Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Bleeding Life"

From NetSec
Jump to: navigation, search
(Bleeding Life)
Line 1: Line 1:
 
= Bleeding Life =
 
= Bleeding Life =
{{InHouse}}
 
 
* Bleeding Life 2 is an exploit pack that affects the web browsers on the [[Operating_System#Windows|Microsoft Windows]] operating system with remote code execution [[Buffer_Overflows|buffer overflows]].
 
* Bleeding Life 2 is an exploit pack that affects the web browsers on the [[Operating_System#Windows|Microsoft Windows]] operating system with remote code execution [[Buffer_Overflows|buffer overflows]].
  
Line 23: Line 22:
  
 
*[http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0842 CVE-2010-0842]
 
*[http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0842 CVE-2010-0842]
*[http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3552 CVE-2010-3552]
+
*[http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3552 CVE-2010-
*Signed Applet
+
 
+
=== Statistics ===
+
 
+
*Statistics by Exploit
+
*Statistics by Browser
+
*Statistics by OS Version
+
 
+
== Server Requirements ==
+
*MySQL
+
*PHP
+
*HTTPD (apache, lighttpd, [[NGINX|nginx]], etc)
+
 
+
== Installation & Configuration ==
+
 
+
{{info|Before running Bleeding Life 2's installer, you must first fill out '''config.php''', which has been thoroughly commented for your ease of use.}}
+
The installer is located at '''$DOCUMENT_ROOT/install'''.  Installation is incredibly easy.
+
 
+
== Download ==
+
 
+
[http://www.blackhatacademy.org/releases/bleeding-life-2-download.tgz Bleeding Life 2]
+

Revision as of 05:02, 12 March 2012

Bleeding Life

Disclaimer

RPU0j.png By obtaining this software, you are solely responsible for its use and for the consequences that may occur as a result of the use of the software. This software is intended solely for the purposes of vulnerability and penetration testing in a lab environment or on a private computer network that you own. This software is not intended to be placed on a public network (i.e The Internet). This software is not intended to be used maliciously in any way. Use of this software for malicious purposes could lead to you being held criminally liable for any damages caused. You agree to indemnify, hold harmless, and otherwise not sue or hold liable, the authors, or anyone else associated with this software against all claims, damages, legal fees, costs, or other payments. Not for use by cybercriminals.

Download HERE

Features

Bleeding Life 2 has a variety of exploits and statistics features.

Exploits

Adobe

Java