Posts

Showing posts from 2017

Intel AMT Vulnerability Allow Hack Remotely Critical Escalation Of Privilege Bug

Image
The vulnerability, labeled CVE-2017-5689 , affects Intel remote management technologies, including Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT) software, versions 6 through 11.6.  Where the Intel AMT Vulnerability resides? To protect Intel AMT Web Interface from unauthorized users, the service makes use of HTTP Digest and Kerberos authentication. The escalation of privilege vulnerability resides in the way Intel AMT Web Interface handles user authentication over HTTP Digest protocol, which is based on a simple challenge-response paradigm. Before going into the technical details about the exploitation of this vulnerability, first, you need to know how the Digest authentication works. The Digest authentication completes in the following steps: Client requests server to initiate login, and in response, the server returns a randomly generated 'nonce' value, the HTTP method, and the reques

Hack Padding Oracle

Image
This VM, Provided by Pentester Lab, has a website vulnerable to padding oracle attack .  Our goal is to exploit this vulnerability and login as user and admin .   Step 1 :   Now A look at Website    The Website said that we should create an account first. This is because key only appears when you are logged in .  Step 2 :   Using Burpsuite , We can Intercept the server's response  and see how it's look like .     Step 3 :   Now We have Auth  Key        EgJh18CJZHgA8yMdlWl3TMqog0LpR0nE                Step 4 : Kali has an  Padbuster  Tool .                                                                                                                                                                                        Where URL = The target URL (and query string if applicable)                                                            EncryptedSample = The encrypted value you want to test.