14 abr 2012
8 abr 2012
30 mar 2012
Bypassing tolower() filters in buffer overflows
This whitepaper goes into detail on how to bypass tolower() filters in buffer overflows. It uses a stack-based buffer overflow as an example but the technique can also be applied to heap overflows as well.
Hope you guys enjoy it :).
23 mar 2012
Website Pro <= 3.1.13.0 "Referer:" Remote Buffer Overflow PoC
The crash occurs when the application tries to write ECX (0x00000000) into the address that contains EAX (we control EAX) (0xBAADBEEF) . Possible explotable, not tested yet.
SHODAN Dork: "Server: Website/3.1"
Link: http://www.1337day.com/exploits/17806
12 mar 2012
backfuzz - protocol fuzzing toolkit
Well, after a while I am releasing this simple fuzzer.
Crash reached (FTP):
Crash reached (HTTP):
File Fuzzing:
File Fuzzing (Files):
You can use this basically to fuzz different protocols (FTP, HTTP, IMAP, etc) but also has no-protocol plug-ins (Example: File Fuzzer).
The general idea is that this script has several functions already predefined in the file "functions.py", so whoever wanna write his own plugin's (for another protocol) in a few lines and add it to the script can do so.
I know the code is still in beta and requires a lot of work to get better, so any questions / suggestions / criticism / comment is welcome.
Screenshots:
Help Menu:
Crash reached (FTP):
Crash reached (HTTP):
File Fuzzing:
File Fuzzing (Files):
GitHub page:
Installation:
29 feb 2012
2 feb 2012
Port Tester v0.1, firewall port testing tool
Let us suppose that during a pentest we got command execution on a remote server, but when we want to do a reverse connection to our server the connection is not established for some reason (Firewall / IPS / etc); or maybe you just want to test which ports you can access remotely from that particular server.
In that case comes into play this simple script, which allows us to know, given a range of ports, which ports can be accessed from inside the server. We use a server that has the 65k open ports (open.zorinaq.com), and determine what ports we can access and what ports we cannot.
Screenshot:
Download:
Pastebin: http://pastebin.com/C2kkKk9J
Mediafire: http://www.mediafire.com/?s33tuy08tto8vps
In that case comes into play this simple script, which allows us to know, given a range of ports, which ports can be accessed from inside the server. We use a server that has the 65k open ports (open.zorinaq.com), and determine what ports we can access and what ports we cannot.
Screenshot:
Download:
Pastebin: http://pastebin.com/C2kkKk9J
Mediafire: http://www.mediafire.com/?s33tuy08tto8vps
Suscribirse a:
Entradas (Atom)