Lucene search

K
thnThe Hacker NewsTHN:4599E1BC1BC6FC9454F7E6AFDDB444CB
HistoryApr 15, 2011 - 7:47 a.m.

Phoenix exploit kit 2.5 leaked, Download Now !

2011-04-1507:47:00
The Hacker News
thehackernews.com
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.939 High

EPSS

Percentile

98.7%

Phoenix exploit kit 2.5 leaked, Download Now !

The Hacker News

Phoenix exploit kit 2.5 has been leaked .

Now U can dowload from given link… At below here is a some define about Phoenix Exploit Kit.

The Phoenix Exploit Kit is a good example of exploit packs used to exploit vulnerable software on the computers of unsuspecting Internet users. Often, cybercriminals drive traffic to the exploit kit by compromising legitimate sites and by inserting iframes that point to the exploit kit or by poisoning search engine results that take users to the exploit kit.

When users land on a page injected with the exploit kit, it detects the user’s Web browser and OS version then attempts to exploit either the browser or a browser plug-in. The latest version of the Phoenix Exploit Kit currently has payloads for nine different system configurations, including:

  • XPIE7: Internet Explorer 7 and either Windows XP, Windows XP SP2, or Windows 2003
  • VISTAIE7: Internet Explorer 7 and Windows Vista
  • XPIE8: Internet Explorer 8 and either Windows XP, Windows XP SP2, or Windows 2003
  • VISTAIE8: Internet Explorer 8 and Windows Vista
  • IE: Versions of Internet Explorer that are not IE7 or IE8
  • WIN7IE: Internet Explorer and Windows 7
  • XPOTHER: Browsers other than Internet Explorer on Windows XP, Windows XP SP2, or Windows 2003
  • VISTAOTHER: Browsers other than Internet Explorer on Windows Vista
  • WIN7OTHER: Browsers other than Internet Explorer on Windows 7

Once users are directed to a payload page, the kit attempts to exploit vulnerabilities in versions of Adobe Acrobat Reader, Adobe Flash Player, Internet Explorer, and Java.

Java has become the leading exploit vector for a variety of exploit packs. In fact, Phoenix Exploit Kit 2.5 has been updated to include three additional Java exploits, namely:

  • JAVA RMI
  • JAVA MIDI
  • JAVA SKYLINE

The administration panel of Phoenix Exploit Kit 2.5 contains an option to switch modes, which changes the Java exploit delivered to users. It allows the administrator to choose from among TC (CVE-2010-0840), RMI, or MIDI. This indicates that exploits for Java have become very attractive to malware distributors.

Download : <https://www.multiupload.com/L7APNI8KGX&gt;
( Thanks to my frnd flexxpointfor this )

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.939 High

EPSS

Percentile

98.7%