Corben Leo's Avatar

Corben Leo

@hacking.bsky.social

I hack stuff (legally). | co-founder boring.co Twitter: https://twitter.com/hacker_

1,830 Followers  |  17 Following  |  18 Posts  |  Joined: 08.04.2023  |  2.0164

Latest posts by hacking.bsky.social on Bluesky

this app still exists in 2024

27.11.2024 13:51 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

yeahโ€ฆ.๐Ÿ˜ฌ

04.07.2023 18:39 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Can see why there havenโ€™t been any sticky Twitter competitors

02.07.2023 04:25 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

this app does in fact still exist

29.06.2023 19:55 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Super insane. Kinda scary, curious about the ramifications of violent games that look so realistic

25.04.2023 10:05 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Itโ€™d be an interesting read! Why not?

Bootstrapped businesses canโ€™t play the same game that venture-backed businesses play

09.04.2023 19:36 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

TLDR;

- In a bug bounty program (telecommunications company)
- Scanned their IPV4 Ranges
- Found a webserver that said "โ–ˆโ–ˆโ–ˆ Cable System"
- Directory brute-force found /admin/accounts/
- The endpoint set a valid admin JSESSIONID

https://bsky.app/profile/hacking.bsky.social/post/3jsunjzfyl22o

08.04.2023 15:39 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

10/ I reported it immediately and started pinging their program manager.

It was the best response I've ever gotten.

And will ever get

08.04.2023 15:38 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

9/ I clicked through the menus to see if I was actually authenticated.

I was. FULLY. AUTHENTICATED.

On that same IP range,

They had ANOTHER system for ANOTHER cable.

I tried the same attack.

IT WORKED!

I had admin access to TWO. Different. Cables.

I was in disbelief.

So,

08.04.2023 15:37 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

8/ Redirected to the home page.

Second visit:

> HTTP/1.1 200 OK
> --- snip ---
> <title>Account Administration</title>

HOLY **** IT WORKED.

This is a HIGHLY redacted version of what I saw:

So,

08.04.2023 15:37 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

7/ It's probably worthless. Right?

I was intrigued enough.

So I decided to visit the endpoint in my browser.

Twice.

1st - To set the JSESSIONID cookie in my browser.
2nd - To see if the cookie was valid & used for authentication.

1st visit: http://<IP>/admin/accounts/ and

08.04.2023 15:36 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

6/ Let's see if there are more directories down /admin/

Directory-Bruteforcing found /accounts/.

This redirected to the login page.

I was about to brute-force JSP files when I realized something unique in the response.

A header.

> Set-Cookie: JSESSIONID=<id>;

That's weird.

08.04.2023 15:36 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

5/ The directory /admin/

Remember, it's running Apache Tomcat.

I built a wordlist for .jsp files using BigQuery. (Learned from @assetnote's commonspeak)

Bruteforcing found a few JSP files, but they all redirected to the login page.

Gah. Well,

08.04.2023 15:35 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

4/ "login.jsp"

Ok! It was a Tomcat webserver

I didn't have credentials. Obviously.

I started with directory brute-forcing.

Used @joohoi's ffuf & filtered by the number of response words on the 404 page.

It found several directories.

One that stuck out was

08.04.2023 15:35 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

3/ "โ–ˆโ–ˆโ–ˆ Cable System" (I have to redact this)

So, I visited the server in my browser.

The home page said

> "Welcome to the โ–ˆโ–ˆโ–ˆ Management System"

No way. This isn't really online is it?
Underneath was a link:

"Log in to โ–ˆโ–ˆโ–ˆ"

Clicked it and it brought me to

08.04.2023 15:35 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

2/ I searched the company's name on bgp.he\.net

Saved their IP ranges.

I ran masscan, probed for HTTP(s) servers, and grabbed the HTTP titles.

Looked something like:

$ masscan -p 80,443 -iL ranges -oL out.txt
$ cat out.txt | httpx -title

One title stuck out:

08.04.2023 15:34 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

1/ It began with a bug bounty program.

Of a telecommunications company (that I can't name publicly).

As some of you may know, I love recon.

I had already done subdomain enumeration.

The next step was to scan their IP ranges.

So,

08.04.2023 15:34 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

In 2010, WikiLeaks released a classified document.

A list of infrastructure critical to U.S national security.

The government listed a Trans-Atlantic cable.

3 years ago,

19-year-old me gained ADMIN access to that cable (and another; shared codebase).

Here's how I did it:

08.04.2023 15:34 โ€” ๐Ÿ‘ 12    ๐Ÿ” 3    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 1

@hacking is following 15 prominent accounts