blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2
Preview meta tags from the blog.chebuya.com website.
Linked Hostnames
8- 4 links togithub.com
- 1 link toblog.chebuya.com
- 1 link tohackerone.com
- 1 link topacketstormsecurity.com
- 1 link totraining.zeropointsecurity.co.uk
- 1 link totwitter.com
- 1 link towww.fortinet.com
- 1 link tox.com
Search Engine Appearance
Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)
PoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.
Bing
Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)
PoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.
DuckDuckGo
Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)
PoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.
General Meta Tags
15- titleUnauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157) //
- titleExploit-DB
- titleHackerOne
- titleGitHub
- titleTwitter
Open Graph Meta Tags
5- og:urlhttps://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/
- og:titleUnauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)
- og:descriptionPoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.
og:locale
en_us- og:typearticle
Twitter Meta Tags
3- twitter:cardsummary
- twitter:titleUnauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent (CVE-2024-4157)
- twitter:descriptionPoC: https://github.com/chebuya/Havoc-C2-SSRF-poc Your browser does not support the video tag. Summary Havoc C2 is a modern and malleable post-exploitation command and control framework targetting windows systems utilized by red teamers and threat actors alike. While auditing the codebase, I was able to discover a vulnerability in which unauthenticated attackers could create a TCP socket on the teamserver with an arbitrary IP/port, and read and write traffic through the socket. By exploiting this vulnerability, attackers could leak the origin IP of a teamserver behind public redirectors (attribution), abuse vulnerable teamservers as a redirector (misattribution) and route traffic through any listening socks proxies on the teamserver.
Link Tags
2- shortcut icon/favicon.ico
- stylesheet/css/main.min.ee73fb576303200d41c6bc20372653bfc6bc0ab470858ebbb72d7f322f4708b7.css
Links
11- https://blog.chebuya.com
- https://github.com/HavocFramework/Havoc
- https://github.com/WesleyWong420/RedTeamOps-Havoc-101
- https://github.com/chebuya
- https://github.com/chebuya/Havoc-C2-SSRF-poc