Secure77

Techblog and Security

pwntools, gdb, gdbserver and pwndbg with 32 bit binaries

A few weeks ago i just started with binary exploitation and as learning and understanding this topic is not enough challenging, i encountered different problems with the tools and some basics. One of these problems i will describe today. Intro there are many good tutorials, challanges and ctfs out there, where you can start learning

gMSA Passwords

Doing one of the recent HTB Boxes i came across the tool https://nettools.net and learned how you can retrieve gMSA passwords with it: https://nettools.net/howto-retrieving-gmsa-password-details/ Additional to the howto from NetTools you can change the encoding for the desired attribute to only retrieve the current password this will print you only the current password as hex

PHP Voting System – Unauthenticated Remote Code Execution

Today i just found another exploit in the PHP Voting System. The file /admin/candidates_add.php is vulnerable against unauthenticated file upload which can use for RCE. Exploit DB entry: https://www.exploit-db.com/exploits/49846 Vulnerable file candidates_add.php You just need to send a POST with multipart/form-data so you can upload any file you wish. There is no cookie or file

PHP Voting System – Admin Authentication Bypass (SQLI)

Today i found a new exploit in the PHP Voting System. Exploit-DB entry: https://www.exploit-db.com/exploits/49843 The /admin/login.php is vulnerable against SQL injections and so you can bypass the admin authentication. login.php As you can see the first check if($query->num_rows < 1)against the username is only checking the number of rows. With the following statement you always

Research Valheim Server Passwords

In version 0.147.3 of valheim there is a possibility to receive and extract the passwords entered by the user. Responsible disclosure: I send an Email to the developer Team of irongatestudio, but unfortunately they didd’t respond to me. This is only possible if you control the server binaries! at this moment there was no possibility

openSSH commands unter Windows absichern

Seit Windows Server 2019 kann der openSSH Server über die Features oder per Powershell einfach nach installiert werden. Siehe Windows Server 2019 openSSH. Aber auch für Windows Server 2016 und älter besteht die Möglichkeit openSSH als Server Variante einfach zum laufen zu bekommen: Windows Server 2016 openSSH. In dem Beitrag geht es um das Einschränken

Postgres DB Remote Backup

Für die folgende Anleitung wird auf dem Datenbank System ein openSSH Server benötigt. Postgres Backups werden über die Anwendung pg_dump erstellt. SHH einrichten Benötigt wird einen User, der per SSH Zugriff auf den Server hat. Für ein automatisiertes Backup wird die Authentifizierung per PubKey ohne Kennwort eingerichtet, da somit kein Passwort in den Skripten gespeichert