Chaos Computer Club breaks Apple TouchID

by admin

Sunday, September 22nd, 2013 at 3:11 pm

Using a technique he outlined over 10 years ago, starbug from CCC has broken the biometric lock on the new iPhone.
Source: ccc.de

Plesk Apache 0day by KingCope

by admin

Wednesday, June 5th, 2013 at 12:20 pm

KingCope’s 0day perl scripts for Parallels Plesk :: pleskwwwzeroday :: Affected and tested: Plesk 9.5.4 — remote PHP Code Execution

WCE v1.4beta x32/x64/universal has been released.

by admin

Friday, May 31st, 2013 at 2:30 pm

Download links:
wce_v1_4beta_universal.zip
wce_v1_4beta_x64.zip
wce_v1_4beta_x32.zip

Changelog:

version 1.4beta:
May 30, 2013
* Several Bug Fixes
* Windows 8 support
* “Universal Binary” (single executable with both versions. Detects at
runtime if it is running on a 32 bit or 64 bit version of Windows, dumps
the appropriate version of WCE and executes it)

MySQL, FreeSSHD , FreeFTPD 0days

by admin

Saturday, December 1st, 2012 at 5:37 pm

Kingcope was busy today dropping some new 0days for MySQL, FreeSSHD, & FreeFTPD
check em out
MySQL 5.1/5.5 WiNDOWS REMOTE R00T
MySQL Windows Remote System Level Exploit (Stuxnet technique)
MySQL (Linux) Database Privilege Elevation
MySQL (Linux) Heap Based Overrun
FreeSSHD Remote Authentication Bypass
FreeFTPD Remote Authentication Bypass

x64 Sysret Vulnerability POC

by admin

Sunday, August 26th, 2012 at 11:15 pm

@ponez released his POC code for the MS12-042 flaw on his website

You can snag the POC source and exe ::HERE::

RDP Nuke

by admin

Wednesday, March 21st, 2012 at 12:55 pm

Just a little tool that will BSOD a machine vulnerable to MS12-020. Tested on XP sp3 & Win2k3 Sp2. Download ::HERE::

New Startup Method?

by admin

Monday, June 27th, 2011 at 10:06 am

Nick Harbour wrote on his blog about new spyware using fxsst.dll which is present on the system when the system is running as a Fax server. Seems the explorer.exe automatically loads the dll when logging on. Mubix decided to test this out with a .dll generated in Metasploit and it worked every time on his test system (WinXP) but Win7 64bit was still having issues with the dll he generated.

TL;DR – Take any malware DLL, name it fxsst.dll and drop it in C:\WINDOWS or the System32 folder and Explorer.exe will load it at boot time.

bitcoin_jacker.rb

by admin

Monday, June 20th, 2011 at 10:41 pm

Just submitted my first attempt to write something for Metasploit @ dev.metasploit.com. It jacks victim’s bitcoin wallets on windows boxes and sends them back to attacker on meterpreter. saves wallet in your loot folder, on windows it would be %userprofile%\.msf3\loot on nix it would be /root/.msf3/loot

Hidden Comcast Modem User

by illwill

Monday, February 7th, 2011 at 3:18 pm

Seems Comcast has a hidden admin user account on their business class modems other than the usual user:cusadmin-pw:highspeed. You can log in locally using the username mso and password: D0nt4g3tme . Furthermore you can also use Cross Site Request Forgery in iframes to set the modem to open up its remote admin ports to all IP’s not just the ones Comcast has preconfigured. If you wanna test this out you can visit this URL http://illmob.org/comcast BEWARE, if you are on vulnerable Comcast modem it will open remote access to your modem on http port 80, https port 8181 and telnet 2323.

Props to the guys @ Trustwave for the iframe POC.

Stuxnet exploit code released

by illwill

Thursday, January 13th, 2011 at 11:54 am

Used by Stuxnet to escalate privs in win2k and XP Explanation of the code ::here:: and source code ::here::

IP: Loading... - Host: Loading...
IP Geolocation: unknown.

We love our country, but fear our government.