what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from The Light Cosine

Email addressthelightcosine at gmail.com
First Active2010-11-11
Last Active2024-09-01
MySQL Authentication Bypass Password Dump
Posted Sep 1, 2024
Authored by jcran, The Light Cosine | Site metasploit.com

This Metasploit module exploits a password bypass vulnerability in MySQL in order to extract the usernames and encrypted password hashes from a MySQL server. These hashes are stored as loot for later cracking. Impacts MySQL versions: - 5.1.x before 5.1.63 - 5.5.x before 5.5.24 - 5.6.x before 5.6.6 And MariaDB versions: - 5.1.x before 5.1.62 - 5.2.x before 5.2.12 - 5.3.x before 5.3.6 - 5.5.x before 5.5.23.

tags | exploit, bypass
advisories | CVE-2012-2122
SHA-256 | e4032569995bd5ac99233c3cc5b3dcf8b3228b921415fd0e18c7acd6d8b4667e
SMBLoris NBSS Denial of Service
Posted Aug 31, 2024
Authored by The Light Cosine, Adam Cammack | Site metasploit.com

The SMBLoris attack consumes large chunks of memory in the target by sending SMB requests with the NetBios Session Service(NBSS) Length Header value set to the maximum possible value. By keeping these connections open and initiating large numbers of these sessions, the memory does not get freed, and the server grinds to a halt. This vulnerability was originally disclosed by Sean Dillon and Zach Harding. DISCALIMER: This Metasploit module opens a lot of simultaneous connections. Please check your systems ULIMIT to make sure it can handle it. This Metasploit module will also run continuously until stopped.

tags | exploit
SHA-256 | 3b62b3ed47ac0eea75e135130cfc0c18807acd5842d3195e3dd92869989b552b
OpenSSL DTLS ChangeCipherSpec Remote Denial of Service
Posted Aug 31, 2024
Authored by Jon Oberheide, The Light Cosine | Site metasploit.com

This Metasploit module performs a Denial of Service Attack against Datagram TLS in OpenSSL version 0.9.8i and earlier. OpenSSL crashes under these versions when it receives a ChangeCipherspec Datagram before a ClientHello.

tags | exploit, denial of service
advisories | CVE-2009-1386
SHA-256 | 05418ed3c03396287c42e510c7ff652415886ee0d6face71a6516fb6e30d0dde
ISC DHCP Zero Length ClientID Denial of Service Module
Posted Aug 31, 2024
Authored by sid, The Light Cosine | Site metasploit.com

This Metasploit module performs a Denial of Service Attack against the ISC DHCP server, versions 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1. It sends out a DHCP Request message with a 0-length client_id option for an IP address on the appropriate range for the dhcp server. When ISC DHCP Server tries to hash this value it exits abnormally.

tags | exploit, denial of service
advisories | CVE-2010-2156
SHA-256 | ba9a5d1214ff99e3e3422a52f1071968aadd8890883807556093d448e1ac9536
WinRM VBS Remote Code Execution
Posted Nov 6, 2012
Authored by The Light Cosine | Site metasploit.com

This Metasploit module uses valid credentials to login to the WinRM service and execute a payload. It has two available methods for payload delivery: Powershell 2.0 and VBS CmdStager. The module will check if Powershell 2.0 is available, and if so uses that method. Otherwise it falls back to the VBS Cmdstager which is less stealthy. IMPORTANT: If targeting an x64 system with the Powershell method you MUST select an x64 payload. An x86 payload will never return.

tags | exploit, x86
SHA-256 | 058f6afb598d02e80da84c0e4ea89c3ba856e987c8c0b5e3601f4daf16120377
Turbo FTP Server 1.30.823 PORT Overflow
Posted Oct 22, 2012
Authored by corelanc0d3r, Lincoln, The Light Cosine, Zhao Liang | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in the PORT command in Turbo FTP Server versions 1.30.823 and 1.30.826, which results in remote code execution under the context of SYSTEM.

tags | exploit, remote, overflow, code execution
advisories | OSVDB-85887
SHA-256 | abb8df5bd9e6fe13f397d60912333dbe638be84ba39c6009e9215a03bc909d53
Serv-U FTP Server Buffer Overflow
Posted Dec 2, 2011
Authored by The Light Cosine | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the site chmod command in versions of Serv-U FTP Server prior to 4.2. You must have valid credentials to trigger this vulnerability. Exploitation also leaves the service in a non-functional state.

tags | exploit, overflow
advisories | CVE-2004-2111
SHA-256 | 6c1771fcd160c66448baf1b278f2e301aaf7d1815e249d6528222c340620cafe
RealVNC Authentication Bypass
Posted Aug 26, 2011
Authored by H D Moore, The Light Cosine | Site metasploit.com

This Metasploit module exploits an Authentication Bypass Vulnerability in RealVNC Server version 4.1.0 and 4.1.1. It sets up a proxy listener on LPORT and proxies to the target server The AUTOVNC option requires that vncviewer be installed on the attacking machine. This option should be disabled for Pro.

tags | exploit, bypass
advisories | CVE-2006-2369, OSVDB-25479
SHA-256 | e04dfdae1c144c55bf3ae60b0db55de39d6d8b5d1ffc4b3506d87fa3c3c8e7c6
SmartFTP Saved Password Extraction
Posted Jun 20, 2011
Authored by The Light Cosine | Site metasploit.com

This Metasploit module finds saved login credentials for the SmartFTP FTP client for windows.

tags | exploit, info disclosure
systems | windows
SHA-256 | 97b107bd7fae0d3b8837548d34dcb302caadedc2441c45782f6a0584dc945b8b
Cforms II For WordPress CAPTCHA Bypass
Posted Dec 15, 2010
Authored by The Light Cosine

The Cforms II plugin for WordPress suffers from a CAPTCHA bypass vulnerability.

tags | advisory, bypass
SHA-256 | 9651927202406b32b942c8788261677321fc3d2a584e0a29325ea269b6706946
Ricoh Aficio Web Image Monitor 2.03 Cross Site Scripting
Posted Nov 11, 2010
Authored by The Light Cosine

Ricoh Aficio Web Image Monitor version 2.03 suffers from cross site scripting and redirection vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | 9cb8a3f297c5e5664ca6551ba861cee32ff3b727dc04c87fa31e1cc0c6f6332f
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close