code-white.com/blog/2023-07-from-blackbox-dotnet-remoting-to-rce

Preview meta tags from the code-white.com website.

Linked Hostnames

13

Thumbnail

Search Engine Appearance

Google

https://code-white.com/blog/2023-07-from-blackbox-dotnet-remoting-to-rce

CODE WHITE | From Blackbox .NET Remoting to Unauthenticated Remote Code Execution

This is a story on discovering an Unauthenticated Remote Code Execution in a CRM product by the vendor ACT!. What made this story special for us was that we had to take a blackbox approach at the beginning and the system was not exploitable with standard .NET Remoting payloads due to several reasons we’ll explain in this blog post.



Bing

CODE WHITE | From Blackbox .NET Remoting to Unauthenticated Remote Code Execution

https://code-white.com/blog/2023-07-from-blackbox-dotnet-remoting-to-rce

This is a story on discovering an Unauthenticated Remote Code Execution in a CRM product by the vendor ACT!. What made this story special for us was that we had to take a blackbox approach at the beginning and the system was not exploitable with standard .NET Remoting payloads due to several reasons we’ll explain in this blog post.



DuckDuckGo

https://code-white.com/blog/2023-07-from-blackbox-dotnet-remoting-to-rce

CODE WHITE | From Blackbox .NET Remoting to Unauthenticated Remote Code Execution

This is a story on discovering an Unauthenticated Remote Code Execution in a CRM product by the vendor ACT!. What made this story special for us was that we had to take a blackbox approach at the beginning and the system was not exploitable with standard .NET Remoting payloads due to several reasons we’ll explain in this blog post.

  • General Meta Tags

    4
    • title
      CODE WHITE | Red Teaming & Attack Surface Management
    • charset
      utf-8
    • viewport
      width=device-width, initial-scale=1
    • description
      This is a story on discovering an Unauthenticated Remote Code Execution in a CRM product by the vendor ACT!. What made this story special for us was that we had to take a blackbox approach at the beginning and the system was not exploitable with standard .NET Remoting payloads due to several reasons we’ll explain in this blog post.
  • Open Graph Meta Tags

    5
    • og:title
      CODE WHITE | From Blackbox .NET Remoting to Unauthenticated Remote Code Execution
    • og:description
      This is a story on discovering an Unauthenticated Remote Code Execution in a CRM product by the vendor ACT!. What made this story special for us was that we had to take a blackbox approach at the beginning and the system was not exploitable with standard .NET Remoting payloads due to several reasons we'll explain in this blog post.
    • og:type
      article
    • og:url
      https://code-white.com/blog/2023-07-from-blackbox-dotnet-remoting-to-rce/
    • og:image
      https://code-white.com/images/featured.png
  • Link Tags

    20
    • alternate
      https://code-white.com/index.xml
    • alternate
      https://code-white.com/blog/index.xml
    • canonical
      https://code-white.com/blog/2023-07-from-blackbox-dotnet-remoting-to-rce/
    • stylesheet
      https://code-white.com/css/header.css
    • stylesheet
      https://code-white.com/css/style.css

Links

39