Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Bleeding Life"

From NetSec
Jump to: navigation, search
(Bleeding Life 3)
 
(11 intermediate revisions by 5 users not shown)
Line 1: Line 1:
= Bleeding Life =
 
 
 
Bleeding Life 2 is an exploit pack that affects the web browsers on the [[Operating_System#Windows|Microsoft Windows]] operating system with remote code execution [[Buffer_Overflows|buffer overflows]].
 
Bleeding Life 2 is an exploit pack that affects the web browsers on the [[Operating_System#Windows|Microsoft Windows]] operating system with remote code execution [[Buffer_Overflows|buffer overflows]].
 
+
<font size="-2">Special thanks to [[User:Teknical|Teknical]] for his contributions to this article.</font>
 
== Disclaimer ==
 
== Disclaimer ==
 
{{warning|By  obtaining this software, you are solely responsible for its use and for the consequences that may occur as a result of the use of the software.  This software is intended solely for the purposes of vulnerability and penetration testing in a lab environment or on a private computer network that you own.  This software is not intended to be placed on a  public network (i.e The Internet).  This software is not intended to be  used maliciously in any way.  Use of this software for malicious  purposes could lead to you being held criminally liable for any damages  caused.  You agree to indemnify, hold harmless, and otherwise not sue or hold liable, the authors, or anyone else associated with this software against all claims, damages, legal fees, costs, or other payments.  Not for use by [[cybercriminals]].}}
 
{{warning|By  obtaining this software, you are solely responsible for its use and for the consequences that may occur as a result of the use of the software.  This software is intended solely for the purposes of vulnerability and penetration testing in a lab environment or on a private computer network that you own.  This software is not intended to be placed on a  public network (i.e The Internet).  This software is not intended to be  used maliciously in any way.  Use of this software for malicious  purposes could lead to you being held criminally liable for any damages  caused.  You agree to indemnify, hold harmless, and otherwise not sue or hold liable, the authors, or anyone else associated with this software against all claims, damages, legal fees, costs, or other payments.  Not for use by [[cybercriminals]].}}
Line 42: Line 40:
 
The installer is located at '''$DOCUMENT_ROOT/install'''.  Installation is incredibly easy.
 
The installer is located at '''$DOCUMENT_ROOT/install'''.  Installation is incredibly easy.
  
== Download ==
+
= Download =
 +
 
 +
* '''Download URL''': http://www.blackhatlibrary.net/releases/bleeding-life-2.tgz
 +
 
  
[http://www.blackhatacademy.org/releases/bleeding-life-2-download.tgz Bleeding Life 2]
 
  
= Additional Versions =
 
  
*Bleeding Life 1 (retired)
+
{{InHouse}}
*Bleeding Life 3 (In circulation)
+
{{exploitation}}
 +
{{social}}

Latest revision as of 08:28, 21 April 2013

Bleeding Life 2 is an exploit pack that affects the web browsers on the Microsoft Windows operating system with remote code execution buffer overflows. Special thanks to Teknical for his contributions to this article.

Disclaimer

RPU0j.png By obtaining this software, you are solely responsible for its use and for the consequences that may occur as a result of the use of the software. This software is intended solely for the purposes of vulnerability and penetration testing in a lab environment or on a private computer network that you own. This software is not intended to be placed on a public network (i.e The Internet). This software is not intended to be used maliciously in any way. Use of this software for malicious purposes could lead to you being held criminally liable for any damages caused. You agree to indemnify, hold harmless, and otherwise not sue or hold liable, the authors, or anyone else associated with this software against all claims, damages, legal fees, costs, or other payments. Not for use by cybercriminals.

Download HERE

Features

Bleeding Life 2 has a variety of exploits and statistics features.

Exploits

Adobe

Java

Statistics

  • Statistics by Exploit
  • Statistics by Browser
  • Statistics by OS Version

Server Requirements

  • MySQL
  • PHP
  • HTTPD (apache, lighttpd, nginx, etc)

Installation & Configuration

c3el4.png Before running Bleeding Life 2's installer, you must first fill out config.php, which has been thoroughly commented for your ease of use.

The installer is located at $DOCUMENT_ROOT/install. Installation is incredibly easy.

Download



We have more tools coming soon! Look forward to Chimera Live CD.
c3el4.png
These are the offensive security tools developed by our wiki staff.
Bleeding Life is part of a series on exploitation.
<center>
</center>