All Hot News World. Public world blog, journal online reviewed.

x86 File, PacketStorm Security

RSS feed: x86 File, PacketStorm Security
Wed, 12 Dec 2018 04:56:48 GMT
x86 Files ≈ Packet Storm
Packet Storm - Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers [ + ]
Wed, 05 Dec 2018 01:22:22 GMT
Linux/x86 execve(/usr/bin/ncat -lvp 1337 -e /bin/bash) Shellcode
95 bytes small Linux/x86 execve(/usr/bin/ncat -lvp 1337 -e /bin/bash) null-free shellcode. [ + ]
Tue, 13 Nov 2018 10:11:11 GMT
Linux/x86 /usr/bin/head -n99 cat etc/passwd Shellcode
61 bytes small Linux/x86 /usr/bin/head -n99 cat etc/passwd shellcode. [ + ]
Wed, 24 Oct 2018 10:11:11 GMT
Linux/x86 Bind (99999/TCP) NetCat Traditional (/bin/nc) Shell (/bin/bash) Shellcode
58 bytes small Linux/x86 bind (99999/TCP) netcat traditional (/bin/nc) shell (/bin/bash) shellcode. [ + ]
Fri, 19 Oct 2018 23:33:18 GMT
Linux/x86 execve(/bin/cat /etc/ssh/sshd_config) Shellcode
44 bytes small Linux/x86 execve(/bin/cat /etc/ssh/sshd_config) shellcode. [ + ]
Thu, 18 Oct 2018 15:17:38 GMT
Microsoft Windows SetImeInfoEx Win32k NULL Pointer Dereference
This Metasploit module exploits an elevation of privilege vulnerability that exists in Windows 7 and 2008 R2 when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploits this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This Metasploit module is tested against windows 7 x86, windows 7 x64 and windows server 2008 R2 standard x64. [ + ]
Mon, 15 Oct 2018 17:02:02 GMT
Linux Semi-Arbitrary Task Stack Read On ARM64 / x86
Linux suffers from a semi-arbitrary task stack read on ARM64 (and x86) via /proc/$pid/stack. [ + ]
Mon, 08 Oct 2018 16:17:23 GMT
Solaris RSH Stack Clash Privilege Escalation
This Metasploit module exploits a vulnerability in RSH on unpatched Solaris systems which allows users to gain root privileges. The stack guard page on unpatched Solaris systems is of insufficient size to prevent collisions between the stack and heap memory, aka Stack Clash. This Metasploit module uploads and executes Qualys' Solaris_rsh.c exploit, which exploits a vulnerability in RSH to bypass the stack guard page to write to the stack and create a SUID root shell. This Metasploit module has offsets for Solaris versions 11.1 (x86) and Solaris 11.3 (x86). Exploitation will usually complete within a few minutes using the default number of worker threads (10). Occasionally, exploitation will fail. If the target system is vulnerable, usually re-running the exploit will be successful. This Metasploit module has been tested successfully on Solaris 11.1 (x86) and Solaris 11.3 (x86). [ + ]
Mon, 08 Oct 2018 02:22:22 GMT
ifwatchd Privilege Escalation
This Metasploit module attempts to gain root privileges on QNX 6.4.x and 6.5.x systems by exploiting the ifwatchd suid executable. ifwatchd allows users to specify scripts to execute using the '-A' command line argument; however, it does not drop privileges when executing user-supplied scripts, resulting in execution of arbitrary commands as root. This Metasploit module has been tested successfully on QNX Neutrino 6.5.0 (x86) and 6.5.0 SP1 (x86). [ + ]
Thu, 04 Oct 2018 20:22:22 GMT
Linux/x86 execve(/bin/sh) + MMX/ROT13/XOR Shellcode
104 bytes small Linux/x86 execve(/bin/sh) + MMX/ROT13/XOR shellcode (encoder/decoder). [ + ]
Tue, 25 Sep 2018 01:18:19 GMT
Linux/x86 execve(/bin/sh) + NOT +SHIFT-N+ XOR-N Encoded Shellcode
50 bytes small Linux/x86 execve(/bin/sh) + NOT +SHIFT-N+ XOR-N encoded shellcode. [ + ]
Thu, 20 Sep 2018 10:32:22 GMT
Solaris EXTREMEPARR dtappgather Privilege Escalation
This Metasploit module exploits a directory traversal vulnerability in the dtappgather executable included with Common Desktop Environment (CDE) on unpatched Solaris systems prior to Solaris 10u11 which allows users to gain root privileges. dtappgather allows users to create a user-owned directory at any location on the filesystem using the DTUSERSESSION environment variable. This Metasploit module creates a directory in /usr/lib/locale, writes a shared object to the directory, and runs the specified SUID binary with the shared object loaded using the LC_TIME environment variable. This Metasploit module has been tested successfully on: Solaris 9u7 (09/04) (x86); Solaris 10u1 (01/06) (x86); Solaris 10u2 (06/06) (x86); Solaris 10u4 (08/07) (x86); Solaris 10u8 (10/09) (x86); Solaris 10u9 (09/10) (x86). [ + ]
Tue, 18 Sep 2018 02:33:58 GMT
Linux/x86 Egghunter (0x50905090) + sigaction() Shellcode
27 bytes small Linux/x86 egghunter (0x50905090) + sigaction() shellcode. [ + ]
Fri, 14 Sep 2018 23:38:53 GMT
Solaris libnspr NSPR_LOG_FILE Privilege Escalation
This Metasploit module exploits an arbitrary file write vulnerability in the Netscape Portable Runtime library (libnspr) on unpatched Solaris systems prior to Solaris 10u3 which allows users to gain root privileges. libnspr versions prior to 4.6.3 allow users to specify a log file with the `NSPR_LOG_FILE` environment variable. The log file is created with the privileges of the running process, resulting in privilege escalation when used in combination with a SUID executable. This Metasploit module writes a shared object to the trusted library directory `/usr/lib/secure` and runs the specified SUID binary with the shared object loaded using the `LD_LIBRARY_PATH` environment variable. This Metasploit module has been tested successfully with libnspr version 4.5.1 on Solaris 10u1 (01/06) (x86) and Solaris 10u2 (06/06) (x86). [ + ]
Fri, 14 Sep 2018 23:37:45 GMT
Linux/x86 Random Bytewise XOR + Insertion Encoder Shellcode
54 bytes small Linux/x86 random bytewise XOR + insertion encoder shellcode. [ + ]
Fri, 14 Sep 2018 23:35:37 GMT
Linux/x86 File Modification(/etc/hosts) Polymorphic Shellcode
99 bytes small Linux/x86 file modification (/etc/hosts) polymorphic shellcode. [ + ]
Fri, 14 Sep 2018 23:34:21 GMT
Linux/x86 Read File (/etc/passwd) MSF Optimized Shellcode
61 bytes small Linux/x86 read file (/etc/passwd) MSF optimized shellcode. [ + ]
Fri, 31 Aug 2018 00:05:36 GMT
Linux/x86 Add User(r00t/blank) Polymorphic Shellcode
103 bytes small Linux/x86 add user (r00t/blank) polymorphic shellcode. [ + ]
Fri, 31 Aug 2018 00:04:22 GMT
Linux/x86 IPv6 Reverse TCP Shellcode Generator
94 bytes small Linux/x86 IPv6 reverse TCP shellcode generator. [ + ]
Wed, 15 Aug 2018 17:09:03 GMT
Linux/x86 Dual Network Stack (IPv4 and IPv6) Bind TCP Shellcode
Linux/x86 dual network stack (IPv4 and IPv6) bind TCP shellcode. [ + ]
Fri, 03 Aug 2018 05:55:55 GMT
FreeBSD Security Advisory - FreeBSD-SA-18:09.l1tf
FreeBSD Security Advisory - On certain Intel 64-bit x86 systems there is a period of time during terminal fault handling where the CPU may use speculative execution to try to load data. The CPU may speculatively access the level 1 data cache (L1D). Data which would otherwise be protected may then be determined by using side channel methods. This issue affects bhyve on FreeBSD/amd64 systems. An attacker executing user code, or kernel code inside of a virtual machine, may be able to read secret data from the kernel or from another virtual machine. [ + ]
Tue, 24 Jul 2018 01:11:11 GMT
Linux/x86 Reverse TCP (::FFFF:192.168.1.5:4444/TCP) Shell Shellcode
86 bytes small Linux/x86 reverse TCP (::FFFF:192.168.1.5:4444/TCP) shell (/bin/sh) + null-free + IPv6 shellcode. [ + ]
Mon, 09 Jul 2018 15:57:42 GMT
Linux/x86 TCP/4444 Bindshell Shellcode
100 bytes small Linux/x86 /bin/sh bindshell IPv6 TCP/4444 shellcode. [ + ]
Mon, 02 Jul 2018 18:17:45 GMT
Linux/x86 Kill Process Shellcode
20 bytes small Linux/x86 kill process shellcode. [ + ]
Thu, 31 May 2018 14:44:44 GMT
Linux/x86 Execve /bin/cat /etc/passwd Shellcode
37 bytes small Linux/x86 execve /bin/cat /etc/passwd shellcode. [ + ]

Linux/x86 TCP/4444 Bindshell Shellcode
105 bytes small Linux/x86 bindshell shellcode that spawns on TCP/4444. [ + ]
PacketStorm Security

Booking.com B.V. is based in Amsterdam in the Netherlands. Ready for some statistics? Our 1,534,024 properties, including 860,482 holiday rentals, are located in 123,105 destinations in 229 countries and territories, and are supported internationally by 198 offices in 70 countries.
2013 Copyright Techhap.com Mobile version 2015 | PeterLife & company
Skimlinks helps publishers monetize editorial content through automated affiliate links for products. Affiliate programm.
Link at is mandatory if site materials are using fully or particulary.
Were treated to the site administrator, a cup of coffee *https://paypal.me/peterlife
Yandex.ru