Subscribe via feed.
Archive for May, 2022

Ransom.WannaCry Code Execution

Posted by deepcore under exploit (No Respond)

WannaCry ransomware looks for and executes DLLs in its current directory. Therefore, we can hijack a DLL to execute our own code in order to control and terminate the malware pre-encryption. The exploit DLL checks if the current directory is “C:\Windows\System32” and if not we grab our process ID and terminate. We do not need […]

WordPress Stafflist 3.1.2 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

WordPress Stafflist plugin version 3.1.2 suffers from a cross site scripting vulnerability.

Tenda HG6 3.3.0 Remote Command Injection

Posted by deepcore under exploit (No Respond)

Tenda HG6 version 3.3.0 suffers from a remote command injection vulnerability. It can be exploited to inject and execute arbitrary shell commands through the pingAddr and traceAddr HTTP POST parameters in formPing, formPing6, formTracert and formTracert6 interfaces.

VMware Workspace ONE Access Template Injection / Command Execution

Posted by deepcore under exploit (No Respond)

This Metasploit module exploits CVE-2022-22954, an unauthenticated server-side template injection (SSTI) vulnerability in VMware Workspace ONE Access, to execute shell commands as the horizon user.

Ransom.AvosLocker Code Execution

Posted by deepcore under exploit (No Respond)

Ransom.AvosLocker ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vulnerable DLL to execute our own code and control and terminate the malware pre-encryption. The exploit DLL will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not […]

BlackBasta Ransom Code Execution

Posted by deepcore under exploit (No Respond)

BlackBasta looks for and loads a DLL named wow64log.dll in WindowsSystem32. Therefore, we can drop our own DLL to intercept and terminate the malware pre-encryption. The exploit DLL will simply display a Win32API message box and call exit(). Our BlackBasta exploit DLL must export the InterlockedExchange function or it fails with error. We do not […]

LokiLocker Ransom Code Execution

Posted by deepcore under exploit (No Respond)

LokiLocker looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vulnerable DLL to execute our own code, control and terminate the malware pre-encryption. The exploit DLL will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need to […]

Conti Ransom Code Execution

Posted by deepcore under exploit (No Respond)

Conti looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vulnerable DLL to execute our own code and control and terminate the malware pre-encryption. The exploit DLL will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need […]

REvil Ransom Code Execution

Posted by deepcore under exploit (No Respond)

REvil looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vulnerable DLL to execute our own code, control and terminate the malware pre-encryption. The exploit DLL will check if the current directory is “C:WindowsSystem32” and if not we grab our process ID and terminate. We do not need to […]

RedLine.Stealer Code Execution

Posted by deepcore under exploit (No Respond)

RedLine looks for and loads a DLL named “wow64log.dll” in WindowsSystem32. Therefore, we can drop our own DLL to intercept and terminate the malware. The exploit DLL will simply display a Win32API message box and call exit(). Our RedLine exploit DLL must export the “InterlockedExchange” function or it fails with an error. We do not […]