Posts Tagged ‘exploit’

Linux Soft Exploit Suggester 0.6

linux-soft-exploit-suggester finds exploits for all vulnerable software in a system helping with the privilege escalation. It focuses on software packages instead of Kernel vulnerabilities. Source: Linux Soft Exploit Suggester 0.6


Rancher Server Docker Exploit

Utilizing Rancher Server, an attacker can create a docker container with the ‘/’ path mounted with read/write permissions on the host server that is running the docker container. As the docker container executes command as uid 0 it is honored by the host operating system allowing the attacker to edit/create files owed by root. This […]


Windows Browser Example Exploit

This template covers IE8/9/10, and uses the user-agent HTTP header to detect the browser version. Please note IE8 and newer may emulate an older IE version in compatibility mode, in that case the module won’t be able to detect the browser correctly. This is an example Metasploit module to be used for exploit development. Source: […]


Metasploit Example Exploit

This exploit module illustrates how a vulnerability could be exploited in an TCP server that has a parsing bug. This is an example Metasploit module to be used for exploit development. Source: Metasploit Example Exploit