Links
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Filters

Untagged links
4 results tagged Vulnerability  ✕
Vulnerable By Design ~ VulnHub [www.vulnhub.com] https://www.vulnhub.com/
Wed May 22 11:12:45 2019 archive.org

pentest test hack vul

pentest test hack Vulnerability
The WIVET Coverage Ranking of Web Application Vulnerability Scanners - WAVSEP Benchmark 2014/2016 http://sectoolmarket.com/wivet-score-of-open-source-web-application-scanners.html
Fri Aug 11 20:32:24 2017 archive.org

The WIVET Score of Web Application Scanners

The current information is based on the results of the 2011/2012/2014/2016 benchmarks (excpet for entries marked as updated [Updated Benchmark Results!] or new [New Version/Product!] )

Last updated: 18/09/2016, Currently compares 27 scanners
Sorted in a descending order according to the scanner WIVET score and product name.
Hint: click the version link to get more information about each scanner evaluation, and the product name to get detailed information on the product.

Web Application Vulnerability Scanners
shellshocker https://shellshocker.net/
Mon Sep 29 11:36:14 2014 archive.org
thumbnail

shellshocker
What is #shellshock?

Shellshock (CVE-2014-6271, CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187) is a vulnerability in GNU's bash shell that gives attackers access to run remote commands on a vulnerable system. If your system has not updated bash in since Tue Sep 30 2014: 1:32PM EST (See patch history), you're most definitely vulnerable and have been since first boot. This security vulnerability affects versions 1.14 (released in 1994) to the most recent version 4.3 according to NVD.

You can use this website to test if your system is vulnerable, and also learn how to patch the vulnerability so you are no longer at risk for attack.

You can test if a system is vulnerable by using the form below. Just provide a http or https url and test away!
Url

Please test responsibly. All tests details are logged. Do not test against websites that you do not have permission to test against. All data is archived in case of abuse.

Here is an example script that is vulnerable. Place this in your /cgi-bin/shockme.cgi and try hitting it with the shock tester.

!/bin/bash

echo "Content-type: text/html"
echo ""
echo "https://shellshocker.net/"

Last updated Friday September 26th at 4:43PM EST: This website tester will now wait for a valid response before returning the state of the vulnerability. If the server responds with a 500 we assume you're vulnerable and we display the response immediately without waiting. If we get any other response code we will wait 3 seconds for a reply from your server and display if you're vulnerable or not.
Testing Your System

To test your system, you can simply run this one liner below to find if you're vulnerable.

curl https://shellshocker.net/shellshock_test.sh | bash

You can view the source of shellshock_test.sh on GitHub.

If you want to test each exploit individually without running the script above, feel free! They are listed below.
Exploit 1 (CVE-2014-6271)

There are a few different ways to test if your system is vulnerable to shellshock. Try running the following command in a shell.

env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see "vulnerable" you need to update bash. Otherwise, you should be good to go.
Exploit 2 (CVE-2014-7169)

Even after upgrading bash you may still be vulnerable to this exploit. Try running the following code.

env X='() { (shellshocker.net)=>\' bash -c "echo date"; cat echo; rm ./echo

If the above command outputs the current date (it may also show errors), you are still vulnerable.
Exploit 3 (???)

Here is another variation of the exploit. Please leave a comment below if you know the CVE of this exploit.

env X=' () { }; echo hello' bash -c 'date'

If the above command outputs "hello", you are vulnerable.
Exploit 4 (CVE-2014-7186)

bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' ||
echo "CVE-2014-7186 vulnerable, redir_stack"

A vulnerable system will echo the text "CVE-2014-7186 vulnerable, redir_stack".
Exploit 5 (CVE-2014-7187)

(for x in {1..200} ; do echo "for x$x in ; do :"; done; for x in {1..200} ; do echo done ; done) | bash ||
echo "CVE-2014-7187 vulnerable, word_lineno"

A vulnerable system will echo the text "CVE-2014-7187 vulnerable, word_lineno".
Exploit 6 (CVE-2014-6278)

shellshocker='() { echo You are vulnerable; }' bash -c shellshocker

You shouldn't see "You are vulnerable", if you're patched you will see "bash: shellshocker: command not found"
Exploit 7 (CVE-2014-6277)

bash -c "f() { x() { ;}; x() { ;} <<a; }" 2>/dev/null || echo vulnerable

If the command outputs "vulnerable", you are vulnerable.

If you've tested your system, please leave a comment below. Don't forget to include your bash version and what OS you're running. Type bash --version for bash, and cat /etc/release for your OS.

shellshocker unix linix vulnerability hack security Bash
Zero-day vulnerability in Windows XP being exploited via a malicious PDF file | LIVE HACKING http://www.livehacking.com/2013/12/03/xp-zero-day-vulnerability/
Tue Mar 4 09:37:22 2014 archive.org

Zero-day vulnerability in Windows XP being exploited via a malicious PDF file

Windows Xp Zero-day vulnerability PDF
1582 links, including 7 private
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn