Some time ago while doing a pentest, we found a vulnerability in a file sharing web application named FileRun. This application allows us to access our files anywhere through self-hosted secure cloud storage, backup and sharing files for our photos, videos, files and more.
It’s been a while since the last post about exploitation on this blog. This time, we try to explain a stack based overflow on a software called Cyberlink LabelPrint. The software serves as a tool to assist in designing labels for CD / DVD covers. Cyberlink LabelPrint is included in the installation of Cyberlink Power2Go, PowerDVD, and Power Producer software and also pre-installed in the latest laptop by Lenovo, HP, and Asus.
After playing around with unicode stack overflow, I try to do it on an application called AllPlayer. Techniques used are not much different, so the result will be the same as the previous exploits. This application never seems to be updated by the developer, ironically this application is widely used.
We found a vulnerability on NetGain Enterprise Manager during a pentest. We think that the vulnerability is quite rare and worth to share.
EternalBlue dapat digunakan untuk melakukan eksploitasi pada layanan Server Message Block (SMB) tanpa membutuhkan proses otentikasi. Kemudian ditambah dengan menggunakan DoublePulsar untuk mengirim sekaligus mengeksekusi malicious Dynamic-Link Libraries (DLL) atau raw shellcode pada komputer korban.
We found a vulnerability in a WordPress plugin called Simple Login Log Plugin.
So this is a write up for Hackfest 2016 Orcus found in Vulnhub, just to fill my leisure time!