access
Posted Sep 1, 2024
Authored by Luigi Auriemma, juan vazquez | Site metasploit.com

This Metasploit module exploits a directory traversal in the ZENworks Configuration Management. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted PROXY_CMD_FTP_FILE (opcode 0x21) packet to the 998/TCP port. This Metasploit module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 and SP3 over Windows.

tags | exploit, tcp
systems | windows
advisories | CVE-2012-2215
SHA-256 | c8558ecefbfe751f2fc66900fb57a9cf3f672074e3a5a9c539be4d79127c10fb
Ray Sharp DVR Password Retriever
Posted Sep 1, 2024
Authored by H D Moore, someluser | Site metasploit.com

This Metasploit module takes advantage of a protocol design issue with the Ray Sharp based DVR systems. It is possible to retrieve the username and password through the TCP service running on port 9000. Other brands using this platform and exposing the same issue may include Swann, Lorex, Night Owl, Zmodo, URMET, and KGuard Security.

tags | exploit, tcp, protocol
SHA-256 | 8805abb547ee0c40d40a8ab15abce346a4a37b8f5ae7b7a9eeac09aa9f1a2cf4
Dahua DVR Authentication Bypass Scanner
Posted Sep 1, 2024
Authored by Jon Hart, Jake Reynolds, Tyler Bennett, Nathan McBride | Site metasploit.com

This Metasploit modules scans for Dahua-based DVRs and then grabs settings. Optionally resets a users password and clears the device logs.

tags | exploit
advisories | CVE-2013-6117
SHA-256 | d683a8a28f0f90df138b2d6d657877bb3a080df3e5aa099aed5198bca4b0c59c
Rosewill RXS-3211 IP Camera Password Retriever
Posted Sep 1, 2024
Authored by Ben Schmidt | Site metasploit.com

This Metasploit module takes advantage of a protocol design issue with the Rosewill admin executable in order to retrieve passwords, allowing remote attackers to take administrative control over the device. Other similar IP Cameras such as Edimax, Hawking, Zonet, etc, are also believed to have the same flaw, but not fully tested. The protocol design issue also allows attackers to reset passwords on the device.

tags | exploit, remote, protocol
SHA-256 | 362007d6c9e7ed189b21c55291fc6aa6c1c4b1494d29638e41d80a4dd9cf8eac
EasyCafe Server Remote File Access
Posted Sep 1, 2024
Authored by Brendan Coles, R-73eN | Site metasploit.com

This Metasploit module exploits a file retrieval vulnerability in EasyCafe Server. The vulnerability can be triggered by sending a specially crafted packet (opcode 0x43) to the 831/TCP port. This Metasploit module has been successfully tested on EasyCafe Server version 2.2.14 (Trial mode and Demo mode) on Windows XP SP3 and Windows 7 SP1. Note that the server will throw a popup messagebox if the specified file does not exist.

tags | exploit, tcp
systems | windows, xp, 7
SHA-256 | 33d40a2aa040357554a8308847a479cb0f61d14ed8afe5d9bd0a74c18bb67185
SerComm Network Device Backdoor Detection
Posted Sep 1, 2024
Authored by Eloi Vanderbeken, Matt hostess Andreko | Site metasploit.com

This Metasploit module can identify SerComm manufactured network devices which contain a backdoor, allowing command injection or account disclosure.

tags | exploit
advisories | CVE-2014-0659
SHA-256 | a2b558545cc914b5b104fd09c00958646b9bdc1ec7b9d254c85f9f70c47efbf6
IBM WebSphere MQ Channel Name Bruteforce
Posted Sep 1, 2024
Authored by Petros Koutroumpis | Site metasploit.com

This Metasploit module uses a dictionary to bruteforce MQ channel names. For all identified channels it also returns if SSL is used and whether it is a server-connection channel.

tags | exploit
SHA-256 | 2a793589cd41d19c66beb8c1ff965329e7a79263a8bc445179b95d56163a2056
OKI Printer Default Login Credential Scanner
Posted Sep 1, 2024
Authored by antr6X | Site metasploit.com

This Metasploit module scans for OKI printers via SNMP, then tries to connect to found devices with vendor default administrator credentials via HTTP authentication. By default, OKI network printers use the last six digits of the MAC as admin password.

tags | exploit, web
SHA-256 | 8613aa2a1290a7367538b13eddb3594428f9fc32d1fd8e239c7ddb8a9589ca0c
Multiple DVR Manufacturers Configuration Disclosure
Posted Sep 1, 2024
Authored by Alejandro Ramos, juan vazquez | Site metasploit.com

This Metasploit module takes advantage of an authentication bypass vulnerability at the web interface of multiple manufacturers DVR systems, which allows to retrieve the device configuration.

tags | exploit, web, bypass
advisories | CVE-2013-1391
SHA-256 | 92970fe8576d8a26914e34ab8819055f169c2028d4106ed9aa7fe40e0c3de86b
Portmapper Amplification Scanner
Posted Sep 1, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module can be used to discover Portmapper services which can be used in an amplification DDoS attack against a third party.

tags | exploit
advisories | CVE-2013-5211
SHA-256 | bdabe3d28c58a0c5c0c4aadf615e446e320968fc421469ed98cd0602c6823fa5
VICIdial Multiple Authenticated SQL Injection
Posted Sep 1, 2024
Authored by h00die | Site metasploit.com

This Metasploit module exploits several authenticated SQL Inject vulnerabilities in VICIdial 2.14b0.5 prior to svn/trunk revision 3555 (VICIBox 10.0.0, prior to January 20 is vulnerable). Injection point 1 is on vicidial/admin.php when adding a user, in the modify_email_accounts parameter. Injection point 2 is on vicidial/admin.php when adding a user, in the access_recordings parameter. Injection point 3 is on vicidial/admin.php when adding a user, in the agentcall_email parameter. Injection point 4 is on vicidial/AST_agent_time_sheet.php when adding a user, in the agent parameter. Injection point 5 is on vicidial/user_stats.php when adding a user, in the file_download parameter. VICIdial does not encrypt passwords by default.

tags | exploit, php, vulnerability
advisories | CVE-2022-34876, CVE-2022-34877, CVE-2022-34878
SHA-256 | ee13ad5d4ae7546320169435916f3c9bac21c75f6a3c00a761a80c9d13b3d3b5
A10 Networks AX Loadbalancer Directory Traversal
Posted Sep 1, 2024
Authored by xistence | Site metasploit.com

This Metasploit module exploits a directory traversal flaw found in A10 Networks (Soft) AX Loadbalancer version 2.6.1-GR1-P5/2.7.0 or less. When handling a file download request, the xml/downloads class fails to properly check the filename parameter, which can be abused to read any file outside the virtual directory. Important files include SSL certificates. This Metasploit module works on both the hardware devices and the Virtual Machine appliances. IMPORTANT NOTE: This Metasploit module will also delete the file on the device after downloading it. Because of this, the CONFIRM_DELETE option must be set to true either manually or by script.

tags | exploit
SHA-256 | 871a530085028623e1dc35c3967661b44b8c5f849304e2705a0ae616fc136cdc
Icingaweb Directory Traversal In Static Library File Requests
Posted Sep 1, 2024
Authored by h00die, Thomas Chauchefoin, Jacob Ebben | Site metasploit.com

Icingaweb versions from 2.9.0 to 2.9.5 inclusive, and 2.8.0 to 2.8.5 inclusive suffer from an unauthenticated directory traversal vulnerability. The vulnerability is triggered through the icinga-php-thirdparty library, which allows unauthenticated users to retrieve arbitrary files from the targets filesystem via a GET request to /lib/icinga/icinga-php-thirdparty/<absolute path to target file on disk> as the user running the Icingaweb server, which will typically be the www-data user. This can then be used to retrieve sensitive configuration information from the target such as the configuration of various services, which may reveal sensitive login or configuration information, the /etc/passwd file to get a list of valid usernames for password guessing attacks, or other sensitive files which may exist as part of additional functionality available on the target server. This Metasploit module was tested against Icingaweb 2.9.5 running on Docker.

tags | exploit, arbitrary, php
advisories | CVE-2022-24716
SHA-256 | cdc69a4bccff0e05ac6725d9eb18225432bfef742c18d90b549db0f05b86206e
Microsoft Exchange Privilege Escalation
Posted Sep 1, 2024
Authored by _dirkjan, Petros Koutroumpis | Site metasploit.com

This Metasploit module exploits a privilege escalation vulnerability found in Microsoft Exchange - CVE-2019-0724 Execution of the module will force Exchange to authenticate to an arbitrary URL over HTTP via the Exchange PushSubscription feature. This allows us to relay the NTLM authentication to a Domain Controller and authenticate with the privileges that Exchange is configured. The module is based on the work by @_dirkjan,.

tags | exploit, web, arbitrary
advisories | CVE-2019-0724
SHA-256 | 9f8ccd3febae1d6a5a140ff0111ba4264db42cc77adc0776d3f47273870024c9
WordPress NextGEN Gallery Directory Read
Posted Sep 1, 2024
Authored by Roberto S. Soares, Sathish Kumar | Site metasploit.com

This Metasploit module exploits an authenticated directory traversal vulnerability in WordPress Plugin "NextGEN Gallery" version 2.1.7, allowing to read arbitrary directories with the web server privileges.

tags | exploit, web, arbitrary
SHA-256 | 2c0cd7aee77fbdb8a99fcc09f39bd549ae4823975d07eaa06182ce30e5d70738
SAP BusinessObjects Web User Bruteforcer
Posted Sep 1, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module simply attempts to bruteforce SAP BusinessObjects users by using CmcApp.

tags | exploit
SHA-256 | c7f2ccace6acca766972107fabec89a53c6bf09187f4ebd994b454f51654f936
Page 1 of 11
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    0 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close