Skip to content

An exploit for the BoF vulnerability which was present in ProSSHD.

Notifications You must be signed in to change notification settings

0x0L0RD/ProSSHDExploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

ProSSHDExploit

An exploit for the BoF vulnerability which was present in ProSSHD.

image

  • You will need to change some variable's values (IP, Port, User, Password, and Shellcode), and most likely the memory address for the ROP gadget.
  • Shellcode can be generated with Msvenom, or just write your own if you're bored and have a lot of time on your hands.
  • IP and Port would need to be changed to the IP of the host running ProSSHD and the respective port.
  • User and Password would need to be the credentials for a valid user on the SSH service.
  • The Memory address will depend on which gadget you want to use, but PUSH RSP, RET worked for me. Ropper or any other gadget retrieval tool would be ideal.

Now, when you think about what's going on here, you might wonder "isn’t it kinda dumb?" Because you literally have to be authenticated or have valid credentials to the target machine for this to work. So, if you already have access, why would you want to gain access?

The answer is two-fold.

I enjoy this. Writing software is great, but making exploits? I live for this stuff. So this was great practice. An administrative user would have had to initiate the ProSSH daemon. If you have creds for some ordinary John Doe, this right here would be your ticket to the big leagues.

About

An exploit for the BoF vulnerability which was present in ProSSHD.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages