Subscribe via feed.
Archive for April, 2017

ETERNALROMANCE 1.4.0 Windows XP / 2003 / Vista / 7 / 8 / 2008 / 2008 R2 SMB1 Exploit

Posted by deepcore under exploit (No Respond)

ETERNALROMANCE exploits an SMB1 vulnerability in Microsoft Windows XP, 2003, Vista, 7, 8, 2008, and 2008 R2. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this […]

ETERNALSYNERGY 1.0.1 SMBv3 Remote Code Execution Exploit

Posted by deepcore under exploit (No Respond)

ETERNALSYNERGY is a remote code execution exploit for SMBv3. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this exploit hostile and unverified. For […]

EWOKFRENZY 2.0.0 Lotus Domino 6 / 7 Exploit

Posted by deepcore under exploit (No Respond)

EWOKFRENZY is an exploit for Lotus Domino versions 6 and 7. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this exploit hostile and […]

EXPLODINGCAN 2.0.2 Microsoft IIS 6 Exploit

Posted by deepcore under exploit (No Respond)

EXPLODINGCAN is an exploit for Microsoft IIS 6 that leverages WebDAV and works on 2003 only. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. […]

ZIPPYBEER 1.0.2 Authenticated Microsoft Domain Controller Exploit

Posted by deepcore under exploit (No Respond)

ZIPPYBEER is an authenticated Microsoft Domain Controller exploit. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this exploit hostile and unverified. For research […]

ETERNALBLUE 2.2.0 Windows 2008 R2 SMBv1 Zero Day Exploit

Posted by deepcore under exploit (No Respond)

ETERNALBLUE is an SMBv1 remote unauthenticated zero day exploit that works on 2008 R2. Note that this exploit is part of the recent public disclosure from the “Shadow Brokers” who claim to have compromised data from a team known as the “Equation Group”, however, there is no author data available in this content. Consider this […]

http://www.kdh.go.th/index4.html

Posted by deepcore under defacement (No Respond)

http://www.kdh.go.th/index4.html notified by ZoRRoKiN

Tags:

How to setup and Install FuzzBunch & DanderSpritz

Posted by deepquest under exploit (No Respond)

context: https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation writeup: https://www.trustedsec.com/blog/equation-group-dump-analysis-full-rce-win7-fully-patched-cobalt-strike/ decrypted files: https://github.com/x0rz/EQGRP_Lost_in_Translation 750BTC: https://bit.surf:43110/theshadowbrokers.bit/page/windows/ if its up

Tags: , , , ,

http://phayabunlue.go.th/king.htm

Posted by deepcore under defacement (No Respond)

http://phayabunlue.go.th/king.htm notified by RxR

Tags:

AlienVault USM/OSSIM 5.3.4 / 5.3.5 Remote Command Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits an unauthenticated command injection in Alienvault USM/OSSIM versions 5.3.4 and 5.3.5. The vulnerability lies in an API function that does not check for authentication and then passes user input directly to a system call as root.