Subscribe via feed.
Archive for August, 2016

http://www.mwm.go.th/attach_file/Moh3nra021.php

Posted by deepcore under defacement (No Respond)

http://www.mwm.go.th/attach_file/Moh3nra021.php notified by Ashiyane Digital Security Team

Tags:

http://www.banwa.go.th/youtubedata/Moh3nra021.php

Posted by deepcore under defacement (No Respond)

http://www.banwa.go.th/youtubedata/Moh3nra021.php notified by Ashiyane Digital Security Team

Tags:

http://www.donchang.go.th/youtubedata/Moh3nra021.php

Posted by deepcore under defacement (No Respond)

http://www.donchang.go.th/youtubedata/Moh3nra021.php notified by Ashiyane Digital Security Team

Tags:

http://www.opesbr.go.th

Posted by deepcore under defacement (No Respond)

http://www.opesbr.go.th notified by HUNT3RXM

Tags:

Metasploit Cron Persistence Module

Posted by deepcore under exploit (No Respond)

This Metasploit module will create a cron or crontab entry to execute a payload. The module includes the ability to automatically clean up those entries to prevent multiple executions. syslog will get a copy of the cron entry.

Metasploit Service Persistence Module

Posted by deepcore under exploit (No Respond)

This Metasploit module will create a service on the box, and mark it for auto-restart.

EGREGIOUSBLUNDER Fortigate Remote Code Execution

Posted by deepcore under exploit (No Respond)

EGREGIOUSBLUNDER is a remote code execution exploit for Fortigate firewalls. It leverages an HTTP cookie overflow and is different from CVE-2006-6493 as noted by Avast. Models affected include 60, 60M, 80C, 200A, 300A, 400A, 500A, 620B, 800, 5000, 1000A, 3600, and 3600A. Note that this exploit is part of the recent public disclosure from the […]

ELIGIBLEBACHELOR TOPSEC Firewall Exploit

Posted by deepcore under exploit (No Respond)

This is an exploit with an unclear attack vector for TOPSEC firewalls running TOS operating system versions 3.2.100.010, 3.3.001.050, 3.3.002.021 and 3.3.002.030. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no […]

ELIGIBLEBOMBSHELL TOPSEC Remote Code Execution

Posted by deepcore under exploit (No Respond)

ELIGIBLEBOMBSHELL is a remote code execution exploit for TOPSEC firewalls. It exploits an HTTP cookie command injection vulnerability and uses ETag examination for version detection. Versions affected include 3.2.100.010.1_pbc_17_iv_3 to 3.3.005.066.1. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team […]

ELIGIBLECANDIDATE TOPSEC Remote Code Execution

Posted by deepcore under exploit (No Respond)

ELIGIBLECANDIDATE is a remote code execution exploit for TOPSEC firewalls. It leverages an HTTP cookie command injection vulnerability. Versions affected include 3.3.005.057.1 to 3.3.010.024.1. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there […]