DepthB2R

Дата

Валидации

15 Компромиссы 26%

Примечание  Рейтинг

0 Голосовать

Описание

Many times while conducting a pentest, I need to script something up to make my life easier or to quickly test an attack idea or vector. Recently I came across an interesting command injection vector on a web application sitting on a client’s internet-facing estate. There was a page, running in Java, that allowed me to type arbitrary commands into a form, and have it execute them. While developer-provided webshells are always nice, there were a few caveats. The page was expecting directory listing style output, which was then parsed and reformatted. If the output didn’t match this parsing, no output to me. Additionally, there was no egress. ICMP, and all TCP/UDP ports including DNS were blocked outbound.

I was still able to leverage the command injection to compromise not just the server, but the entire infrastructure it was running on. After the dust settled, the critical report was made, and the vulnerability was closed, I thought the entire attack path was kind of fun, and decided to share how I went about it.

Время компромисса

4 часы

Операционная система

 linux

запустить эту виртуальную среду

результаты CTF за весь период результаты CTF за весь период для DepthB2R

Псевдоним Виртуальное окружение Количество злоумышленников Дата начала Окружающая среда в опасности
- DepthB2R 0 29 Ноябрь 2018 to 21:10 -
- DepthB2R 0 29 Ноябрь 2018 to 20:53 -

 174 Виртуальные среды

Результаты Имя Валидации Трудность  Трудность Автор Примечание  Рейтинг
pas_valide Metasploitable 2 40% 8513
pas_valide Basic pentesting 1 32% 4592
pas_valide LAMP security CTF5 25% 3855
pas_valide Docker - I am groot 51% 2917 Ech0
pas_valide LAMP security CTF4 35% 2710
pas_valide SSH Agent Hijacking 26% 2327 mayfly
pas_valide SSRF Box 18% 1728 sambecks
pas_valide Metasploitable 12% 1712
pas_valide Mr. Robot 1 22% 1635
pas_valide End Droid 35% 1165
pas_valide Imagick 22% 1015 sambecks
pas_valide SamBox v2 13% 972 sambecks
pas_valide Kioptrix level 2 25% 970
pas_valide Docker - Sys-Admin’s Docker 41% 922 Ech0
pas_valide LAMP security CTF7 39% 884
pas_valide VulnVoIP 17% 842
pas_valide SamBox v1 7% 722 sambecks
pas_valide Docker - Talk through me 42% 621 Ech0
pas_valide Well-Known 10% 612 sm0k
pas_valide Django unchained 22% 603 TiWim
pas_valide LAMP security CTF6 18% 602
pas_valide Kioptrix level 3 33% 574
pas_valide Windows - Group Policy Preferences Passwords 25% 560
pas_valide Shared Objects Hijacking 13% 552 das
pas_valide BreakingRootme2020 15% 502 Laluka
pas_valide Awky 8% 492 sbrk
pas_valide Windows XP pro 01 5% 492 g0uZ
pas_valide Kioptrix level 4 35% 460
pas_valide Rootkit Cold Case 16% 453 franb
pas_valide Websocket - 0 protection 6% 416 Worty
pas_valide Bluebox - Microsoft Pentest 4% 413
pas_valide Windows - KerbeRoast 19% 406
pas_valide pWnOS 32% 400
pas_valide Windows - ASRepRoast 35% 372
pas_valide Hackademic RTB1 19% 363
pas_valide DC-1 15% 343
pas_valide SamBox v3 5% 330 sambecks
pas_valide Exploit KB Vulnerable Web App 12% 306
pas_valide Bluebox 2 - Pentest 3% 305 sambecks
pas_valide Holynix v1 24% 292
pas_valide SAP Pentest 7% 290 iggy
pas_valide LAMP security CTF8 14% 289
pas_valide /dev/random : Pipe 5% 235
pas_valide A bittersweet shellfony 12% 230 mayfly
pas_valide LordoftheRoot 25% 229
pas_valide Hopital Bozobe 8% 228 sambecks
pas_valide Acid: Server 12% 218
pas_valide FristiLeaks 1.3 29% 215
pas_valide SkyTower 24% 213
pas_valide Ubuntu 8.04 weak 5% 206 g0uZ