infosecwriteups.com
Open in
urlscan Pro
162.159.152.4
Public Scan
Submitted URL: https://rsci.app.link/LDhm3bGroxb?_p=c51429c49a1c65f4e3038ff5e1
Effective URL: https://infosecwriteups.com/how-i-hacked-into-a-telecom-network-part-1-getting-the-rce-167c2bb320e6?_branch_match_id=1153805...
Submission: On February 13 via manual from US — Scanned from DE
Effective URL: https://infosecwriteups.com/how-i-hacked-into-a-telecom-network-part-1-getting-the-rce-167c2bb320e6?_branch_match_id=1153805...
Submission: On February 13 via manual from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Open in app Sign up Sign In Write Sign up Sign In Published in InfoSec Write-ups Harpreet Singh Follow Jul 11, 2020 · 5 min read · Listen Save HOW I HACKED INTO A TELECOM NETWORK — PART 1 (GETTING THE RCE) > TLDR; Red Team Engagement for a telecom company. Got a foothold on the > company’s Network Monitoring System (NMS). Sorted reverse shell issue with > tunneling SSH over HTTP. Went full-on Ninja when getting SSH over HTTP. > Proxied inside the network to get for internal network scan. Got access to > CDRs and VLR with SS7 application. Hi everyone, this is my first post on Medium and I hope you guys enjoy reading it! There is a lot of information that I had to redact because of the sensitive nature of this info. (I’m apologizing in advance 😅 ) For detailed information, you can check out the following links: Part 2 — Playing with Tunnels: TCP Tunneling Part 3 — Playing with Tunnels: Stealthy SSH & Dynamic SSH Tunnels Part 4 — Getting Access to CDRs, SS7 applications & VLRs INTRODUCTION So there I was doing a Red Team Engagement for a client a while back. I was asked to get inside the network and reach to the Call Data Records (CDRs) for the telecom network. People who don’t know what CDR is, here’s a good explanation for it (shamelessly copied from Wikipedia) - > A call detail record (CDR) is a data record produced by a telephone exchange > or other telecommunications equipment that documents the details of a > telephone call or other telecommunications transaction (e.g., text message) > that passes through that facility or device. The record contains various > attributes of the call, such as time, duration, completion status, source > number, and destination number. In all my other engagements, this holds a special place. Getting the initial foothold was way too easy (simple network service exploitation to get RCE) but the issue was with the stable shell. In this blog post (not a tutorial), I want to share my experience on how I went from a Remote Code Execution (RCE) to proxified internal network scans in a matter of minutes. RECONNAISSANCE Every ethical hacker/penetration tester/bug bounty hunter/red teamer knows the importance of Reconnaissance. The phrase “give me six hours to chop down a tree and I will spend the first four sharpening the axe” sits perfectly over here. The more extensively the reconnaissance is done, the better odds for exploitation is. So for the RTE, the obvious choices for recon were: DNS enumerations, ASN & BGP lookups, some passive recons from multiple search engines, checking out source code repositories such as GitHub, BitBucket, GitLab, etc. for something juicy, doing some OSINT on employees for spear phishing in case there was no RCE found. (Trust me when I say this, fooling an employee to download & execute malicious documents is easy to do but only if you could overcome the obstacles — AVs & Email Spam Filters) There are just so many sources from where you can recon for a particular organization. In my case, I started off with the DNS enumeration itself. aiodnsbrute -v -t 7000 — no-verify -w dns-list.uniq.lst ******.com.** | grep -v Timeout | grep -v Misformatted | grep -v exception > Fun fact: The wordlist I used has 2.77 million unique DNS records. Most of the bounty hunters will look for port 80 or 443 for all the sub-domains found. The thing is, sometimes it’s better to perform a full port scan just to be on the safe side. In my case, I found a sub-domain e[REDACTED]-nms.[REDACTED].com.[REDACTED] and after a full port scan, I got some interesting results. The ports 12000/tcp and 14000/tcp were nothing special but 14100/tcp, let’s just say this was my lucky day!! J-Fuggin-Boss!! REMOTE CODE EXECUTION From here on, everyone who has exploited the infamous JBoss vulnerabilities before knows how things will move forward. For newbies, if you haven’t had the experience with JBoss exploitation, you can check out the following links to help you out with the exploitation: JBoss-Bridging-the-Gap-Between-the-Enterprise-and-You hacking_and_securing_jboss For JBoss exploitation, you can use Jexboss. There are many methods and exploitation techniques included in the tool and it also covers the Application and Servlet deserializations and Struct2. You can exploit JBoss using Metasploit as well, though I prefer Jexboss. Continuing with the engagement, once I discovered JBoss, I quickly fired up Jexboss for the exploitation. The tool was easy to use. ./jexboss.py -u http://[REDACTED]:14100/ As we can see from the above screenshot, the server was vulnerable. Using the JMXInvokerServlet method, I was then able to get the Remote Code Execution on the server. Pretty straight forward exploitation! Right? > You must be thinking, that was no advance level shit, so what’s different > about this post? Patience guys! Now that I had the foothold, the actual issue arose. Of course like always, once I had the RCE I tried getting a reverse shell. and I even got a back connection! However, the shell was not stable and the python process was getting killed after a few seconds. I even tried using other reverse shell one-liner payloads, different common ports, even UDP too, but the result was the same. I also tried reverse_tcp/http/https Metasploit payloads in different forms to get meterpreter connections but the meterpreter shells were disconnected after a few seconds. I have experienced some situations like these before and I always questioned what if I’m not able to get a reverse shell, how will I proceed? Entering Bind shell connection over HTTP tunnel! To be continued in part 2… PROMOTION TIME! If you guys want to learn more about the techniques I used and the basic concepts behind it, you can read my books (co-authored with @himanshu_hax) > Hands-On Red Team Tactics — Amazon, PacktPub > Hands-On Web Application Penetration Testing with Metasploit — Amazon, > PacktPub 211 211 1 211 1 SIGN UP FOR INFOSEC WRITEUPS BY INFOSEC WRITE-UPS Newsletter from Infosec Writeups Take a look. By signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices. Get this newsletter MORE FROM INFOSEC WRITE-UPS Follow A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/ CyberSec_Sai ·Jan 14 Member-only HOW TO FIND COMPROMISED CREDENTIALS ON DARKWEB? How many of you often see messages and alerts saying “Your credentials are compromised and found on darkweb”. In this article, let’s understand how your credentials end up on dark web and how you can search for your compromised credentials on the dark web. — Darkweb 101: The dark web is a part of the internet that is not indexed by search engines and can only be accessed using specialized anonymity tools such as the Tor network. It is often associated with illegal activities such as the sale of drugs, weapons, and stolen personal data, as well… Cybersecurity 5 min read Cybersecurity 5 min read -------------------------------------------------------------------------------- Share your ideas with millions of readers. Write on Medium -------------------------------------------------------------------------------- Supakiad S. (m3ez) ·Jan 22 REFLECTED XSS LEADS TO 3,000$ BUG BOUNTY REWARDS FROM MICROSOFT FORMS Microsoft Forms Vulnerability: Reflected Cross-site Scripting (XSS) Table of Contents Introduction Background Details of the Vulnerability Proof of Concept Disclosure Timelines Introduction In this blog post, I will discuss the details of a reflected cross-site scripting (XSS) vulnerability in Microsoft Forms. Additionally, in my last blog post, I disclosed a vulnerability report on Microsoft… Bug Bounty Writeup 3 min read Bug Bounty Writeup 3 min read -------------------------------------------------------------------------------- Mike Takahashi ·Jan 16 Member-only TIPS FOR BAC AND IDOR VULNERABILITIES Step-by-step guide for uncovering Broken Access Control and Indirect Object Reference vulnerabilities for bug bounty hunters and pentesters. — Introduction As bug bounty hunters and pentesters, one of the most rewarding vulnerabilities to uncover are Broken Access Control (BAC) and Insecure Direct Object Reference (IDOR). In this article, we’ll discuss what BAC and IDOR vulnerabilities are, basic testing methodology, IDOR with UUID, Blind IDOR, and automating with the Auth Analyzer… Bug Bounty 5 min read Bug Bounty 5 min read -------------------------------------------------------------------------------- Satya Prakash ·Dec 8, 2022 HOW I FOUND 40+ DIRECTORY LISTING VULNERABILITIES OF SOURCE CODE DISCLOSURE VIA EXPOSED WORDPRESS FOLDERS USING GOOGLE DORKS I have found more than 40+ Directory Listing Vulnerabilities which contain Source Code Disclosure via the Exposed WordPress Folders (/wp-admin & Others) just by using Google Dorks as shown below 👇 Google Dorks: Index:Index of /wp-admin Google Dork 2 min read Google Dork 2 min read -------------------------------------------------------------------------------- Anton (therceman) ·Dec 23, 2022 Member-only $350 XSS IN 15 MINUTES Bug Bounty Writeup about DOM XSS via JSONP + Parameter pollution — Hello 👋 This is my first and last Bug Bounty Writeup this year. 😀 I am sharing with you my latest XSS finding, which I’ve found 2 weeks ago. This was the fastest and a bit unusual flow that I normally do when I search for XSS. So let’s dive… Cybersecurity 3 min read Cybersecurity 3 min read -------------------------------------------------------------------------------- Read more from InfoSec Write-ups AboutHelpTermsPrivacy -------------------------------------------------------------------------------- GET THE MEDIUM APP HARPREET SINGH 173 Followers Author | Pen tester | Otaku Follow MORE FROM MEDIUM S12 - H4CK RANSOMWARE WANNACRY Mike Takahashi in The Gray Area 5 GOOGLE DORKS EVERY HACKER SHOULD KNOW S12 - H4CK in Martian Defense Cybersecurity HACKING XML — XML INJECTION Bryan Ye in Better Humans HOW TO WAKE UP AT 5 A.M. EVERY DAY Help Status Writers Blog Careers Privacy Terms About Text to speech To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy.