Title: Porting a Proof of Concept C code into universal python exploit (OpenSSH).
When: Thursday 19th April 2018 at 18:30
Summary:
OpenSSH lets you grant SFTP access to users without allowing full command execution using “ForceCommand internal-sftp”. However, if you misconfigure the server and don’t use ChrootDirectory, the user will be able to access all parts of the filesystem that he has access to – including procfs. On modern Linux kernels (>=2.6.39, I think), /proc/self/maps reveals the memory layout and /proc/self/mem lets you write to arbitrary memory positions.
This talk will provide an overview of the exploitation process for the OpenSSH vulnerability and the challenges and techniques used to create a universal exploit for 32 and 64 bit architectures.
Where: MCAST IICT – MCAST Main Campus, Triq Kordin, Paola PLA 9032
Map: https://goo.gl/maps/W6gUjDb19xo
More Information: https://www.owasp.org/index.php/Malta