lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <032601c2cc4d$fac29740$c71121c2@sharpuk.co.uk>
From: DaveHowe at cmn.sharp-uk.co.uk (David Howe)
Subject: re: Global HIGH Security Risk

> What I did first was just to code an exploit for the vulnerable
> daemon and added a simple command sequence to write
> down to the server an uuencoded file using vi editor,
<snip the rest>
Erm - hate to tell you this, but this is how it is *normally* done. you
exploit a service using a 'sploit that requires only the open
internet-facing port (a buffer overflow is the usual vector) and throw
whatever you want down the link in whatever format it supports - often
you don't need uuencode if the channel is 8 bit clean (and almost all
are)
exploit code usually reads "kill main server if it still exists, open
new server on same port, receive future connnects from my IP address as
being filename, followed by length, followed by data; run any
executables and return the output to me as a reply to the download"
If you have found a previously unknown exploitable bug in a server
though - that is worth reporting.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ