blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2

Preview meta tags from the blog.chebuya.com website.

Linked Hostnames

8

Search Engine Appearance

Google

https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2

Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)

PoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.



Bing

Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)

https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2

PoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.



DuckDuckGo

https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2

Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)

PoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.

  • General Meta Tags

    15
    • title
      Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157) //
    • title
      Exploit-DB
    • title
      HackerOne
    • title
      GitHub
    • title
      Twitter
  • Open Graph Meta Tags

    5
    • og:url
      https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/
    • og:title
      Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)
    • og:description
      PoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.
    • US country flagog:locale
      en_us
    • og:type
      article
  • Twitter Meta Tags

    3
    • twitter:card
      summary
    • twitter:title
      Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)
    • twitter:description
      PoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.
  • Link Tags

    2
    • shortcut icon
      /favicon.ico
    • stylesheet
      /css/main.min.ee73fb576303200d41c6bc20372653bfc6bc0ab470858ebbb72d7f322f4708b7.css

Links

11