exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

Files from George Hedfors

Email addressgeorge.hedfors at gmail.com
First Active2005-09-22
Last Active2011-05-01
Action Message Format (AMF) Shell 0.23
Posted May 1, 2011
Authored by George Hedfors | Site george.hedfors.com

Action Message Format (AMF) Shell is testing tool that demonstrates weaknesses in PHPAMF, especially where the default service 'DiscoveryService' has been left behind.

tags | tool, shell
systems | linux, unix
SHA-256 | 150be94024e1cfc90965e585dc08ff6eebd351f0b15fba769e5a4ba8ba6f0925
Cybercom Sweden AB Security Advisory CSESA-2010-8
Posted Nov 26, 2010
Authored by George Hedfors | Site newsroom.cybercom.com

Cisco Clientless SSL VPN (Secure Desktop) can be misconfigured when disabling the portal toolbar. The Portal toolbar is independent from filtering the actual browser requests. This means that all URL's and plugins are by default allowed even if the administrator only chooses to publish a few bookmarks to key systems where users should have access. This may lead to the possibility of giving unintended access to other systems behind the ASA.

tags | advisory
systems | cisco
SHA-256 | 4eb5734d29ebe15392aa7223640755c5c16effc9c7c936299c63698ecdfb737e
nwldapbf.txt
Posted Jun 24, 2008
Authored by George Hedfors | Site pinion.se

LDAP user enumerator and brute forcer for Novell Netware.

tags | cracker
SHA-256 | 7645ed276ced0f883e7e581ee878097725c1d06305d95d200b235c29d40c9e34
PTL_advisory_050825.txt
Posted Sep 22, 2005
Authored by George Hedfors | Site pinion.se

HP LaserJet printers have an extensive administrative user interface that is provided over SNMP. Pinion has discovered that HP LaserJet printers store information regarding recently printed documents. Information such as document name, title, number of pages, document size, user who has printed the document and the machine name where the print job was initiated can all be extracted via SNMP. Exploit provided. HP LaserJet 2430 is verified vulnerable.

tags | exploit
SHA-256 | 05d0039b4bbc9f489d2f36b9ee57d0cc22a0fc181e945e9ae6fc339bb43387e0
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close