A remote code execution exploit for Fortigate firewalls that exploits a HTTP cookie overflow vulnerability. It affects models 60, 60M, 80C, 200A, 300A, 400A, 500A, 620B, 800, 5000, 1000A, 3600, and 3600A. The model of the firewall is detected by examining the ETag in the HTTP headers of the firewall. This is not CVE-2006-6493 as detected by Avast.
Visit my blog or connect with me on Twitter
git init
or
With these rules you are able to protect yourself a tiny bit
- You are able to do open website in your browser or terminal
- You are able to reviece and send mails with e. g. Thunderbird
- You are able to ping any device you want from you machine
- You are able to connect yourself to a remote secure shell
- You are able to retrieve a dhcp lease from your router
We can't make this file beautiful and searchable because it's too large.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
"zip","city","state","citizen" | |
"01067","Dresden","Sachsen","11957" | |
"01069","Dresden","Sachsen","25484" | |
"01097","Dresden","Sachsen","14924" | |
"01099","Dresden","Sachsen","27974" | |
"01108","Dresden","Sachsen","5876" | |
"01109","Dresden","Sachsen","20010" | |
"01127","Dresden","Sachsen","14991" | |
"01129","Dresden","Sachsen","18915" | |
"01139","Dresden","Sachsen","17555" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
import ssl | |
import OpenSSL | |
cert = ssl.get_server_certificate(('google.de', 443)) | |
x509 = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM, cert) | |
print 'Expired: {}'.format(x509.has_expired()) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
import sys | |
from lxml import html | |
def main(): | |
filename = sys.argv[1] | |
with open(filename, 'rb') as f: | |
lines = f.readlines() |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
import os | |
import sys | |
import time | |
import pymongo | |
import requests | |
import urlparse | |
import datetime | |
from lxml import html |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
from dns import resolver | |
from dns.name import EmptyLabel | |
from dns.resolver import NoAnswer | |
from dns.resolver import NXDOMAIN | |
from pymongo import MongoClient | |
from pymongo.errors import DuplicateKeyError | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
import sys | |
import json | |
import requests | |
from lxml import html | |
from urlparse import urlparse | |
from fake_useragent import UserAgent |
You need to add the following entry in /etc/apt/sources.list
or a new file in /etc/apt/sources.list.d/
:
deb http://deb.torproject.org/torproject.org xenial main
deb-src http://deb.torproject.org/torproject.org xenial main
Then add the gpg key used to sign the packages by running the following commands at your command prompt: