30 mar 2012

Bypassing tolower() filters in buffer overflows


This whitepaper goes into detail on how to bypass tolower() filters in buffer overflows. It uses a stack-based buffer overflow as an example but the technique can also be applied to heap overflows as well.
Hope you guys enjoy it :).

23 mar 2012

Website Pro <= 3.1.13.0 "Referer:" Remote Buffer Overflow PoC



The crash occurs when the application tries to write ECX (0x00000000) into the address that 
contains EAX (we control EAX) (0xBAADBEEF) .
Possible explotable, not tested yet.
SHODAN Dork: "Server: Website/3.1" 
 
Link: http://www.1337day.com/exploits/17806

12 mar 2012

backfuzz - protocol fuzzing toolkit

Well, after a while I am releasing this simple fuzzer.
You can use this basically to fuzz different protocols (FTP, HTTP, IMAP, etc) but also has no-protocol plug-ins (Example: File Fuzzer).
The general idea is that this script has several functions already predefined in the file "functions.py", so whoever wanna write his own plugin's (for another protocol) in a few lines and add it to the script can do so.
I know the code is still in beta and requires a lot of work to get better, so any questions / suggestions / criticism / comment is welcome.

Screenshots:

    Help Menu:



    Crash reached (FTP):


    Crash reached (HTTP):


    File Fuzzing:


    File Fuzzing (Files):


GitHub page:

Installation:

git clone https://github.com/localh0t/backfuzz
 
Happy fuzzing,
Matías. 

2 feb 2012

Port Tester v0.1, firewall port testing tool

Let us suppose that during a pentest we got command execution on a remote server, but when we want to do a reverse connection to our server the connection is not established for some reason (Firewall / IPS / etc); or maybe you just want to test which ports you can access remotely from that particular server.
In that case comes into play this simple script, which allows us to know, given a range of ports, which ports can be accessed from inside the server. We use a server that has the 65k open ports (open.zorinaq.com), and determine what ports we can access and what ports we cannot.

Screenshot:


Download:

Pastebin: http://pastebin.com/C2kkKk9J
Mediafire: http://www.mediafire.com/?s33tuy08tto8vps