1. IT-Security >
  2. IT Security Tools


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

IT Security Tools


Suchen

Debian Security Advisory 4367-1

IT Security Tools vom 14.01.2019 um 16:47 Uhr | Quelle packetstormsecurity.com
Debian Linux Security Advisory 4367-1 - The Qualys Research Labs discovered multiple vulnerabilities in systemd-journald. Two memory corruption flaws, via attacker-controlled alloca()s (CVE-2018-16864, CVE-2018-16865) and an out-of-bounds read flaw leading to an information leak (CVE-2018-16866), could allow an attacker to cause a denial of service or the execution of arbitrary code.
Newsbewertung

Weiterlesen

Debian Security Advisory 4366-1

IT Security Tools vom 14.01.2019 um 16:47 Uhr | Quelle packetstormsecurity.com
Debian Linux Security Advisory 4366-1 - An integer underflow was discovered in the CAF demuxer of the VLC media player.
Newsbewertung

Weiterlesen

Lenovo R2105 Cross Site Request Forgery

IT Security Tools vom 14.01.2019 um 16:22 Uhr | Quelle packetstormsecurity.com
Lenovo R2105 suffers from a cross site request forgery vulnerability that can allow for remote command execution.
Newsbewertung

Weiterlesen

PORTIER 4.4.4.2 / 4.4.4.6 Cryptographic Issues

IT Security Tools vom 14.01.2019 um 00:02 Uhr | Quelle packetstormsecurity.com
PORTIER versions 4.4.4.2 and 4.4.4.6 allow for decryption of secrets due to static keys.
Newsbewertung

Weiterlesen

HMS Netbiter WS100 3.30.5 Cross Site Scripting

IT Security Tools vom 13.01.2019 um 21:32 Uhr | Quelle packetstormsecurity.com
HMS Netbiter WS100 versions 3.30.5 and below suffer from a cross site scripting vulnerability.
Newsbewertung

Weiterlesen

PORTIER 4.4.4.2 / 4.4.4.6 SQL Injection

IT Security Tools vom 13.01.2019 um 00:02 Uhr | Quelle packetstormsecurity.com
PORTIER versions 4.4.4.2 and 4.4.4.6 suffer from a remote SQL injection vulnerability.
Newsbewertung

Weiterlesen

AudioCode 400HD Remote Command Injection

IT Security Tools vom 12.01.2019 um 18:21 Uhr | Quelle packetstormsecurity.com
AudioCode 400HD IP phones suffer from a suffers from a remote command injection vulnerability.
Newsbewertung

Weiterlesen

AudioCode 400HD Cross Site scripting

IT Security Tools vom 12.01.2019 um 18:17 Uhr | Quelle packetstormsecurity.com
AudioCode 400HD IP phones suffer from a cross site scripting vulnerability.
Newsbewertung

Weiterlesen

Microsoft Windows VCF Remote Code Execution

IT Security Tools vom 12.01.2019 um 00:04 Uhr | Quelle packetstormsecurity.com
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of VCard files. Crafted data in a VCard file can cause Windows to display a dangerous hyperlink. The user interface fails to provide any indication of the hazard. An attacker can leverage this vulnerability to execute code in the context of the current user.
Newsbewertung

Weiterlesen

UA-Parser Denial Of Service

IT Security Tools vom 12.01.2019 um 00:02 Uhr | Quelle packetstormsecurity.com
UA-Parser versions 2015-05-14 and newer suffer from a denial of service vulnerability.
Newsbewertung

Weiterlesen

Debian Security Advisory 4365-1

IT Security Tools vom 11.01.2019 um 21:20 Uhr | Quelle packetstormsecurity.com
Debian Linux Security Advisory 4365-1 - Stephen Roettger discovered a race condition in tmpreaper, a program that cleans up files in directories based on their age, which could result in local privilege escalation.
Newsbewertung

Weiterlesen

Ubuntu Security Notice USN-3855-1

IT Security Tools vom 11.01.2019 um 19:22 Uhr | Quelle packetstormsecurity.com
Ubuntu Security Notice 3855-1 - It was discovered that systemd-journald allocated variable-length buffers for certain message fields on the stack. A local attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. It was discovered that systemd-journald allocated variable-length arrays of objects representing message fields on the stack. A local attacker could potentially exploit this to cause a denial of service, or execute arbitrary code. Various other issues were also addressed.
Newsbewertung

Weiterlesen

Joomla! JoomProject 1.1.3.2 Information Disclosure

IT Security Tools vom 11.01.2019 um 18:02 Uhr | Quelle packetstormsecurity.com
Joomla! JoomProject component version 1.1.3.2 suffers from an information leakage vulnerability.
Newsbewertung

Weiterlesen

Joomla! JoomCRM 1.1.1 SQL Injection

IT Security Tools vom 11.01.2019 um 16:02 Uhr | Quelle packetstormsecurity.com
Joomla! JoomCRM component version 1.1.1 suffers from a remote SQL injection vulnerability.
Newsbewertung

Weiterlesen

Bypass Firewalls By DNS History

IT Security Tools vom 11.01.2019 um 13:56 Uhr | Quelle blog.hackersonlineclub.com

Bypass Firewalls By Abusing DNS History

Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.

This script will try to find:

  • The direct IP address of a server behind a firewall like Cloudflare, Incapsula, SUCURI 
  • An old server which still running the same (inactive and unmaintained) website, not receiving active traffic because the A DNS record is not pointing towards it. Because it's an outdated and unmaintained website version of the current active one, it is likely vulnerable for various exploits. It might be easier to find SQL injections and access the database of the old website and abuse this information to use on the current and active website.

This script (ab)uses DNS history records. This script will search for old DNS A records and check if the server replies for that domain. It also outputs a confidence level, based on the similarity in HTML response of the possible origin server and the firewall.

The script also fetches the IP's of subdomains because my own experience learned me that subdomain IP's sometimes point to the origin of the main domain.

Usage

Use the script like this-

bash bypass-firewalls-by-DNS-history.sh -d example.com

-d --domain: domain to bypass
-o --outputfile: output file with IP's
-l --listsubdomains: list with subdomains for extra coverage

Requirements (optional)

jq is needed to parse output to gather automatically subdomains. Install with apt install jq.

For who is this script?

This script is handy for:
  • Security auditors
  • Web administrators
  • Bug bounty hunters
  • Blackhatters I guess 

How to protect against this script?

If you use a firewall, make sure to accept only traffic coming through the firewall. Deny all traffic coming directly from the internet. For example: Cloudflare has a list of IP's which you can whitelist with iptables or UFW. Deny all other traffic.
Make sure that no old servers are still accepting connections and not accessible in the first place
Web services used in this script

The following services are used:
  • SecurityTrails
  • CrimeFlare
  • certspotter
  • DNSDumpster
  • IPinfo

FAQ

Why in Bash and not in Python?

It started out as a few CURL one-liners, became a bash script, extended the code more and more, and the regret of not using Python extended accordingly.

I find more subdomains with my tools?

I know. I cannot expect everyone to install all these DNS brute-force and enumeration tools. In addition, I don't know beforehand in which folder these tools are placed or under which alias these tools are called. You can still provide your own list with -l so you can feed output of these subdomain tools into this tool. Expected input is a full subdomain on each line.

Download

Newsbewertung

Weiterlesen

Adapt Inventory Management System 1.0 SQL Injection

IT Security Tools vom 11.01.2019 um 12:11 Uhr | Quelle packetstormsecurity.com
Adapt Inventory Management System version 1.0 suffers from a remote SQL injection vulnerability.
Newsbewertung

Weiterlesen

Luminance Studio 2.17 Denial Of Service

IT Security Tools vom 11.01.2019 um 08:02 Uhr | Quelle packetstormsecurity.com
Luminance Studio version 2.17 suffers from a denial of service vulnerability.
Newsbewertung

Weiterlesen

Blob Studio 2.17 Denial Of Service

IT Security Tools vom 11.01.2019 um 07:22 Uhr | Quelle packetstormsecurity.com
Blob Studio version 2.17 suffers from a denial of service vulnerability.
Newsbewertung

Weiterlesen

Code Blocks 17.12 Local Buffer Overflow

IT Security Tools vom 11.01.2019 um 07:02 Uhr | Quelle packetstormsecurity.com
Code Blocks version 17.12 suffers from a local buffer overflow vulnerability.
Newsbewertung

Weiterlesen

Liquid Studio 2.17 Denial Of Service

IT Security Tools vom 11.01.2019 um 06:22 Uhr | Quelle packetstormsecurity.com
Liquid Studio version 2.17 suffers from a denial of service vulnerability.
Newsbewertung

Weiterlesen

Pixel Studio 2.17 Denial Of Service

IT Security Tools vom 11.01.2019 um 06:22 Uhr | Quelle packetstormsecurity.com
Pixel Studio version 2.17 suffers from a denial of service vulnerability.
Newsbewertung

Weiterlesen

Windows/x86 Download With TFTP And Execute Shellcode

IT Security Tools vom 11.01.2019 um 05:44 Uhr | Quelle packetstormsecurity.com
Windows/x86 download with TFTP and execute shellcode generator.
Newsbewertung

Weiterlesen

Paint Studio 2.17 Denial Of Service

IT Security Tools vom 11.01.2019 um 05:44 Uhr | Quelle packetstormsecurity.com
Paint Studio version 2.17 suffers from a denial of service vulnerability.
Newsbewertung

Weiterlesen

Tree Studio 2.17 Denial Of Service

IT Security Tools vom 11.01.2019 um 04:33 Uhr | Quelle packetstormsecurity.com
Tree Studio version 2.17 suffers from a denial of service vulnerability.
Newsbewertung

Weiterlesen

Linux/x86 wget chmod Shellcode

IT Security Tools vom 11.01.2019 um 03:22 Uhr | Quelle packetstormsecurity.com
119 bytes small Linux/x86 wget chmod execute over execve /bin/sh -c shellcode.
Newsbewertung

Weiterlesen

Selfie Studio 2.17 Denial Of Service

IT Security Tools vom 11.01.2019 um 03:22 Uhr | Quelle packetstormsecurity.com
Selfie Studio version 2.17 suffers from a denial of service vulnerability.
Newsbewertung

Weiterlesen

Scapy Packet Manipulation Tool 2.4.2

IT Security Tools vom 11.01.2019 um 00:41 Uhr | Quelle packetstormsecurity.com
Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.
Newsbewertung

Weiterlesen

Capstone 4.0.1

IT Security Tools vom 11.01.2019 um 00:37 Uhr | Quelle packetstormsecurity.com
Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more.
Newsbewertung

Weiterlesen

Adobe Coldfusion 11 CKEditor Arbitrary File Upload

IT Security Tools vom 11.01.2019 um 00:34 Uhr | Quelle packetstormsecurity.com
A file upload vulnerability exists in the CKEditor of Adobe ColdFusion 11 (Update 14 and earlier).
Newsbewertung

Weiterlesen

PEAR Archive_Tar PHP Object Injection

IT Security Tools vom 11.01.2019 um 00:33 Uhr | Quelle packetstormsecurity.com
PEAR Archive_Tar versions prior to 1.4.4 suffers from a php object injection vulnerability.
Newsbewertung

Weiterlesen

eBrigade ERP 4.5 Arbitrary File Download

IT Security Tools vom 11.01.2019 um 00:32 Uhr | Quelle packetstormsecurity.com
eBrigade ERP version 4.5 suffers from an arbitrary file download vulnerability.
Newsbewertung

Weiterlesen

OpenSource ERP 6.3.1 SQL Injection

IT Security Tools vom 11.01.2019 um 00:31 Uhr | Quelle packetstormsecurity.com
OpenSource ERP version 6.3.1 suffers from a remote SQL injection vulnerability.
Newsbewertung

Weiterlesen

eBrigade ERP 4.5 SQL Injection

IT Security Tools vom 11.01.2019 um 00:30 Uhr | Quelle packetstormsecurity.com
eBrigade ERP version 4.5 suffers from a remote SQL injection vulnerability.
Newsbewertung

Weiterlesen

Event Locations 1.0.1 SQL Injection

IT Security Tools vom 11.01.2019 um 00:30 Uhr | Quelle packetstormsecurity.com
Event Locations version 1.0.1 suffers from a remote SQL injection vulnerability.
Newsbewertung

Weiterlesen

Event Calendar 3.7.4 SQL Injection

IT Security Tools vom 11.01.2019 um 00:29 Uhr | Quelle packetstormsecurity.com
Event Calendar version 3.7.4 suffers from a remote SQL injection vulnerability.
Newsbewertung

Weiterlesen

Seitennavigation

Seite 2 von 185 Seiten (Bei Beitrag 35 - 70)
6.460x Beiträge in dieser Kategorie

Auf Seite 1 zurück | Nächste 3 Seite | Letzte Seite
[ 1 ] [2] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ]