Новости компьютерной безопасности:

  Latest News

Open Source C2 Frameworks Used In Red Teaming Vulnerable To RCE Attacks

С сайта: Vulnerability(cybersecuritynews.com)

Open Source C2 Frameworks Used In Red Teaming Vulnerable To RCE Attacks

Author: Guru Baran

A C2 framework is an architecture that controls and maintains access to compromised systems. Its purpose is to allow you to run commands on other people’s computers, but many C2 frameworks are vulnerable to illegal command execution.

Some cases may be exposed to remote code execution (RCE), such as when you run these frameworks on a public network using the default options. 

Generally, the term “post-exploitation” is frequently used in relation to C2 frameworks: these frameworks are intended to support attackers who have already had some degree of control over a target’s computer, either through supply chain attacks, phishing, or web vulnerabilities.

cyber security newsC2 Frameworks
Researchers discovered that open-source C2 frameworks used in red-teaming assessments are vulnerable to RCE attacks.

Threats Of C2 Framework 
According to the Include Security Research team, operators utilize C2 frameworks to simplify the management of complex campaigns.

C2 frameworks offer a way for several operators to collaborate during target post-exploitation. 

However, security concerns against the campaigns and the red team operators themselves may result from bugs and design vulnerabilities in the C2 frameworks.

For instance, an XSS (Cross-Site Scripting) vulnerability, CVE-2022-39197, was tracked and found in HelpSystems Cobalt Strike through 4.7. This vulnerability allowed a remote attacker to execute HTML on the Cobalt Strike team server.

An agent provides untrusted input to the teamserver, which, when viewed by an operator in the teamserver UI, results in cross-site scripting or remote code execution.

Another low-privileged “operator” users can utilize Sliver version 1.6.0 (prerelease) to perform Remote Code Execution (RCE) on the teamserver identified as CVE-2024-41111. Here, the root user of the system is the RCE. 

Typically, Sliver is an open-source, cross-platform framework for red teams and adversary simulation that is useful for security testing in many kinds of businesses.

The Sliver team has addressed the vulnerability after being made aware of it. Similar to Sliver, Havoc has an authenticated RCE vulnerability in the teamserver.

This RCE vulnerability can be exploited right away by anyone careless enough to run Havoc with default settings on an untrusted network, since the default configuration of Havoc generates two users with the password “password1234”.

Even with firewalls turned off, teamservers can still be compromised by a SSRF vulnerability that Chebuya just found.

The report says the Ninja web server is vulnerable to arbitrary file downloads without authentication via path traversal. This results in immediate RCE against the teamserver when operating as root, or RCE upon the teamserver’s next restart.

SHAD0W is vulnerable to unauthenticated RCE, which occurs when agents supply untrusted input that is inserted into teamserver instructions. 

SHAD0W is a C2 framework with a Python backend and agents written in C. In this case, a new agent, referred to as a “beacon” in SHAD0W terminology, reports the architecture, domain, operating system, and other details about the compromised system when it logs in to the teamserver.

The research team contacted the SHAD0W developer multiple times, but they never heard back.

Frameworks have the best chance of preventing such vulnerabilities by maintaining strict data boundaries between the agent, teamserver, and client.

The default transport and beacon behaviors of Cobalt Strike are so strongly fingerprinted that they need significant patching and customisation to function in contexts with reasonable defenses. 

Agents and transport protocols of open source C2 frameworks begin to suffer from the same fate as soon as they are made available. The least exposed parts of the system are the client and the client-facing portion of the teamserver. 

So, it is a sensible design choice to make these unexposed components dependable, safe, and feature-rich with the understanding that the operators will create their own closed source evasive agents and transports.



#Cyber_Security_News #Hacking_Tools #Vulnerability #C2_Frameworks #cyber_security_news #red_teaming #Remote_Code_Execution_(RCE)

Оригинальная версия на сайте: Open Source C2 Frameworks Used In Red Teaming Vulnerable To RCE Attacks
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.