exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from Francesco Tornieri

Email addressprivate
First Active2008-08-27
Last Active2016-11-24
View User Profile
Docker 1.11.2 Forged VXLAN Packet Service Detection
Posted Nov 24, 2016
Authored by Francesco Tornieri

Docker versions 1.11.2 and below suffer from an issue where a forged VXLAN packet can be leveraged to scan services that are not exposed.

tags | exploit
SHA-256 | a4e4a57ace4ef27819179237d6afd95b851a2dcb97baf0583bc8133f4f80246a
Storm Ringing PABX Test Tool
Posted Aug 24, 2012
Authored by Francesco Tornieri

This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call). The aim of the tool is to ring all the sip Terminal Equipment (phones).

tags | tool, telephony, fuzzer
systems | unix
SHA-256 | 6ba2d5b8e6fb19504e9f6dd8fae1bdcbe77e340e3053d3fc58575622138019d5
Owncloud 3.0.3 Clear Text Password Storage
Posted May 11, 2012
Authored by Francesco Tornieri

Owncloud versions 3.0.3 and below suffer from a clear text ldap password disclosure vulnerability in owncloud.db.

tags | exploit
SHA-256 | 31549886f764c292ef5d70e3a5a923ec24afda76b24471bdb34b6fc0fa48ebe5
Siemens Gigaset IP Series SIP Username Enumeration
Posted Aug 23, 2011
Authored by Francesco Tornieri

Siemens Gigaset IP Series suffers from a SIP username enumeration vulnerability.

tags | exploit
SHA-256 | 65e4e4df9126f57c3d9e3c1530c6d57e4e68c68e0ac0872319a1afd3d16b33e4
Asterisk 1.8.x SIP User Enumeration
Posted Jun 30, 2011
Authored by Francesco Tornieri

The INVITE method in use by Asterisk version 1.8.4.4 allows for remote user enumeration.

tags | exploit, remote
SHA-256 | c8d09e1a6bc234ffc02445e7446b5216f7017ea2bb2d57463d5af6d921a8ff5c
Trixbox 2.8.0.4 User Enumeration
Posted Jun 28, 2011
Authored by Francesco Tornieri

Trixbox versions 2.8.0.4 and below suffer from a remote user enumeration vulnerability via the Flash Operator Panel.

tags | exploit, remote
SHA-256 | 5fe530b38bbe1264123805cbd691c7f4036091c2a5950c46258181987161b42a
Asterisk 1.8.4 SIP Username Enumeration
Posted May 26, 2011
Authored by Francesco Tornieri

The REGISTER method in use by Asterisk version 1.8.4 allows for remote user enumeration.

tags | exploit, remote
SHA-256 | 0066c93ed79feb1bd8f0719d5c48a08e733fb8a5cfe1689acb5d5038f5c6a643
Asterisk 1.8.x SIP User Enumeration
Posted May 1, 2011
Authored by Francesco Tornieri

Asterisk version 1.8.x suffers from a SIP remote user enumeration vulnerability.

tags | exploit, remote
SHA-256 | 5bf98cf221d04c51ddb7d1a9e47f9bbb189d3640a8237aa5efd26b53988ad25c
Asterisk 1.4.x / 1.6.x Username Enumeration
Posted Apr 17, 2011
Authored by Francesco Tornieri

Asterisk versions 1.4.x and 1.6.x suffer from a SIP response user enumeration vulnerability.

tags | advisory
SHA-256 | 4973731897121ff19b4e5e74ece388fc7aed0dec962bb1d65c5b2cbcb447f513
Kyocera FTP Bounce
Posted Sep 3, 2008
Authored by Francesco Tornieri

Using Nmap, it is quite simple to perform a FTP bounce attack to port scan using the ftpd in Kyocera's printer model FS-118MFP.

tags | exploit
SHA-256 | c299acd863cc8ce32930a99e8c048a8d421ffc84f47a97c58db3b8894343e64c
kyocera-traversal.txt
Posted Aug 27, 2008
Authored by Francesco Tornieri

Kyocera Command Center suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 42d830ef4de171b4deadad97f60d6a5e5ada87a058d0dfdd45dcec7b6995b466
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close