DepthB2R

date

Validierung

15 Compromissions 25%

Bewertung  Bewertung

0 Bewerten

Beschreibung

Many times while conducting a pentest, I need to script something up to make my life easier or to quickly test an attack idea or vector. Recently I came across an interesting command injection vector on a web application sitting on a client’s internet-facing estate. There was a page, running in Java, that allowed me to type arbitrary commands into a form, and have it execute them. While developer-provided webshells are always nice, there were a few caveats. The page was expecting directory listing style output, which was then parsed and reformatted. If the output didn’t match this parsing, no output to me. Additionally, there was no egress. ICMP, and all TCP/UDP ports including DNS were blocked outbound.

I was still able to leverage the command injection to compromise not just the server, but the entire infrastructure it was running on. After the dust settled, the critical report was made, and the vulnerability was closed, I thought the entire attack path was kind of fun, and decided to share how I went about it.

Zeit der Kompromittierung

4 Stunden

Betriebssystem

 linux

diese virtuelle Umgebung starten

Ergebnisse des CTF alltheday Ergebnisse des CTF alltheday für DepthB2R

Nickname Virtual Machine Anzahl der Angreifer Begonnen am Maschine kompromittiert in
- DepthB2R 0 29. November 2018 zu  21:10 -
- DepthB2R 0 29. November 2018 zu  20:53 -

 178 Virtuals Environnements

Ergebnis Name Validierung Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung
pas_valide Metasploitable 2 39% 8841
pas_valide Basic pentesting 1 31% 4977
pas_valide LAMP security CTF5 25% 3949
pas_valide Docker - I am groot 50% 3509 Ech0
pas_valide LAMP security CTF4 35% 2772
pas_valide SSH Agent Hijacking 25% 2505 mayfly
pas_valide SSRF Box 18% 1905 sambecks
pas_valide Metasploitable 12% 1771
pas_valide Mr. Robot 1 21% 1671
pas_valide End Droid 34% 1631
pas_valide Docker - Sys-Admin’s Docker 38% 1084 Ech0
pas_valide Imagick 22% 1083 sambecks
pas_valide SamBox v2 13% 1015 sambecks
pas_valide Kioptrix level 2 24% 976
pas_valide LAMP security CTF7 38% 900
pas_valide VulnVoIP 17% 881
pas_valide Docker - Talk through me 42% 754 Ech0
pas_valide SamBox v1 7% 749 sambecks
pas_valide Windows - Group Policy Preferences Passwords 26% 699
pas_valide Django unchained 23% 678 TiWim
pas_valide Well-Known 10% 651 sm0k
pas_valide LAMP security CTF6 18% 610
pas_valide Windows - KerbeRoast 16% 600
pas_valide Shared Objects Hijacking 12% 596 das
pas_valide Kioptrix level 3 32% 578
pas_valide BreakingRootme2020 15% 556 Laluka
pas_valide Windows - ASRepRoast 33% 535
pas_valide Websocket - 0 protection 7% 524 Worty
pas_valide Awky 8% 514 sbrk
pas_valide Windows XP pro 01 5% 509 g0uZ
pas_valide Rootkit Cold Case 15% 496 franb
pas_valide Kioptrix level 4 34% 465
pas_valide Bluebox - Microsoft Pentest 4% 431
pas_valide pWnOS 31% 405
pas_valide Hackademic RTB1 19% 365
pas_valide DC-1 14% 349
pas_valide SamBox v3 5% 348 sambecks
pas_valide Bluebox 2 - Pentest 3% 316 sambecks
pas_valide Exploit KB Vulnerable Web App 12% 308
pas_valide SAP Pentest 7% 300 iggy
pas_valide Holynix v1 24% 294
pas_valide LAMP security CTF8 14% 293
pas_valide Windows - sAMAccountName spoofing 23% 280
pas_valide A bittersweet shellfony 12% 251 mayfly
pas_valide /dev/random : Pipe 4% 240
pas_valide Hopital Bozobe 8% 239 sambecks
pas_valide LordoftheRoot 25% 234
pas_valide Acid: Server 11% 220
pas_valide FristiLeaks 1.3 28% 217
pas_valide SkyTower 24% 217