«
Expand/Collapse
122 items tagged "backdoor"
Related tags:
patch [+],
openssh [+],
vulnerability [+],
exploits [+],
vmware [+],
unauthorized access [+],
mybb [+],
command execution [+],
command [+],
code execution [+],
whitepaper [+],
unauthorized [+],
sebastian krahmer [+],
sebastian [+],
root password [+],
privilege elevation [+],
nec [+],
krahmer [+],
high bandwidth [+],
administrative account [+],
wordpress [+],
version [+],
user [+],
unrealircd [+],
txt [+],
telesis [+],
tar gz [+],
tar bz2 [+],
syrian [+],
source php [+],
source package [+],
source [+],
software version [+],
small [+],
secret backdoors [+],
samsung printer [+],
samsung [+],
ruggedcom [+],
ros [+],
rom [+],
python [+],
privilege escalation vulnerability [+],
printer [+],
port 4444 [+],
piwik [+],
php shell [+],
php code [+],
photo [+],
performance servers [+],
os x x86 [+],
netopia routers [+],
netopia router [+],
netopia [+],
netcatphpshell [+],
msa [+],
mini [+],
mac address [+],
mac [+],
horde [+],
file upload [+],
escalation [+],
epractize [+],
eircom [+],
dsr [+],
divulges [+],
device [+],
day [+],
database access [+],
d link [+],
component version [+],
bind [+],
archive [+],
allied telesis [+],
allied [+],
administrator account [+],
admin account [+],
admin [+],
account [+],
Software [+],
12 months [+],
xerox workcentre [+],
web [+],
usernames and passwords [+],
useresponse [+],
unreal ircd [+],
unreal [+],
tmp [+],
technology [+],
tcp [+],
sniffed [+],
security suites [+],
root shell [+],
root [+],
rfid readers [+],
proftpd [+],
os x [+],
next [+],
mysql [+],
metasploit [+],
manipulations [+],
logs [+],
linux [+],
ircd [+],
installing [+],
indrajith [+],
generation [+],
forgery [+],
code [+],
capabilities [+],
backdoors [+],
application [+],
alien technology [+],
alien [+],
active directory [+],
accessing [+],
zte [+],
xerox [+],
wisdom [+],
windows [+],
wellintech [+],
weevely [+],
webapps [+],
web interface [+],
web gateway [+],
vsftpd [+],
uses [+],
userland [+],
udp [+],
tutorial [+],
trojan horse [+],
trojan [+],
targets [+],
tar [+],
takeover [+],
symantec web [+],
symantec [+],
switches [+],
suggestion [+],
spooks [+],
something [+],
silicon [+],
setup [+],
servers [+],
sec [+],
scripts [+],
rootkit [+],
rim [+],
response [+],
researchers [+],
remote access [+],
read [+],
rce [+],
ralf philipp [+],
ppc [+],
port [+],
platform [+],
payload [+],
page targets [+],
multi [+],
milspec [+],
metsvc [+],
memory [+],
malware [+],
mac trojan [+],
lookup [+],
lan [+],
kingview [+],
keyboard scan [+],
java server page [+],
java [+],
itsecteam [+],
invisible [+],
injection [+],
http referer [+],
hpux [+],
hey guys [+],
hacking [+],
foundry [+],
focusedbeams [+],
fixed [+],
firmware [+],
find [+],
exploit [+],
energizer [+],
encode [+],
edgecore [+],
duo [+],
disguised [+],
databases [+],
database [+],
darkudpd [+],
darknet [+],
controller firmware [+],
controller [+],
consult [+],
command line interface [+],
com [+],
chaos communication congress [+],
bugtraq [+],
buffer overflow [+],
battery charger [+],
bandwidth [+],
avira [+],
authentication [+],
apple ipad [+],
administrative [+],
accton based [+],
access [+],
Pentesting [+],
Newbie [+],
Area [+],
php [+],
shell [+]
-
-
10:22
»
Packet Storm Security Recent Files
This patch is for openssh-6.0p1 source which combines a known openssh backdoor and Sebastian Krahmer's openssh.reverse capabilities. Telnet to target openssh server and issue udc_gamai_magic string for getting reverse openssh connection.
-
10:22
»
Packet Storm Security Misc. Files
This patch is for openssh-6.0p1 source which combines a known openssh backdoor and Sebastian Krahmer's openssh.reverse capabilities. Telnet to target openssh server and issue udc_gamai_magic string for getting reverse openssh connection.
-
-
17:00
»
SecuriTeam
WellinTech KingView is prone to an unauthorized-access vulnerability due to a backdoor in all versions of the application.
-
-
12:22
»
Packet Storm Security Exploits
Useresponse versions 1.0.2 and below suffer from a backdoor account, cross site request forgery, and code execution vulnerabilities. Full exploit provided.
-
12:22
»
Packet Storm Security Recent Files
Useresponse versions 1.0.2 and below suffer from a backdoor account, cross site request forgery, and code execution vulnerabilities. Full exploit provided.
-
-
21:48
»
SecDocs
Authors:
Ralf-Philipp Weinmann Tags:
backdoor embedded Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Want to persistently backdoor a laptop? Backdooring the BIOS is out of the question since your target can dump and diff it? Planting hardware is out of the question as well? Shhhhhhh.. I have something for you: Embedded controllers are present in every modern laptop, yet their security impact has been unresearched thus far. An embedded controller has access to the complete stream of keyboard scan codes, can control fans and the battery charging process. Backdooring the embedded controller is a powerful way to plant a persistent firmware keylogger that works in a cross-platform fashion. Since ECs usually also provide battery and temperature sensor readings through ACPI, there also exists a way to funnel out the keystroke data through a low-privilege process later. Some laptops even allow EC controller firmware updates over the LAN! I will present a PoC backdoor for a widespread series of laptops and show you how to defend yourself against this attack by dumping the EC firmware yourself.
-
-
10:22
»
Packet Storm Security Exploits
An undocumented backdoor account exists within all released versions of RuggedCom's Rugged Operating System (ROS®). The username for the account, which cannot be disabled, is "factory" and its password is dynamically generated based on the device's MAC address. Multiple attempts have been made in the past 12 months to have this backdoor removed and customers notified. Exploit included.
-
10:22
»
Packet Storm Security Recent Files
An undocumented backdoor account exists within all released versions of RuggedCom's Rugged Operating System (ROS®). The username for the account, which cannot be disabled, is "factory" and its password is dynamically generated based on the device's MAC address. Multiple attempts have been made in the past 12 months to have this backdoor removed and customers notified. Exploit included.
-
10:22
»
Packet Storm Security Misc. Files
An undocumented backdoor account exists within all released versions of RuggedCom's Rugged Operating System (ROS®). The username for the account, which cannot be disabled, is "factory" and its password is dynamically generated based on the device's MAC address. Multiple attempts have been made in the past 12 months to have this backdoor removed and customers notified. Exploit included.
-
-
19:27
»
Packet Storm Security Exploits
This Metasploit module exploits an arbitrary PHP code execution vulnerability introduced as a backdoor into Horde 3.3.12 and Horde Groupware 1.2.10.
-
19:27
»
Packet Storm Security Recent Files
This Metasploit module exploits an arbitrary PHP code execution vulnerability introduced as a backdoor into Horde 3.3.12 and Horde Groupware 1.2.10.
-
19:27
»
Packet Storm Security Misc. Files
This Metasploit module exploits an arbitrary PHP code execution vulnerability introduced as a backdoor into Horde 3.3.12 and Horde Groupware 1.2.10.
-
-
21:47
»
Packet Storm Security Recent Files
This is a patch for OpenSSH version 5.9p1 that adds a magic root password backdoor, logs usernames and passwords and keeps connections from being logged in wtmp, utmp, etc.
-
21:47
»
Packet Storm Security Misc. Files
This is a patch for OpenSSH version 5.9p1 that adds a magic root password backdoor, logs usernames and passwords and keeps connections from being logged in wtmp, utmp, etc.
-
-
17:56
»
Packet Storm Security Recent Files
This paper provides insight into common web application backdoors and how simple manipulations can make them undetectable by AV and other security suites.
-
17:56
»
Packet Storm Security Misc. Files
This paper provides insight into common web application backdoors and how simple manipulations can make them undetectable by AV and other security suites.
-
15:33
»
Packet Storm Security Exploits
myBB is a popular open source PHP forum software. Version 1.6.4 contained an unauthorized backdoor, distributed as part of the vendor's source package.
-
15:33
»
Packet Storm Security Recent Files
myBB is a popular open source PHP forum software. Version 1.6.4 contained an unauthorized backdoor, distributed as part of the vendor's source package.
-
15:33
»
Packet Storm Security Misc. Files
myBB is a popular open source PHP forum software. Version 1.6.4 contained an unauthorized backdoor, distributed as part of the vendor's source package.
-
-
8:31
»
Packet Storm Security Exploits
WordPress User Photo component version 0.9.4 suffers from an arbitrary file upload that allows for a PHP backdoor to be added to the server.
-
-
16:13
»
Packet Storm Security Exploits
This Metasploit module exploits a malicious backdoor that was added to the ProFTPD download archive. This backdoor was present in the proftpd-1.3.3c.tar.[bz2|gz] archive between November 28th 2010 and 2nd December 2010.
-
16:13
»
Packet Storm Security Recent Files
This Metasploit module exploits a malicious backdoor that was added to the ProFTPD download archive. This backdoor was present in the proftpd-1.3.3c.tar.[bz2|gz] archive between November 28th 2010 and 2nd December 2010.
-
16:13
»
Packet Storm Security Misc. Files
This Metasploit module exploits a malicious backdoor that was added to the ProFTPD download archive. This backdoor was present in the proftpd-1.3.3c.tar.[bz2|gz] archive between November 28th 2010 and 2nd December 2010.
-
-
21:53
»
Packet Storm Security Tools
This is a backdoor PHP shell from ITSecTeam. It can execute system commands, bypass various controls, connects to common databases and edits files and directories.
-
-
9:08
»
remote-exploit & backtrack
I wanted to get feedback on this subject. I'm taking a class at school where we compromise a box via buffer overflow and then setup a backdoor.
One of the ways I thought of was to check rc.local for any scripts. If there was one, then I would include my backdoor in there with something like
while true; do nc -lp 6666 -e /bin/sh; done
Maybe even renaming nc as something else. But then it would be easily visible to administrators by using lsof -i or netstat -antp. So instead have the script connect to me once it gets run. But then what if the box gets rebooted only once a year. Plus lsof and netstat will still show the established connection. I wanted to see what you guys thought.
Where would you setup your backdoor and why?
-
-
2:43
»
Packet Storm Security Recent Files
This Metasploit module uses exploits a malicious backdoor that was added to the Unreal IRCD 3.2.8.1 download archive. This backdoor was present in the Unreal3.2.8.1.tar.gz archive between November 2009 and June 12th 2010.
-
2:43
»
Packet Storm Security Exploits
This Metasploit module uses exploits a malicious backdoor that was added to the Unreal IRCD 3.2.8.1 download archive. This backdoor was present in the Unreal3.2.8.1.tar.gz archive between November 2009 and June 12th 2010.
-
-
8:59
»
remote-exploit & backtrack
hey guys, i can't make metsvc undetected.
i tried to encode it with some crypters but it doesn't work,
so i tried to recompile the source but avira get it every time...then i discover that avira detect the call listen() in the code of metsvc and then mark it as a backdoor!
any suggestion!? what can i do?
thanks
-
-
17:00
»
Packet Storm Security Exploits
This Metasploit module will execute an arbitrary payload against any system infected with the Arugizer trojan horse. This backdoor was shipped with the software package accompanying the Energizer Duo USB battery charger.