lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <AANLkTiksrLCA72cS1YeC2BRcr2OeXT=5E3y7=rayqQY=@mail.gmail.com> Date: Tue, 8 Feb 2011 12:39:49 +0200 From: Ronen Z <ronen@...ji.com> To: full-disclosure@...ts.grok.org.uk Subject: Tricky exploit - a penetration test puzzle In a recent application security audit for a web-site I came across a big, blaring breach. while it's always fun to find a good vulnerability, it turned out to be quite tricky to actually exploit it. The trickiness was not due to good security practices but to pure (un)luck (depending on whose point of view). It seemed every angle I tried was off by just a tiny bit. Eventually I managed to find an interesting multiphase exploit vector, and I think it makes for some interesting tinkering/reading. I've created a mock-up replica of the vulnerable web-site to allow for testing and analysis. After reading the vulnerability introductory section you may wish to try your wit against the mock-site and find it yourself, before reading on to the detailed exploit write-up. Write up here: http://blog.quaji.com/2011/02/tricky-exploit-penetration-test-puzzle.html Ronen Zilberman _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists