RSS

SimpleWebServer 2.2-rc2 – Remote Buffer Overflow Exploit


PMSoftware Simple Web Server 2.2-rc2: The easy and small way to open an HTTP Web Server. Now HTTP/1.1 compliant, RTSP/1.0, PAWN and LUA plugins

 

  • A Simple Web Server (for example can be used to share a folder of your PC to friends)
  • According to “Windows Task Manager” sws.exe (with AMX plugin) require less then 3Mb of Memory.
  • A very simple scripting language (Pawn) can be used to generate dynamic Web Pages with dynamic content.

PMSoftware Simple Web Server 2.2-rc2 suffers from remote buffer overflow vulnerability on HTTP header “Connection: ” parameter. An attacker, can submit a specially crafted HTTP header ‘Connection:’ parameter value to trigger a buffer overflow and execute arbitrary code on the target system.

Read the rest of this entry »

 
1 Comment

Posted by on July 19, 2012 in Exploits

 

Tags: , , , , ,

Appsec Research 2012 – University Challenge BOE

The following vulnerable application (server.exe) was part of the Appsec Research 2012 University Challenge.

Goal: To open a command shell on the server with privileges of the vulnerable echo server.

Warning: Here is the POC of buffer overflow exploit tested on Windows XP SP3 English box. In the case of  Appsec Research 2012 the  vulnerable application (server.exe) was running on Windows Server 2003 SP1.
Read the rest of this entry »

 
Leave a comment

Posted by on July 17, 2012 in Capture The Flag, Exploits

 

Tags: , , , , , ,

Remote exploit for “Drunk Admin” Web Hacking Challenge.

  O Ανέστης Μπεχτσούδης (@anestisb) πριν από μερικούς μήνες, όντας καλεσμένος στο 3ο κατά σειρά UNAUTHORIZED – security meeting (401×003), που έλαβε χώρα στο Hackserpace Αθήνας, παρουσίασε την εφαρμογή WeBaCoo. Επί τη ευκαιρία, μας ενημέρωσε σχετικά με ένα Web hacking challenge που είχε ετοιμάσει, με την κωδική ονομασία “Drunk Admin Web Hacking Challenge”. Δυστυχώς τότε, δεν είχα τον χρόνο που θα ήθελα ώστε να ασχοληθώ με την επίλυση του challenge έτσι, το άφησα για όταν θα έβρισκα λίγο χρόνο.

Read the rest of this entry »

 

Tags: , ,

OneFileCMS v.1.1.5 Local File Inclusion Vulnerability


# Exploit Title: OneFileCMS v.1.1.5 Local File Inclusion Vulnerability
# Google Dork: —
# Date: 16/03/2012
# Author: mr.pr0n (@_pr0n_)
# Homepage: https://ghostinthelab.wordpress.com/
# Software Link: https://github.com/rocktronica/OneFileCMS
# Version: OneFileCMS v.1.1.5
# Tested on: Linux Fedora 14

===============
Description
===============
OneFileCMS is just that. It’s a flat, light, one file CMS (Content Management System) entirely contained in an easy-to-implement, highly customizable, database-less PHP script. Coupling a utilitarian code editor with all the basic necessities of an FTP application, OneFileCMS can maintain a whole website completely in-browser without any external programs.
Read the rest of this entry »

 
Leave a comment

Posted by on March 16, 2012 in Exploits

 

Tags: , , ,

Mozilla Firefox 9.0.1 Memory Corruption PoC

Mozilla Firefox 9.0.1 (and prior versions) is prone to a remote denial of  service attack.If a user browses to the malicious page (that takes advantage of this vulnerability) the browser will crash.A successful attack may result in crashing the application, or consuming excessive CPU and memory resources.

Read the rest of this entry »

 
Leave a comment

Posted by on March 4, 2012 in Exploits

 

Tags: , , ,

Kioptrix Level 4 Run2Shell script.

Kioptrix Level 4 VM really rocks!

Try to solve it alone!

But….
if you need a limited or a root shell easy and fast just run this scirpt … 🙂

Read the rest of this entry »

 
Leave a comment

Posted by on February 27, 2012 in Capture The Flag, Exploits, Scripts

 

Tags: , , ,

Mozilla CTF 2012 – 17 : IP Panel

To σενάριο του 17ου Challenge του Mozilla CTF ανέφερε :

“Exploit Mozillas IP Panel! This IP Panel is used for whitelisting IP addresses. We know that the webinterface will call a bash script that will execute an iptables command without validation. Find the flag somewhere in /home/ippanel/ and submit it!

Update:
The files are not actually in the home directory. Look somewhere else. Sorry!”

Read the rest of this entry »

 
1 Comment

Posted by on January 29, 2012 in Capture The Flag, It's Greek to Me

 

Tags: , , ,