-
Hey,
Dave and I discussed briefly on twitter, but running java applet attack, i have gotten this issue on 2 different kali VMs both running 6.3 #HugsforLife
So SET options used were, 2, 1, 2, then i…
-
Two ideas for modules just crossed my mind when looking at this project.
First one is BDFProxy [1] integration, for injecting shellcode into binaries downloaded by devices. Fairly self explanatory.
…
-
http://www.rapid7.com/db/modules/exploit/multi/browser/firefox_webidl_injection
The rapid7 website and the exploit payload options inform us that Native Payload (TARGET 1) is available for this explo…
-
I appear to have a working MSF and SET, however, the Java Applet does not attempt to make a connection to my listeners (tcpdump running on the victim). Only possible error appears to be lack of compat…
-
Hey there,
First off, big fan of a lot of your scripts on here. Really useful stuff. Myself and two other guys work on Veil, and we ran into an issue with powershell injection, and I think it may a…
-
Hi,
I'm trying to use this option in order to test the security of my computers but I cannot get this option to work, all I have is this message :
---
set:arduino>12
[*] Generating the Powershell…
azsde updated
10 years ago
-
``` bash
curl 'http://phpcrypto.2014.ghostintheshellcode.com/crypto.php' --data 'function=dump' > source.html
```
```
20:04:11 godmode_, use function dump to get the source, then set debug arg and i…
-
Hi,
I'm using Barnyard2[Version 2.1.13 (Build 327)].
When Barnyard2 was restarted by daily cron,
I received error messages from Barnyard2 twice in 4 months.
### Error messages
ERROR: database mysq…