what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 28 RSS Feed

Files from Jon Hart

Email addressjhart at spoofed.org
First Active2003-09-11
Last Active2024-09-01
Dahua DVR Authentication Bypass Scanner
Posted Sep 1, 2024
Authored by Jon Hart, Jake Reynolds, Tyler Bennett, Nathan McBride | Site metasploit.com

This Metasploit modules scans for Dahua-based DVRs and then grabs settings. Optionally resets a users password and clears the device logs.

tags | exploit
advisories | CVE-2013-6117
SHA-256 | d683a8a28f0f90df138b2d6d657877bb3a080df3e5aa099aed5198bca4b0c59c
BMC TrackIt! Unauthenticated Arbitrary User Password Change
Posted Sep 1, 2024
Authored by Jon Hart, bperry | Site metasploit.com

This Metasploit module exploits a flaw in the password reset mechanism in BMC TrackIt! 11.3 and possibly prior versions. If the password reset service is configured to use a domain administrator (which is the recommended configuration), then domain credentials can be reset (such as domain Administrator).

tags | exploit
advisories | CVE-2014-8270
SHA-256 | a7ccb5a05659f5e2d5a8a2656da3df1b76d134f385ed2af2ebd215f40f8e2be3
Allegro Software RomPager Misfortune Cookie (CVE-2014-9222) Scanner
Posted Sep 1, 2024
Authored by Jon Hart, Lior Oppenheim | Site metasploit.com

This Metasploit module scans for HTTP servers that appear to be vulnerable to the Misfortune Cookie vulnerability which affects Allegro Software Rompager versions before 4.34 and can allow attackers to authenticate to the HTTP service as an administrator without providing valid credentials.

tags | exploit, web
advisories | CVE-2014-9222
SHA-256 | f5325c099a2a6f868b0add3ecba9e70079e5c190a18ffa2af11053a5503c9a99
HTTP Git Scanner
Posted Sep 1, 2024
Authored by Jon Hart, Nixawk | Site metasploit.com

This Metasploit module can detect situations where there may be information disclosure vulnerabilities that occur when a Git repository is made available over HTTP.

tags | exploit, web, vulnerability, info disclosure
SHA-256 | f3fc66ff62ad13f3081bddfba7d9e771214b26ddbd974bf809d56a802a53e08c
NTP Mode 7 GET_RESTRICT DRDoS Scanner
Posted Sep 1, 2024
Authored by Jon Hart | Site metasploit.com

This Metasploit module identifies NTP servers which permit "reslist" queries and obtains the list of restrictions placed on various network interfaces, networks or hosts. The reslist feature allows remote attackers to cause a distributed, reflected denial of service (aka, "DRDoS" or traffic amplification) via spoofed requests. The more interfaces, networks or hosts with specific restrictions, the greater the amplification. requests.

tags | exploit, remote, denial of service, spoof
advisories | CVE-2013-5211
SHA-256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
NTP Mode 7 PEER_LIST Denial Of Service Scanner
Posted Sep 1, 2024
Authored by Jon Hart | Site metasploit.com

This Metasploit module identifies NTP servers which permit "PEER_LIST" queries and return responses that are larger in size or greater in quantity than the request, allowing remote attackers to cause a distributed, reflected denial of service (aka, "DRDoS" or traffic amplification) via spoofed requests.

tags | exploit, remote, denial of service, spoof
advisories | CVE-2013-5211
SHA-256 | 9dfdd6362ada7e294f99ddd5c8abe65523f723f708642b5a832419873fc8e44b
NTP Mode 6 UNSETTRAP DRDoS Scanner
Posted Aug 31, 2024
Authored by Jon Hart | Site metasploit.com

This Metasploit module identifies NTP servers which permit mode 6 UNSETTRAP requests that can be used to conduct DRDoS attacks. In some configurations, NTP servers will respond to UNSETTRAP requests with multiple packets, allowing remote attackers to cause a distributed, reflected denial of service (aka, "DRDoS" or traffic amplification) via spoofed requests.

tags | exploit, remote, denial of service, spoof
advisories | CVE-2013-5211
SHA-256 | 31621f3b6adf84cb730b81f9bedd0d5ea28c3b18ec44bdae7f848cc723eb9ddb
NTP Mode 7 PEER_LIST_SUM Denial Of Service Scanner
Posted Aug 31, 2024
Authored by Jon Hart | Site metasploit.com

This Metasploit module identifies NTP servers which permit "PEER_LIST_SUM" queries and return responses that are larger in size or greater in quantity than the request, allowing remote attackers to cause a distributed, reflected denial of service (aka, "DRDoS" or traffic amplification) via spoofed requests.

tags | exploit, remote, denial of service, spoof
advisories | CVE-2013-5211
SHA-256 | 273e8598ce4a789ce6d57d34e58ef98d7869ba325e655e50c1718bbe3ecde008
NTP Clock Variables Disclosure
Posted Aug 31, 2024
Authored by Jon Hart | Site metasploit.com

This Metasploit module reads the system internal NTP variables. These variables contain potentially sensitive information, such as the NTP software version, operating system version, peers, and more.

tags | exploit
advisories | CVE-2013-5211
SHA-256 | e16cfa3e8bfd6d9000e68d4cbf6b3255490ec60c03ecb58123181f76af392248
NTP Mode 6 REQ_NONCE DRDoS Scanner
Posted Aug 31, 2024
Authored by Jon Hart | Site metasploit.com

This Metasploit module identifies NTP servers which permit mode 6 REQ_NONCE requests that can be used to conduct DRDoS attacks. In some configurations, NTP servers will respond to REQ_NONCE requests with a response larger than the request, allowing remote attackers to cause a distributed, reflected denial of service (aka, "DRDoS" or traffic amplification) via spoofed requests.

tags | exploit, remote, denial of service, spoof
advisories | CVE-2013-5211
SHA-256 | 7c04588bd861a077918678e95f126ec5037b6e8df43ffb7afd4db2bd791c1733
NTP NAK To The Future
Posted Aug 31, 2024
Authored by Jon Hart, Matthew Van Gundy | Site metasploit.com

Crypto-NAK packets can be used to cause ntpd to accept time from unauthenticated ephemeral symmetric peers by bypassing the authentication required to mobilize peer associations. This Metasploit module sends these Crypto-NAK packets in order to establish an association between the target ntpd instance and the attacking client. The end goal is to cause ntpd to declare the legitimate peers "false tickers" and choose the attacking clients as the preferred peers, allowing these peers to control time.

tags | exploit, crypto
advisories | CVE-2015-7871
SHA-256 | 6e2bb149f0c9a147fad33b95c5cfbcc5e8373753ed367acdeb9fa2b34bc84d4a
Memcached Stats Amplification Scanner
Posted Aug 31, 2024
Authored by Jon Hart, xistence, Marek Majkowski | Site metasploit.com

This Metasploit module can be used to discover Memcached servers which expose the unrestricted UDP port 11211. A basic "stats" request is executed to check if an amplification attack is possible against a third party.

tags | exploit, udp
advisories | CVE-2018-1000115
SHA-256 | cb5539054159e5bd7eb5991e8ba1abaed61e1b1644670a36b4815d24c61a9cab
UDP Amplification Scanner
Posted Aug 31, 2024
Authored by Jon Hart | Site metasploit.com

Detect UDP endpoints with UDP amplification vulnerabilities.

tags | exploit, udp, vulnerability
advisories | CVE-2013-5211
SHA-256 | 4b266aac321033bf9bd912f59c5fbdf160afa5b657e7351b0616cbfb0a87e10b
Gather Steam Server Information
Posted Aug 31, 2024
Authored by Jon Hart | Site metasploit.com

This Metasploit module uses the A2S_INFO request to obtain information from a Steam server.

tags | exploit
SHA-256 | 89416cc9f5e46168342e202b91b47b3ba9094801247b2522d376fc12181782f1
Gather Quake Server Information
Posted Aug 31, 2024
Authored by Jon Hart | Site metasploit.com

This Metasploit module uses the getstatus or getinfo request to obtain information from a Quakeserver.

tags | exploit
SHA-256 | fd233ad07c22d603334cbcada818c4cd262bc96c7e0eafee383c9bd9e61e7adf
Gather Kademlia Server Information
Posted Aug 31, 2024
Authored by Jon Hart | Site metasploit.com

This Metasploit module uses the Kademlia BOOTSTRAP and PING messages to identify and extract information from Kademlia speaking UDP endpoints, typically belonging to eMule/eDonkey/BitTorrent servers or other P2P applications.

tags | exploit, udp
SHA-256 | eba8248b7c5e0ccdd26ca05535b352545a47360c55fc0541e56ac36a0e461848
Allegro Software RomPager Misfortune Cookie (CVE-2014-9222) Authentication Bypass
Posted Aug 31, 2024
Authored by Jon Hart, Lior Oppenheim, Jan Trencansky | Site metasploit.com

This Metasploit module exploits HTTP servers that appear to be vulnerable to the Misfortune Cookie vulnerability which affects Allegro Software Rompager versions before 4.34 and can allow attackers to authenticate to the HTTP service as an administrator without providing valid credentials.

tags | exploit, web
advisories | CVE-2014-9222
SHA-256 | 397a14e1799d7f29f991075a7b227de69b477aeefbd81dc616540afd824f32f9
OpenSSL DTLS Fragment Buffer Overflow / Denial of Service
Posted Aug 31, 2024
Authored by Jon Hart, Juri Aedla | Site metasploit.com

This Metasploit module performs a Denial of Service Attack against Datagram TLS in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h. This occurs when a DTLS ClientHello message has multiple fragments and the fragment lengths of later fragments are larger than that of the first, a buffer overflow occurs, causing a DoS.

tags | exploit, denial of service, overflow
advisories | CVE-2014-0195
SHA-256 | 3023cf9a58641d5922cae912d868a29c9ca9eb329848caceca34c97ea3b4b14a
at(1) Persistence Module
Posted Dec 22, 2016
Authored by Jon Hart | Site metasploit.com

This Metasploit module achieves persistence by executing payloads via at(1).

tags | exploit
SHA-256 | eec5ec5ef01a82dae2c5cd893e51333a0196cb32b3048342445a1aa8c944a00f
F5 iControl iCall::Script Root Command Execution
Posted Nov 19, 2015
Authored by Jon Hart, Tom | Site metasploit.com

This Metasploit module exploits an authenticated privilege escalation vulnerability in the iControl API on the F5 BIG-IP LTM (and likely other F5 devices). This requires valid credentials and the Resource Administrator role. The exploit should work on BIG-IP 11.3.0 - 11.6.0, (11.5.x < 11.5.3 HF2 or 11.6.x < 11.6.0 HF6, see references for more details).

tags | exploit
advisories | CVE-2015-3628
SHA-256 | f329ba79799be3587e190db0a03ebd17f524e5bca267576582b6c1d628f1c3ce
Malicious Git And Mercurial HTTP Server For CVE-2014-9390
Posted Jan 2, 2015
Authored by Jon Hart | Site metasploit.com

This Metasploit module exploits CVE-2014-9390, which affects Git (versions less than 1.8.5.6, 1.9.5, 2.0.5, 2.1.4 and 2.2.1) and Mercurial (versions less than 3.2.3) and describes three vulnerabilities.

tags | exploit, vulnerability
advisories | CVE-2014-9390
SHA-256 | 36d1712be284842da277dc56d61894ebadaefded1087a47ec4a5fe7a5c521ad3
Adobe ColdFusion APSB13-03 Command Execution
Posted Apr 10, 2013
Authored by Jon Hart | Site metasploit.com

This Metasploit module exploits a pile of vulnerabilities in Adobe ColdFusion APSB13-03 including arbitrary command execution in scheduleedit.cfm (9.x only), directory traversal, and authentication bypass issues.

tags | exploit, arbitrary, vulnerability
advisories | CVE-2013-0625, CVE-2013-0629, CVE-2013-0631, CVE-2013-0632
SHA-256 | fc81458d632a151d75dbee734ef554512dc7bbdc7f0bfbae5d6c44fcafa675bf
etherleak.txt
Posted Mar 24, 2007
Authored by Jon Hart | Site spoofed.org

Ethernet device drivers frame padding information leakage exploit.

tags | exploit
SHA-256 | 9ae933732d77ccfa5d3fe1968e818678cd2d78a76c646d90e1bcc999d19d34b7
nortel-sh.txt
Posted Feb 24, 2007
Authored by Jon Hart

Nortel SSL VPN Linux Client versions 6.0.3 and below local privilege escalation exploit.

tags | exploit, local
systems | linux
SHA-256 | 9c95beab9a1a6800137bcdbd9e39045411aaf4de0ddea50b74e4cab410e371e1
Cisco MARS Remote Command Execution In Jboss
Posted Jul 24, 2006
Authored by Jon Hart

Cisco/Protego CS-MARS remote command execution and system compromise exploit that makes use of an insecure JBoss installation in CS-MARS versions below 4.2.1.

tags | exploit, remote
systems | cisco
SHA-256 | 54fe66cacd7116d763993ab2281815e624610e13a10347c112c62d30699df620
Page 1 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close