Kris Katterjohn's profile photo

Kris Katterjohn

Articles

  • Aug 31, 2024 | packetstormsecurity.com | Jay Turla |Kris Katterjohn

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::SMB::Client def initialize(info = {}) super(update_info(info, 'Name' => 'IBM DB2 db2rcmd.exe Command Execution Vulnerability', 'Description' => %q{ This module exploits a vulnerability in the Remote Command Server component in IBM's DB2 Universal Database 8.1. An authenticated attacker...

  • Aug 31, 2024 | packetstormsecurity.com | Spencer McIntyre |Jay Turla |Kris Katterjohn

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'ruby_smb/dcerpc/client' class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::SMB::Client::Authenticated include Msf::Exploit::Remote::DCERPC include Msf::Auxiliary::Report include Msf::Exploit::Remote::MsSamr::Computer include Msf::OptionalSession::SMB def initialize(info = {}) super( update_info( info, 'Name' => 'SAMR Computer...

  • Aug 31, 2024 | packetstormsecurity.com | Jay Turla |Kris Katterjohn

    ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::Tcp include Msf::Exploit::Remote::TcpServer include Msf::Auxiliary::Report def initialize(info = {}) super(update_info(info, 'Name' => 'Yokogawa BKBCopyD.exe Client', 'Description' => %q{ This module allows an unauthenticated user to interact with the Yokogawa CENTUM CS3000 BKBCopyD.exe...

  • Aug 31, 2024 | packetstormsecurity.com | Jay Turla |Kris Katterjohn

    ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::TNS include Msf::Auxiliary::Report include Msf::Auxiliary::Scanner include Msf::Auxiliary::AuthBrute # Actually, doesn't use much here, but there's a couple handy functions.

  • Aug 31, 2024 | packetstormsecurity.com | Jay Turla |Kris Katterjohn

    ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::SunRPCdef initialize super( 'Name' => 'Solaris KCMS + TTDB Arbitrary File Read', 'Description' => %q{ This module targets a directory traversal vulnerability in the kcms_server component from the Kodak Color Management System.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →