After successful attack, network traffic from the target to an arbitrary IP address can be redirected.
This module implements the SMB Relay attack to install an agent in the target machine.
This module implements the SMB Relay attack to install an agent in the target machine.
Microsoft Windows is prone to a vulnerability that may allow a DLL file to be automatically loaded because the software fails to handle LNK files properly. Specifically, the issue occurs when loading the icon of a shortcut file. A specially crafted LNK file can cause Windows to automatically execute code that is specified by the shortcut file. The attacker must entice a victim into viewing a specially crafted shortcut. The shortcut file and the associated binary may be delivered to a user through removable drives. An attacker may exploit this issue to execute arbitrary code. This vulnerability is the result of an incomplete fix for MS10-046 (CVE-2010-2568).
This module exploits a vulnerability in Java Bridge component of Zend Server.
This module exploits a remote stack-based buffer overflow in Yokogawa CS3000 by sending a malformed packet to the 20010/UDP port.
This module exploits a stack based buffer overflow in Yokogawa CENTUM CS 3000 by using its BKHOdeq.exe service. The BKHOdeq.exe service, started when running the FCS / Test Function listens by default on TCP/20109, TCP/20171 and UDP/1240. By sending a specially crafted packet to the port TCP/20171 its possible to trigger a stack based buffer overflow which allows execution of arbitrary code with the privileges of the CENTUM user.
This module exploits a remote stack-based buffer overflow in Yokogawa CS3000 by sending a malformed packet to the 52302/UDP port.
This module exploits a stack based buffer overflow in Yokogawa CENTUM CS 3000 by using its BKBCopyD.exe service. The Yokogawa Centum CS3000 solution uses different services in order to provide all its functionality. The BKBCopyD.exe service, started when running the FCS / Test Function, listens by default on TCP/20111. By sending a specially crafted packet to the port TCP/20111, it it is possible to trigger a stack based buffer overflow which allows execution of arbitrary code with the privileges of the CENTUM user.
This module shuts down the XM Easy Personal FTP server.
Pagination
- Previous page
- Page 85
- Next page