Great work.
-
-
-
You sure? Or is this adding to
#OST? Even though they weren't the first to drop this it is surprising you support it.@CharlesDardaman thoughts? - Još 5 drugih odgovora
Novi razgovor -
-
-
Found this Nmap script for it that you can use to scan for it:https://github.com/hackingyseguridad/nmap/blob/master/CVE-2019-19781.nse …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
It was already released by other groups prior to us releasing. We didn’t plan on releasing it but the cat was already out of the bag. Companies have used ours to check the systems and validate its fixed. We also released a scanner to check and forensics IoCs to look for it.
- Još 6 drugih odgovora
Novi razgovor -
-
-
Anyway to check exploitability without popping a shell? Also, does this cause any system instability?
-
No system instability it’s safe - check the payload section just remove the python code and put anything like the letter “a”.. and go to the folder /netscaler/portal/templates and look for the file there.
- Još 1 odgovor
Novi razgovor -
-
-
Does a 302 request at the /vpn/../../../../netscaler/portal/templates/file.xml URL mean that the appliance has been patched or is unaffected?
-
I would check the directory folder under /netscaler/portal/templates.. when you SSH in type shell and navigate there. If file is there it’s not mitigated. There’s two issues the main one being the directory traversal - second is the http://newbl.pl script.
- Još 6 drugih odgovora
Novi razgovor -
-
-
How… how are there still directory traversal attacks in 2020? I mean, checking for DT is one of the first boxes to tick in my checklist. … gonna need some booze …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.