exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files from FX

Email addressfx at phenoelit.de
First Active2000-06-13
Last Active2012-11-23
Router Exploitation
Posted Nov 23, 2012
Authored by FX | Site recurity-labs.com

This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.

tags | paper
systems | cisco, juniper
SHA-256 | d251e8ce38047dd92c1a121ab52dccf2904bfc18ca85475675ae8202a6a1241d
Cisco CUCM Directory Traversal / Reversible Obfuscation
Posted Nov 8, 2011
Authored by FX, Sandro Gauci | Site recurity-labs.com

Cisco CUCM environment and the IP Phone CP-7975G suffer from a directory traversal, have a reversible obfuscation algorithm, security issues related to SCCP, CTFTP, and Voice VLAN separation. Versions 7.0 and 8.0(2) are affected.

tags | exploit, file inclusion
systems | cisco
SHA-256 | 17aa1f350cac49473ed6962ed0fc3ece5a0474aa8fa99f6df2c4f4751b652bc7
Cisco IOS Router Exploitation
Posted Jul 26, 2009
Authored by FX | Site recurity-labs.com

Whitepaper called Cisco IOS Router Exploitation. This paper describes the challenges with the exploitation of memory corruption software vulnerabilities in Cisco IOS. The goal is to map out the problem space in order to allow for the anticipation of developments in the future, as current research suggests that exploitation of such vulnerabilities in the wild is not currently the case. By understanding the challenges that an attacker faces, defensive strategies can be better planned, a required evolution with the current state of Cisco IOS router networks.

tags | paper, vulnerability
systems | cisco
SHA-256 | c8f425e5b59d8610a92403e4d24fbd0a74109b64e2b2600c739f8f66b44a6701
aklink-sa-2008-006-opera-heap-overflow.txt
Posted May 28, 2008
Authored by FX, Alexander Klink | Site cynops.de

Opera versions below 9.25 are susceptible to a heap-based buffer overflow that allows for a denial of service and possibly code execution.

tags | advisory, denial of service, overflow, code execution
advisories | CVE-2007-6521
SHA-256 | f6dc341cce8dd3f5bc84c05a0c44cde29463acefebfde3867a34bf222e7aabf7
RecurityLabs_Cisco_ACS_UCP_advisory.txt
Posted Mar 13, 2008
Authored by FX | Site recurity-labs.com

The Cisco Secure Access Control Server (ACS) for Windows User-Changeable Password (UCP) application suffers from buffer overflow and cross site scripting vulnerabilities. Details provided.

tags | exploit, overflow, vulnerability, xss
systems | cisco, windows
advisories | CVE-2008-0532, CVE-2008-0533
SHA-256 | a242258bd4975d682d6d762fee35ed4b8fd3212690cec9f6401fbc5d74109bb6
Cisco Security Advisory 20080312-ucp
Posted Mar 13, 2008
Authored by FX, Cisco Systems | Site cisco.com

Cisco Security Advisory - Two sets of vulnerabilities were discovered in the Cisco Secure Access Control Server (ACS) for Windows User-Changeable Password (UCP) application. The first set of vulnerabilities address several buffer overflow conditions in the UCP application that could result in remote execution of arbitrary code on the host system where UCP is installed. The second set of vulnerabilities address cross-site scripting in the UCP application pages.

tags | advisory, remote, overflow, arbitrary, vulnerability, xss
systems | cisco, windows
advisories | CVE-2008-0532, CVE-2008-0533
SHA-256 | f88707ab17b43b63e07bb9e4fd28777a8d510ea5523d765ef65f2564020d2700
r3mote_win_UDPexec.pl.txt
Posted Nov 14, 2006
Authored by FX

Original Win32 version of the exploit for the gwrd bug in SAP versions below 4.6D patch 1767 and versions below 6.40 patch 4. Allows for remote command execution.

tags | exploit, remote
systems | windows
SHA-256 | 846933d938c8ba642bdaaea38a839367e37ffc3c050691922428ea4ccbdad92d
CiscoVTP.txt
Posted Sep 14, 2006
Authored by FX | Site phenoelit.de

Phenoelit Advisory - Cisco Systems IOS contains bugs when handling the VLAN Trunking Protocol (VTP). Specially crafted packets may cause denial of service conditions, confusion of the network operator and a heap overflow with the possibility for arbitrary code execution.

tags | advisory, denial of service, overflow, arbitrary, code execution, protocol
systems | cisco
SHA-256 | 55835c4dae9bb73bab54d974b898751b7ff9355f4016fc955f35996e0c7aed9f
CiscoGRE.txt
Posted Sep 7, 2006
Authored by FX | Site phenoelit.de

Phenoelit Advisory - Cisco Systems IOS contains a bug when parsing GRE packets with GRE source routing information. A specially crafter GRE packet can cause the router to reuse packet packet data from unrelated ring buffer memory. The resulting packet is reinjected in the routing queues. Tested on C3550 IOS 12.1(19).

tags | advisory
systems | cisco
SHA-256 | c399511f9b9e38917acdb9d548663a1225fa3fd434df65d78c4c032042e0b87a
JetRoot_pl.txt
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Linux root and Windows NT/2000 Administrator remote exploit for HP Web JetAdmin 6.5.

tags | exploit, remote, web, root
systems | linux, windows
SHA-256 | 2313f6c8c3680934ff278d70f97559a0358c9851c286921cd3a616b0ad3e2749
HP_Web_Jetadmin_advisory.txt
Posted Apr 28, 2004
Authored by FX | Site phenoelit.de

Phenoelit Advisory #0815 - Multiple vulnerabilities exist in the HP Web JetAdmin product. Version 6.5 is fully affect. Versions 7.0 and 6.2 and below are partially affected. A vulnerability summary list: Source disclosure of HTS and INC files, real path disclosure of critical files, critical files accessible through web server, user and administrator password disclosure and decryption, user and administrator password replay, and many, many others.

tags | advisory, web, vulnerability
SHA-256 | c69f95a71084e7a828d8795c80a234d4f7bda584394ce675667092d629882a14
iosniff.tgz
Posted Aug 10, 2003
Authored by FX | Site phenoelit.de

Cisco Systems IOS 11.x UDP echo memory leak remote sniffer. The UDP echo service (UDP port 7) has to be enabled on the device. The bug will cause the Cisco router to send about 20 kilobytes of data from the interface buffer pools containing packets in the send/recv/forward queues. This tool will identify IOS memory blocks, find the router specific offset for packets in the block and decode the packet to the screen. Note that this is not a full dump of the traffic through the remote router but rather a subset of received data. Features include a packet checksum cache to prevent repeated output of the same packet, auto identification of packets and buffer offsets, and IPv4 decoding.

tags | remote, udp, memory leak
systems | cisco
SHA-256 | 88c96f5f35ee8e8f230938a70d6e512ac19d921be8f468c01cdb28507adc9a83
CiscoCasumEst.tgz
Posted Aug 10, 2003
Authored by FX | Site phenoelit.de

Cisco IOS 12.x/11.x remote exploit for the HTTP integer overflow using a malformed HTTP GET request and two gigabytes of data.

tags | exploit, remote, web, overflow
systems | cisco
SHA-256 | 7f4a101d2a92a428372a4b1a01844cc8f4d4614537c428b116c224be6b8b346c
libPJL-1.2-src.tgz
Posted Aug 18, 2002
Authored by FX | Site phenoelit.de

PFT is a command line tool to directly communicate with network printers via the Printer Job Language (PJL) using port 9100. Features include full file system access (if installed on printer), environment variable "tuning" and setting of display messages. Platform: Windows and UNIX

tags | tool
systems | windows, unix
SHA-256 | 19747d97327258d03208b5006e9147231649a304fee583dc581d18ef6baf0bfa
Hijetter_exe.zip
Posted Aug 18, 2002
Authored by FX | Site phenoelit.de

Hijetter is a tool to directly communicate with network printers via the Printer Job Language (PJL) using port 9100. Features include full file system access (if installed on printer), environment variable "tuning" and setting of display messages. Platform: Windows

systems | windows
SHA-256 | 3870af38a82823a2f1b72b6532bf696db9adafcf89ddb164ecf54c2ac08bfe60
UltimaRatioVegas.c
Posted Aug 18, 2002
Authored by FX | Site phenoelit.de

Phenoelit Ultima Ratio - a Cisco IOS exploitation of a heap overflow and using actual shell code to upload a new config; all in one UDP packet. Exploits an issue in the 11.x IOS TFTP server. Works against Cisco 1600 and 1000 series routers, but is designed as PoC.

tags | exploit, overflow, shell, udp
systems | cisco
SHA-256 | 92eb69ddc50d86688f9ebbb871a850bff12e6f794515a11f2eee91463a3708c2
irpas_0.10.tar.gz
Posted Jan 11, 2002
Authored by FX | Site phenoelit.de

IRPAS is a suite of routing protocol attack tools which sends custom routing protocol packets from the unix command line. It is very useful for searching for new routing protocol vulnerabilities. Included is a tool for sending Cisco Discovery Protocol (CDP) messages, one for injecting IGRP routes, and a scanner for IGRP autonomous systems. Documentation available here.

tags | vulnerability, protocol
systems | cisco, unix
SHA-256 | 6fd6dd1b5ca7eb5e3d6f2d12608a58741756eb2b080c577a322a31af1150b1ce
routing.pdf
Posted Jul 21, 2001
Authored by FX | Site phenoelit.de

Slides for FX's talk at Defcon 2001 on attacking routing protocols.

tags | paper, protocol
SHA-256 | 68e73b3a5647139ae2a8b7ceb88bc2723866a295c5fdd1b4e948cc7d7e738e78
vippr1_1.2.tar.gz
Posted Jul 20, 2001
Authored by FX | Site phenoelit.de

VIPRR 1.1 is the first public beta of a concept study of attack routers. It's a userland virtual router which can be used together with any routing protocol attack tools. One of the most interesting features is the ability to inject packets into GRE tunnels and therefore making it possible to perform the RFC1918 hacking attacks described in gre.html without modification of the tools.

tags | protocol
systems | unix
SHA-256 | f1543db4d953ccae8605fd93c2a39617d3e5693a1ebfb2bae6ca957a517416e9
irpas_0.8.tar.gz
Posted Jul 11, 2001
Authored by FX | Site phenoelit.de

IRPAS is a suite of routing protocol attack tools which sends custom routing protocol packets from the unix command line. It is very useful for searching for new routing protocol vulnerabilities. Included is a tool for sending Cisco Discovery Protocol (CDP) messages, one for injecting IGRP routes, and a scanner for IGRP autonomous systems. Documentation available here.

tags | vulnerability, protocol
systems | cisco, unix
SHA-256 | 137b8a73f18383a037c5e6af51cfe6d29c72f38628bd5ce38f1864cf91a8e559
gre.pdf.gz
Posted Dec 23, 2000
Authored by FX | Site phenoelit.de

This paper describes a possible way to attack hosts with RFC1918 IP addresses behind GRE Tunnels over the Internet.

tags | paper, protocol
SHA-256 | f56cd653e16527b61bea075fcdd9e9bd1e145226aa80c22f2f48ba8f4bdd083a
vnx4.c
Posted Sep 18, 2000
Authored by FX | Site phenoelit.de

vnx4.c is a VNC attack program ported to Windows. Features cracking of the password in the registry, online brute force against VNC server or cracking a sniffed challange/response handshake.

tags | cracker, registry
systems | windows
SHA-256 | a507db549f33869781e20c6631dc821d6eba0651c0cbad494ae78e1b0e831359
wci.c
Posted Jul 5, 2000
Authored by FX | Site phenoelit.de

WCI for Windows is a simple ARP connection interceptor for switched networks and especially for SMB, based on here.

tags | tool, sniffer
systems | windows
SHA-256 | fda9e331bce9095af5cf2eee122fa2031fe096d14e3317387a039576396e2b49
ARP0c2.c
Posted Jun 26, 2000
Authored by FX | Site phenoelit.de

ARP0c2.c - ARP0c2 is a simple and powerful connection interceptor for switched networks. It features ARP redirection/spoofing, automated bridging, automated routing, progressive attacks of known IP connections, network cleanup on exit, and ARP flooding with random IP and Ethernet addresses. Known network connections can be intercepted by adding them to the routing table file. It is complely userland and tested on Linux.

tags | spoof
systems | linux, unix
SHA-256 | d0dc915dfa26416aae4f90e45c03ddb5d999877e247e02f827d45f062098954e
cd00r.c
Posted Jun 13, 2000
Authored by FX | Site phenoelit.de

cd00r.c is a proof of concept code to test the idea of a completely invisible (read: not listening) backdoor server. Standard backdoors and remote access services have one major problem - the port's they are listening on are visible on the system console as well as from outside (by port scanning). To activate the remote access service, one has to send several packets (TCP SYN) to ports on the target system. Which ports in which order and how many of them can be defined in the source code.

tags | tool, remote, tcp, rootkit, proof of concept
systems | unix
SHA-256 | 2f73a801f48ec39376a23f69b2bdec44c0cc0dc7e9174c8d108cec34d41d0da7
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close