science and technology Scapy Packet Manipulation Tool 2.4.3 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:38:28 GMT Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc. Full Article
science and technology Wapiti Web Application Vulnerability Scanner 3.0.2 By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:02 GMT Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. Full Article
science and technology XSSer Penetration Testing Tool 1.8-1 By packetstormsecurity.com Published On :: Mon, 23 Sep 2019 20:04:03 GMT XSSer is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. Full Article
science and technology XSSer Penetration Testing Tool 1.8-2 By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:16:36 GMT XSSer is an open source penetration testing tool that automates the process of detecting and exploiting XSS injections against different applications. It contains several options to try to bypass certain filters, and various special techniques of code injection. Full Article
science and technology Bing.com Hostname / IP Enumerator 1.0 By packetstormsecurity.com Published On :: Tue, 19 Nov 2019 15:21:05 GMT This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget. Full Article
science and technology TestSSL 3.0rc6 By packetstormsecurity.com Published On :: Wed, 11 Dec 2019 14:44:44 GMT testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets. Full Article
science and technology WebSploit Framework 4.0.1 By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 17:22:22 GMT WebSploit is an advanced man-in-the-middle framework. Full Article
science and technology Lulzbuster 1.0.0 By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 15:44:44 GMT Lulzbuster is a very fast and smart web directory and file enumeration tool written in C. Full Article
science and technology TestSSL 3.0 By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 17:04:50 GMT testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets. Full Article
science and technology Lulzbuster 1.1.0 By packetstormsecurity.com Published On :: Fri, 31 Jan 2020 15:42:11 GMT Lulzbuster is a very fast and smart web directory and file enumeration tool written in C. Full Article
science and technology EnumJavaLibs Java Classpath Enumerator By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 15:20:32 GMT EnumJavaLibs is a tool that can be used to discover which libraries are loaded (i.e. available on the classpath) by a remote Java application when it supports deserialization. Full Article
science and technology Lulzbuster 1.2.0 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 10:11:11 GMT Lulzbuster is a very fast and smart web directory and file enumeration tool written in C. Full Article
science and technology Wapiti Web Application Vulnerability Scanner 3.0.3 By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:41:20 GMT Wapiti is a web application vulnerability scanner. It will scan the web pages of a deployed web application and will fuzz the URL parameters and forms to find common web vulnerabilities. Full Article
science and technology Lulzbuster 1.3.2 By packetstormsecurity.com Published On :: Tue, 17 Mar 2020 13:18:24 GMT Lulzbuster is a very fast and smart web directory and file enumeration tool written in C. Full Article
science and technology Linux/x86 Reverse Shell NULL Free 127.0.0.1:4444 Shellcode By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 14:50:43 GMT 91 bytes small Linux/x86 reverse shell NULL free 127.0.0.1:4444 shellcode. Full Article
science and technology Linux/x86 execve /bin/sh Shellcode By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 14:52:09 GMT 25 bytes small Linux/x86 execve /bin/sh shellcode. Full Article
science and technology Linux/x86 execve(/bin/sh) Socket Reuse Shellcode By packetstormsecurity.com Published On :: Tue, 22 Oct 2019 17:18:16 GMT 42 bytes small Linux/x86 execve(/bin/sh) socket reuse shellcode. Full Article
science and technology Ubuntu Security Notice USN-4184-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:13 GMT Ubuntu Security Notice 4184-2 - USN-4184-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
science and technology Ubuntu Security Notice USN-4183-2 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:18 GMT Ubuntu Security Notice 4183-2 - USN-4183-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
science and technology Ubuntu Security Notice USN-4185-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:55:24 GMT Ubuntu Security Notice 4185-3 - USN-4185-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables are disabled or not supported. This update addresses both issues. Various other issues were also addressed. Full Article
science and technology Ubuntu Security Notice USN-4186-3 By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:56:10 GMT Ubuntu Security Notice 4186-3 - USN-4186-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 was incomplete on 64-bit Intel x86 systems. This update addresses the issue. Various other issues were also addressed. Full Article
science and technology 10Strike LANState 9.32 Host Check hostname Buffer Overflow By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:30:21 GMT 10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit. Full Article
science and technology Dismantling Megamos Crypto: Wirelessly Lockpicking A Vehicle Immobilizer By packetstormsecurity.com Published On :: Fri, 14 Aug 2015 13:02:14 GMT The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an anti-theft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper, the authors have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation. Full Article
science and technology RSA BSAFE Crypto Attacks / Denial Of Service By packetstormsecurity.com Published On :: Mon, 17 Aug 2015 16:07:08 GMT RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, SSL-J and SSL-C all suffer from various crypto, denial of service, and underflow vulnerabilities. Full Article
science and technology FreeBSD Security Advisory - ntp Authentication Bypass By packetstormsecurity.com Published On :: Mon, 26 Oct 2015 19:32:22 GMT FreeBSD Security Advisory - Crypto-NAK packets can be used to cause ntpd(8) to accept time from an unauthenticated ephemeral symmetric peer by bypassing the authentication required to mobilize peer associations. FreeBSD 9.3 and 10.1 are not affected. Various other issues have also been addressed. Full Article
science and technology Debian Security Advisory 3417-1 By packetstormsecurity.com Published On :: Mon, 14 Dec 2015 16:40:50 GMT Debian Linux Security Advisory 3417-1 - Tibor Jager, Jorg Schwenk, and Juraj Somorovsky, from Horst Gortz Institute for IT Security, published a paper in ESORICS 2015 where they describe an invalid curve attack in Bouncy Castle Crypto, a Java library for cryptography. An attacker is able to recover private Elliptic Curve keys from different applications, for example, TLS servers. Full Article
science and technology XMB - eXtreme Message Board 1.9.11.13 Weak Crypto / Insecure Password Storage By packetstormsecurity.com Published On :: Sat, 23 Jan 2016 13:03:33 GMT XMB - eXtreme Message Board version 1.9.11.13 suffers from weak crypto and insecure password storage vulnerabilities. Full Article
science and technology Debian Security Advisory 3457-1 By packetstormsecurity.com Published On :: Thu, 28 Jan 2016 17:19:51 GMT Debian Linux Security Advisory 3457-1 - Multiple security issues have been found in Iceweasel, Debian's version buffer overflow may lead to the execution of arbitrary code. In addition the bundled NSS crypto library addresses the SLOTH attack on TLS 1.2. Full Article
science and technology XOOPS 2.5.7.2 Weak Crypto By packetstormsecurity.com Published On :: Fri, 18 Mar 2016 22:22:22 GMT XOOPS version 2.5.7.2 uses weak one way hash crypto MD5 along with unsalted passwords stored in the database. Full Article
science and technology Apple Security Advisory 2016-03-21-7 By packetstormsecurity.com Published On :: Tue, 22 Mar 2016 15:23:11 GMT Apple Security Advisory 2016-03-21-7 - OS X Server 5.1 is now available and addresses RC4 crypto weaknesses, file access, and information disclosure vulnerabilities. Full Article
science and technology RSA BSAFE Lenstra's Attack By packetstormsecurity.com Published On :: Mon, 11 Apr 2016 22:06:11 GMT RSA BSAFE Micro Edition Suite, Crypto-C Micro Edition, Crypto-J, and SSL-J contain a fix to address Lenstra's attack. RSA BSAFE Micro Edition Suite (MES) 4.1.5, RSA BSAFE Crypto-C Micro Edition (CCME) 4.1.3, RSA BSAFE Crypto-J 6.2.1, and RSA BSAFE SSL-J 6.2.1 are affected. Full Article
science and technology RSA BSAFE Crypto-J Cryptography Failure By packetstormsecurity.com Published On :: Sat, 28 Jan 2017 05:05:55 GMT RSA BSAFE Crypto-J versions prior to 6.2.2 suffer from improper OCSP validation and PKCS#12 timing attack vulnerabilities. Full Article
science and technology Ubiquiti Networks UniFi Cloud Key Command Injection / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 27 Jul 2017 18:22:22 GMT Ubiquiti Networks UniFi Cloud Key with firmware versions 0.5.9 and 0.6.0 suffer from weak crypto, privilege escalation, and command injection vulnerabilities. Full Article
science and technology Ubuntu Security Notice USN-3199-3 By packetstormsecurity.com Published On :: Mon, 28 Aug 2017 21:11:00 GMT Ubuntu Security Notice 3199-3 - USN-3199-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. A It was discovered that the ALGnew function in block_templace.c in the A Python Cryptography Toolkit contained a heap-based buffer overflow A vulnerability. A remote attacker could use this flaw to execute A arbitrary code by using a crafted initialization vector parameter. Various other issues were also addressed. Full Article
science and technology Debian Security Advisory 3967-1 By packetstormsecurity.com Published On :: Fri, 08 Sep 2017 13:34:00 GMT Debian Linux Security Advisory 3967-1 - An authentication bypass vulnerability was discovered in mbed TLS, a lightweight crypto and SSL/TLS library, when the authentication mode is configured as 'optional'. A remote attacker can take advantage of this flaw to mount a man-in-the-middle attack and impersonate an intended peer via an X.509 certificate chain with many intermediates. Full Article
science and technology Key Reinstallation: Forcing Nonce Reuse In WPA2 By packetstormsecurity.com Published On :: Mon, 16 Oct 2017 13:34:29 GMT Whitepaper called Reinstallation Attacks: Forcing Nonce Reuse in WPA2. This research paper will be presented on at the Computer and Communications Security (CCS) conference on November 1, 2017. This paper details a flaw in the WPA2 protocol itself and most devices that makes use of WPA2 are affected. Full Article
science and technology Primefaces 5.x Remote Code Execution By packetstormsecurity.com Published On :: Thu, 18 Jan 2018 20:56:41 GMT This Metasploit module exploits an expression language remote code execution flaw in the Primefaces JSF framework. Primefaces versions prior to 5.2.21, 5.3.8 or 6.0 are vulnerable to a padding oracle attack, due to the use of weak crypto and default encryption password and salt. Full Article
science and technology Debian Security Advisory 4138-1 By packetstormsecurity.com Published On :: Thu, 15 Mar 2018 15:57:24 GMT Debian Linux Security Advisory 4138-1 - Several vulnerabilities were discovered in mbed TLS, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
science and technology Debian Security Advisory 4147-1 By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 22:23:00 GMT Debian Linux Security Advisory 4147-1 - Several vulnerabilities were discovered in PolarSSL, a lightweight crypto and SSL/TLS library, that allowed a remote attacker to either cause a denial-of-service by application crash, or execute arbitrary code. Full Article
science and technology Ubuntu Security Notice USN-3616-1 By packetstormsecurity.com Published On :: Tue, 03 Apr 2018 18:19:00 GMT Ubuntu Security Notice 3616-1 - It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Full Article
science and technology Ubuntu Security Notice USN-3616-2 By packetstormsecurity.com Published On :: Mon, 09 Apr 2018 16:41:45 GMT Ubuntu Security Notice 3616-2 - USN-3616-1 fixed a vulnerability in Python Crypto. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that Python Crypto incorrectly generated ElGamal key parameters. A remote attacker could possibly use this issue to obtain sensitive information. Various other issues were also addressed. Full Article
science and technology Ubuntu Security Notice USN-3727-1 By packetstormsecurity.com Published On :: Wed, 01 Aug 2018 18:32:00 GMT Ubuntu Security Notice 3727-1 - It was discovered that Bouncy Castle incorrectly handled certain crypto algorithms. A remote attacker could possibly use these issues to obtain sensitive information, including private keys. Full Article
science and technology RSA BSAFE Micro Edition Suite / Crypto-C Micro Edition Overflow / DoS By packetstormsecurity.com Published On :: Wed, 29 Aug 2018 00:30:11 GMT RSA BSAFE Micro Edition Suite and Crypto-C Micro Edition suffer from resource exhaustion, integer overflow, improper clearing of heap memory, covert timing channel, and buffer over-read vulnerabilities. Full Article
science and technology RSA BSAFE SSL-J / Crypto-J Heap Clearing / Timing Channel By packetstormsecurity.com Published On :: Fri, 07 Sep 2018 14:02:22 GMT RSA BSAFE SSL-J versions prior to 6.2.4 contain a heap inspection vulnerability that could allow an attacker with physical access to the system to recover sensitive key material. RSA BSAFE SSL-J versions prior to 6.2.4 contain a covert timing channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. A remote attacker may be able to recover a RSA key. RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a covert timing channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key. Full Article
science and technology Debian Security Advisory 4296-1 By packetstormsecurity.com Published On :: Tue, 18 Sep 2018 02:18:40 GMT Debian Linux Security Advisory 4296-1 - Two vulnerabilities were discovered in mbedtls, a lightweight crypto and SSL/TLS library which could result in plain text recovery via side-channel attacks. Full Article
science and technology Android Securty Research: Crypto Local Storage Attack By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 20:22:22 GMT Whitepaper called Android Security Research: Crypto Wallet Local Storage Attack. Full Article
science and technology Ubuntu Security Notice USN-3901-1 By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 18:08:40 GMT Ubuntu Security Notice 3901-1 - Jann Horn discovered that the userfaultd implementation in the Linux kernel did not properly restrict access to certain ioctls. A local attacker could use this possibly to modify files. It was discovered that the crypto subsystem of the Linux kernel leaked uninitialized memory to user space in some situations. A local attacker could use this to expose sensitive information. Various other issues were also addressed. Full Article
science and technology REVULN 19Q4 Call For Papers By packetstormsecurity.com Published On :: Thu, 15 Aug 2019 20:23:53 GMT The Call For Papers has been announced for REVULN 19Q4, an international cyber-security conference taking place December 11th and 12th, 2019 in Hong Kong at the Best Western Plus Hotel Hong Kong. Full Article
science and technology No cON Name 2019 Call For Papers By packetstormsecurity.com Published On :: Tue, 20 Aug 2019 22:21:33 GMT The No cON Name 2019 call for papers has been announced. It will be held in Barcelona, Spain, from November 14th and 15th, 2019. Full Article
science and technology BSidesLisbon 2019 Call For Papers By packetstormsecurity.com Published On :: Sat, 24 Aug 2019 10:21:11 GMT BSidesLisbon 2019 has announced its call for papers. It will be held November 28th and 29th at Auditorio FMD-UL. Full Article